secator


Namesecator JSON
Version 0.4.0 PyPI version JSON
download
home_pageNone
SummaryThe pentester's swiss knife.
upload_time2024-04-29 16:53:24
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseNone
keywords automation cybersecurity pentest recon vulnerability
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <h1 align="center">
	<img src="https://github.com/freelabz/secator/assets/9629314/ee203af4-e853-439a-af01-edeabfc4bf07/" width="400">
</h1>

<h4 align="center">The pentester's swiss knife.</h4>

<p align="center">
<!-- <a href="https://goreportcard.com/report/github.com/freelabz/secator"><img src="https://goreportcard.com/badge/github.com/freelabz/secator"></a> -->
<img src="https://img.shields.io/badge/python-3.6-blue.svg">
<a href="https://github.com/freelabz/secator/releases"><img src="https://img.shields.io/github/release/freelabz/secator"></a>
<a href="https://github.com/freelabz/secator/blob/main/LICENSE"><img src="https://img.shields.io/badge/License-BSL%201.1-brightgreen.svg"></a>
<a href="https://pypi.org/project/secator/"><img src="https://img.shields.io/pypi/dm/secator"></a>
<a href="https://twitter.com/freelabz"><img src="https://img.shields.io/twitter/follow/freelabz.svg?logo=twitter"></a>
<a href="https://youtube.com/@FreeLabz"><img src="https://img.shields.io/youtube/channel/subscribers/UCu-F6SpU0h2NP18zBBP04cw?style=social&label=Subscribe%20%40FreeLabz"></a>
<!-- <a href="https://discord.gg/freelabz"><img src="https://img.shields.io/discord/695645237418131507.svg?logo=discord"></a> -->
</p>


<p align="center">
  <a href="#features">Features</a> •
  <a href="#supported-commands">Supported commands</a> •
  <a href="#install-secator">Installation</a> •
  <a href="#usage">Usage</a> •
  <a href="https://docs.freelabz.com">Documentation</a>
</p>

`secator` is a task and workflow runner used for security assessments. It supports dozens of well-known security tools
and it is designed to improve productivity for pentesters and security researchers.

# Features

![](images/demo.gif)

* **Curated list of commands**

* **Unified input options**

* **Unified output schema**

* **CLI and library usage**

* **Distributed options with Celery**

* **Complexity from simple tasks to complex workflows**

* **Customizable**


## Supported tools

`secator` integrates the following tools:

| Name                                                          | Description                                                                    | Category       |
|---------------------------------------------------------------|--------------------------------------------------------------------------------|----------------|
| [httpx](https://github.com/projectdiscovery/httpx)            | Fast HTTP prober.                                                              | `http`         |
| [cariddi](https://github.com/edoardottt/cariddi)              | Fast crawler and endpoint secrets / api keys / tokens matcher.                 | `http/crawler` |
| [gau](https://github.com/lc/gau)                              | Offline URL crawler (Alien Vault, The Wayback Machine, Common Crawl, URLScan). | `http/crawler` |
| [gospider](https://github.com/jaeles-project/gospider)        | Fast web spider written in Go.                                                 | `http/crawler` |
| [katana](https://github.com/projectdiscovery/katana)          | Next-generation crawling and spidering framework.                              | `http/crawler` |
| [dirsearch](https://github.com/maurosoria/dirsearch)          | Web path discovery.                                                            | `http/fuzzer`  |
| [feroxbuster](https://github.com/epi052/feroxbuster)          | Simple, fast, recursive content discovery tool written in Rust.                | `http/fuzzer`  |
| [ffuf](https://github.com/ffuf/ffuf)                          | Fast web fuzzer written in Go.                                                 | `http/fuzzer`  |
| [h8mail](https://github.com/khast3x/h8mail)                   | Email OSINT and breach hunting tool.                                           | `osint`        |
| [dnsx](https://github.com/projectdiscovery/dnsx)              | Fast and multi-purpose DNS toolkit designed for running DNS queries.           | `recon/dns`    |
| [dnsxbrute](https://github.com/projectdiscovery/dnsx)              | Fast and multi-purpose DNS toolkit designed for running DNS queries (bruteforce mode).           | `recon/dns`    |
| [subfinder](https://github.com/projectdiscovery/subfinder)    | Fast subdomain finder.                                                         | `recon/dns`    |
| [fping](https://fping.org/)                                   | Find alive hosts on local networks.                                            | `recon/ip`     |
| [mapcidr](https://github.com/projectdiscovery/mapcidr)        | Expand CIDR ranges into IPs.                                                   | `recon/ip`     |
| [naabu](https://github.com/projectdiscovery/naabu)            | Fast port discovery tool.                                                      | `recon/port`   |
| [maigret](https://github.com/soxoj/maigret)                   | Hunt for user accounts across many websites.                                   | `recon/user`   |
| [gf](https://github.com/tomnomnom/gf)                         | A wrapper around grep to avoid typing common patterns.                         | `tagger`       |
| [grype](https://github.com/anchore/grype)                     | A vulnerability scanner for container images and filesystems.                  | `vuln/code`    |
| [dalfox](https://github.com/hahwul/dalfox)                    | Powerful XSS scanning tool and parameter analyzer.                             | `vuln/http`    |
| [msfconsole](https://docs.rapid7.com/metasploit/msf-overview) | CLI to access and work with the Metasploit Framework.                          | `vuln/http`    |
| [wpscan](https://github.com/wpscanteam/wpscan)                | WordPress Security Scanner                                                     | `vuln/multi`   |
| [nmap](https://github.com/nmap/nmap)                          | Vulnerability scanner using NSE scripts.                                       | `vuln/multi`   |
| [nuclei](https://github.com/projectdiscovery/nuclei)          | Fast and customisable vulnerability scanner based on simple YAML based DSL.    | `vuln/multi`   |
| [searchsploit](https://gitlab.com/exploit-database/exploitdb) | Exploit searcher. | `exploit/search`    |

Feel free to request new tools to be added by opening an issue, but please 
check that the tool complies with our selection criterias before doing so. If it doesn't but you still want to integrate it into `secator`, you can plug it in (see the [dev guide](https://docs.freelabz.com/for-developers/writing-custom-tasks)).


## Installation

### Installing secator

<details>
	<summary>Pipx</summary>

```sh
pipx install secator
```

</details>

<details>
	<summary>Pip</summary>

```sh
pip install secator
```

</details>

<details>
  <summary>Bash</summary>

```sh
wget -O - https://raw.githubusercontent.com/freelabz/secator/main/scripts/install.sh | sh
```

</details>

<details>
	<summary>Docker</summary>

```sh
docker run -it --rm --net=host -v ~/.secator:/root/.secator freelabz/secator --help
```

The volume mount -v is necessary to save all secator reports to your host machine, and--net=host is recommended to grant full access to the host network.

You can alias this command to run it easier:
```sh
alias secator="docker run -it --rm --net=host -v ~/.secator:/root/.secator freelabz/secator"
```

Now you can run secator like if it was installed on baremetal:
```
secator --help
```

</details>

<details>
	<summary>Docker Compose</summary>

```sh
git clone https://github.com/freelabz/secator
cd secator
docker-compose up -d
docker-compose exec secator secator --help
```

</details>

***Note:*** If you chose the Bash, Docker or Docker Compose installation methods, you can skip the next sections and go straight to [Usage](#usage).

### Installing languages

`secator` uses external tools, so you might need to install languages used by those tools assuming they are not already installed on your system.

We provide utilities to install required languages if you don't manage them externally:

<details>
	<summary>Go</summary>

```sh
secator install langs go
```

</details>

<details>
	<summary>Ruby</summary>

```sh
secator install langs ruby
```

</details>

### Installing tools

`secator` does not install any of the external tools it supports by default.

We provide utilities to install or update each supported tool which should work on all systems supporting `apt`:

<details>
	<summary>All tools</summary>

```sh
secator install tools
```

</details>

<details>
	<summary>Specific tools</summary>

```sh
secator install tools <TOOL_NAME>
```

For instance, to install `httpx`, use:

```sh
secator install tools httpx
```

</details>

Please make sure you are using the latest available versions for each tool before you run secator or you might run into parsing / formatting issues.

### Installing addons

`secator` comes installed with the minimum amount of dependencies.

There are several addons available for `secator`:

<details>
	<summary>worker</summary>

Add support for Celery workers (see [Distributed runs with Celery](https://docs.freelabz.com/in-depth/distributed-runs-with-celery)).
```sh
secator install addons worker
```

</details>


<details>
	<summary>google</summary>

Add support for Google Drive exporter (`-o gdrive`).

```sh
secator install addons google
```

</details>

<details>
	<summary>mongodb</summary>

Add support for MongoDB driver (`-driver mongodb`).
```sh
secator install addons mongodb
```

</details>

<details>
	<summary>redis</summary>

Add support for Redis backend (Celery).

```sh
secator install addons redis
```

</details>

<details>
	<summary>dev</summary>

Add development tools like `coverage` and `flake8` required for running tests.

```sh
secator install addons dev
```

</details>

<details>
	<summary>trace</summary>

Add tracing tools like `memray` and `pyinstrument` required for tracing functions.

```sh
secator install addons trace
```

</details>

<details>
	<summary>build</summary>

Add `hatch` for building and publishing the PyPI package.

```sh
secator install addons build
```

</details>


### Install CVEs

`secator` makes remote API calls to https://cve.circl.lu/ to get in-depth information about the CVEs it encounters.
We provide a subcommand to download all known CVEs locally so that future lookups are made from disk instead:
```sh
secator install cves
```

### Checking installation health

To figure out which languages or tools are installed on your system (along with their version):
```sh
secator health
```

## Usage
```sh
secator --help
```
![](images/help.png)


### Usage examples

Run a fuzzing task (`ffuf`):

```sh
secator x ffuf http://testphp.vulnweb.com/FUZZ
```

Run a url crawl workflow:

```sh
secator w url_crawl http://testphp.vulnweb.com
```

Run a host scan:

```sh
secator s host mydomain.com
```

and more... to list all tasks / workflows / scans that you can use:
```sh
secator x --help
secator w --help
secator s --help
```

## Learn more

To go deeper with `secator`, check out:
* Our complete [documentation](https://docs.freelabz.com)
* Our getting started [tutorial video](https://youtu.be/-JmUTNWQDTQ?si=qpAClDWMXo2zwUK7)
* Our [Medium post](https://medium.com/p/09333f3d3682)
* Follow us on social media: [@freelabz](https://twitter.com/freelabz) on Twitter and [@FreeLabz](https://youtube.com/@FreeLabz) on YouTube

## Stats

<a href="https://star-history.com/#freelabz/secator&Date">
  <picture>
    <source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=freelabz/secator&type=Date&theme=dark" />
    <source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=freelabz/secator&type=Date" />
    <img alt="Star History Chart" src="https://api.star-history.com/svg?repos=freelabz/secator&type=Date" />
  </picture>
</a>

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "secator",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "automation, cybersecurity, pentest, recon, vulnerability",
    "author": null,
    "author_email": "FreeLabz <sales@freelabz.com>",
    "download_url": "https://files.pythonhosted.org/packages/30/d1/fd5703ef1384bcca81d65839cf1976ca512c06b8836247fe80f600eac4f6/secator-0.4.0.tar.gz",
    "platform": null,
    "description": "<h1 align=\"center\">\n\t<img src=\"https://github.com/freelabz/secator/assets/9629314/ee203af4-e853-439a-af01-edeabfc4bf07/\" width=\"400\">\n</h1>\n\n<h4 align=\"center\">The pentester's swiss knife.</h4>\n\n<p align=\"center\">\n<!-- <a href=\"https://goreportcard.com/report/github.com/freelabz/secator\"><img src=\"https://goreportcard.com/badge/github.com/freelabz/secator\"></a> -->\n<img src=\"https://img.shields.io/badge/python-3.6-blue.svg\">\n<a href=\"https://github.com/freelabz/secator/releases\"><img src=\"https://img.shields.io/github/release/freelabz/secator\"></a>\n<a href=\"https://github.com/freelabz/secator/blob/main/LICENSE\"><img src=\"https://img.shields.io/badge/License-BSL%201.1-brightgreen.svg\"></a>\n<a href=\"https://pypi.org/project/secator/\"><img src=\"https://img.shields.io/pypi/dm/secator\"></a>\n<a href=\"https://twitter.com/freelabz\"><img src=\"https://img.shields.io/twitter/follow/freelabz.svg?logo=twitter\"></a>\n<a href=\"https://youtube.com/@FreeLabz\"><img src=\"https://img.shields.io/youtube/channel/subscribers/UCu-F6SpU0h2NP18zBBP04cw?style=social&label=Subscribe%20%40FreeLabz\"></a>\n<!-- <a href=\"https://discord.gg/freelabz\"><img src=\"https://img.shields.io/discord/695645237418131507.svg?logo=discord\"></a> -->\n</p>\n\n\n<p align=\"center\">\n  <a href=\"#features\">Features</a> \u2022\n  <a href=\"#supported-commands\">Supported commands</a> \u2022\n  <a href=\"#install-secator\">Installation</a> \u2022\n  <a href=\"#usage\">Usage</a> \u2022\n  <a href=\"https://docs.freelabz.com\">Documentation</a>\n</p>\n\n`secator` is a task and workflow runner used for security assessments. It supports dozens of well-known security tools\nand it is designed to improve productivity for pentesters and security researchers.\n\n# Features\n\n![](images/demo.gif)\n\n* **Curated list of commands**\n\n* **Unified input options**\n\n* **Unified output schema**\n\n* **CLI and library usage**\n\n* **Distributed options with Celery**\n\n* **Complexity from simple tasks to complex workflows**\n\n* **Customizable**\n\n\n## Supported tools\n\n`secator` integrates the following tools:\n\n| Name                                                          | Description                                                                    | Category       |\n|---------------------------------------------------------------|--------------------------------------------------------------------------------|----------------|\n| [httpx](https://github.com/projectdiscovery/httpx)            | Fast HTTP prober.                                                              | `http`         |\n| [cariddi](https://github.com/edoardottt/cariddi)              | Fast crawler and endpoint secrets / api keys / tokens matcher.                 | `http/crawler` |\n| [gau](https://github.com/lc/gau)                              | Offline URL crawler (Alien Vault, The Wayback Machine, Common Crawl, URLScan). | `http/crawler` |\n| [gospider](https://github.com/jaeles-project/gospider)        | Fast web spider written in Go.                                                 | `http/crawler` |\n| [katana](https://github.com/projectdiscovery/katana)          | Next-generation crawling and spidering framework.                              | `http/crawler` |\n| [dirsearch](https://github.com/maurosoria/dirsearch)          | Web path discovery.                                                            | `http/fuzzer`  |\n| [feroxbuster](https://github.com/epi052/feroxbuster)          | Simple, fast, recursive content discovery tool written in Rust.                | `http/fuzzer`  |\n| [ffuf](https://github.com/ffuf/ffuf)                          | Fast web fuzzer written in Go.                                                 | `http/fuzzer`  |\n| [h8mail](https://github.com/khast3x/h8mail)                   | Email OSINT and breach hunting tool.                                           | `osint`        |\n| [dnsx](https://github.com/projectdiscovery/dnsx)              | Fast and multi-purpose DNS toolkit designed for running DNS queries.           | `recon/dns`    |\n| [dnsxbrute](https://github.com/projectdiscovery/dnsx)              | Fast and multi-purpose DNS toolkit designed for running DNS queries (bruteforce mode).           | `recon/dns`    |\n| [subfinder](https://github.com/projectdiscovery/subfinder)    | Fast subdomain finder.                                                         | `recon/dns`    |\n| [fping](https://fping.org/)                                   | Find alive hosts on local networks.                                            | `recon/ip`     |\n| [mapcidr](https://github.com/projectdiscovery/mapcidr)        | Expand CIDR ranges into IPs.                                                   | `recon/ip`     |\n| [naabu](https://github.com/projectdiscovery/naabu)            | Fast port discovery tool.                                                      | `recon/port`   |\n| [maigret](https://github.com/soxoj/maigret)                   | Hunt for user accounts across many websites.                                   | `recon/user`   |\n| [gf](https://github.com/tomnomnom/gf)                         | A wrapper around grep to avoid typing common patterns.                         | `tagger`       |\n| [grype](https://github.com/anchore/grype)                     | A vulnerability scanner for container images and filesystems.                  | `vuln/code`    |\n| [dalfox](https://github.com/hahwul/dalfox)                    | Powerful XSS scanning tool and parameter analyzer.                             | `vuln/http`    |\n| [msfconsole](https://docs.rapid7.com/metasploit/msf-overview) | CLI to access and work with the Metasploit Framework.                          | `vuln/http`    |\n| [wpscan](https://github.com/wpscanteam/wpscan)                | WordPress Security Scanner                                                     | `vuln/multi`   |\n| [nmap](https://github.com/nmap/nmap)                          | Vulnerability scanner using NSE scripts.                                       | `vuln/multi`   |\n| [nuclei](https://github.com/projectdiscovery/nuclei)          | Fast and customisable vulnerability scanner based on simple YAML based DSL.    | `vuln/multi`   |\n| [searchsploit](https://gitlab.com/exploit-database/exploitdb) | Exploit searcher. | `exploit/search`    |\n\nFeel free to request new tools to be added by opening an issue, but please \ncheck that the tool complies with our selection criterias before doing so. If it doesn't but you still want to integrate it into `secator`, you can plug it in (see the [dev guide](https://docs.freelabz.com/for-developers/writing-custom-tasks)).\n\n\n## Installation\n\n### Installing secator\n\n<details>\n\t<summary>Pipx</summary>\n\n```sh\npipx install secator\n```\n\n</details>\n\n<details>\n\t<summary>Pip</summary>\n\n```sh\npip install secator\n```\n\n</details>\n\n<details>\n  <summary>Bash</summary>\n\n```sh\nwget -O - https://raw.githubusercontent.com/freelabz/secator/main/scripts/install.sh | sh\n```\n\n</details>\n\n<details>\n\t<summary>Docker</summary>\n\n```sh\ndocker run -it --rm --net=host -v ~/.secator:/root/.secator freelabz/secator --help\n```\n\nThe volume mount -v is necessary to save all secator reports to your host machine, and--net=host is recommended to grant full access to the host network.\n\nYou can alias this command to run it easier:\n```sh\nalias secator=\"docker run -it --rm --net=host -v ~/.secator:/root/.secator freelabz/secator\"\n```\n\nNow you can run secator like if it was installed on baremetal:\n```\nsecator --help\n```\n\n</details>\n\n<details>\n\t<summary>Docker Compose</summary>\n\n```sh\ngit clone https://github.com/freelabz/secator\ncd secator\ndocker-compose up -d\ndocker-compose exec secator secator --help\n```\n\n</details>\n\n***Note:*** If you chose the Bash, Docker or Docker Compose installation methods, you can skip the next sections and go straight to [Usage](#usage).\n\n### Installing languages\n\n`secator` uses external tools, so you might need to install languages used by those tools assuming they are not already installed on your system.\n\nWe provide utilities to install required languages if you don't manage them externally:\n\n<details>\n\t<summary>Go</summary>\n\n```sh\nsecator install langs go\n```\n\n</details>\n\n<details>\n\t<summary>Ruby</summary>\n\n```sh\nsecator install langs ruby\n```\n\n</details>\n\n### Installing tools\n\n`secator` does not install any of the external tools it supports by default.\n\nWe provide utilities to install or update each supported tool which should work on all systems supporting `apt`:\n\n<details>\n\t<summary>All tools</summary>\n\n```sh\nsecator install tools\n```\n\n</details>\n\n<details>\n\t<summary>Specific tools</summary>\n\n```sh\nsecator install tools <TOOL_NAME>\n```\n\nFor instance, to install `httpx`, use:\n\n```sh\nsecator install tools httpx\n```\n\n</details>\n\nPlease make sure you are using the latest available versions for each tool before you run secator or you might run into parsing / formatting issues.\n\n### Installing addons\n\n`secator` comes installed with the minimum amount of dependencies.\n\nThere are several addons available for `secator`:\n\n<details>\n\t<summary>worker</summary>\n\nAdd support for Celery workers (see [Distributed runs with Celery](https://docs.freelabz.com/in-depth/distributed-runs-with-celery)).\n```sh\nsecator install addons worker\n```\n\n</details>\n\n\n<details>\n\t<summary>google</summary>\n\nAdd support for Google Drive exporter (`-o gdrive`).\n\n```sh\nsecator install addons google\n```\n\n</details>\n\n<details>\n\t<summary>mongodb</summary>\n\nAdd support for MongoDB driver (`-driver mongodb`).\n```sh\nsecator install addons mongodb\n```\n\n</details>\n\n<details>\n\t<summary>redis</summary>\n\nAdd support for Redis backend (Celery).\n\n```sh\nsecator install addons redis\n```\n\n</details>\n\n<details>\n\t<summary>dev</summary>\n\nAdd development tools like `coverage` and `flake8` required for running tests.\n\n```sh\nsecator install addons dev\n```\n\n</details>\n\n<details>\n\t<summary>trace</summary>\n\nAdd tracing tools like `memray` and `pyinstrument` required for tracing functions.\n\n```sh\nsecator install addons trace\n```\n\n</details>\n\n<details>\n\t<summary>build</summary>\n\nAdd `hatch` for building and publishing the PyPI package.\n\n```sh\nsecator install addons build\n```\n\n</details>\n\n\n### Install CVEs\n\n`secator` makes remote API calls to https://cve.circl.lu/ to get in-depth information about the CVEs it encounters.\nWe provide a subcommand to download all known CVEs locally so that future lookups are made from disk instead:\n```sh\nsecator install cves\n```\n\n### Checking installation health\n\nTo figure out which languages or tools are installed on your system (along with their version):\n```sh\nsecator health\n```\n\n## Usage\n```sh\nsecator --help\n```\n![](images/help.png)\n\n\n### Usage examples\n\nRun a fuzzing task (`ffuf`):\n\n```sh\nsecator x ffuf http://testphp.vulnweb.com/FUZZ\n```\n\nRun a url crawl workflow:\n\n```sh\nsecator w url_crawl http://testphp.vulnweb.com\n```\n\nRun a host scan:\n\n```sh\nsecator s host mydomain.com\n```\n\nand more... to list all tasks / workflows / scans that you can use:\n```sh\nsecator x --help\nsecator w --help\nsecator s --help\n```\n\n## Learn more\n\nTo go deeper with `secator`, check out:\n* Our complete [documentation](https://docs.freelabz.com)\n* Our getting started [tutorial video](https://youtu.be/-JmUTNWQDTQ?si=qpAClDWMXo2zwUK7)\n* Our [Medium post](https://medium.com/p/09333f3d3682)\n* Follow us on social media: [@freelabz](https://twitter.com/freelabz) on Twitter and [@FreeLabz](https://youtube.com/@FreeLabz) on YouTube\n\n## Stats\n\n<a href=\"https://star-history.com/#freelabz/secator&Date\">\n  <picture>\n    <source media=\"(prefers-color-scheme: dark)\" srcset=\"https://api.star-history.com/svg?repos=freelabz/secator&type=Date&theme=dark\" />\n    <source media=\"(prefers-color-scheme: light)\" srcset=\"https://api.star-history.com/svg?repos=freelabz/secator&type=Date\" />\n    <img alt=\"Star History Chart\" src=\"https://api.star-history.com/svg?repos=freelabz/secator&type=Date\" />\n  </picture>\n</a>\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "The pentester's swiss knife.",
    "version": "0.4.0",
    "project_urls": {
        "Homepage": "https://github.com/freelabz/secator",
        "Issues": "https://github.com/freelabz/secator/issues"
    },
    "split_keywords": [
        "automation",
        " cybersecurity",
        " pentest",
        " recon",
        " vulnerability"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "b21f02d2c0c78c4ae390f5be7e5e76725ce86c4e5b5d592dedefdb3644cb5e6f",
                "md5": "5dd6cd0bb352d108beda77cdff5904d8",
                "sha256": "4ace03132d834178ad327cd7bf665cfc61da2d6783aed8675ececcd7e1f92cfd"
            },
            "downloads": -1,
            "filename": "secator-0.4.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "5dd6cd0bb352d108beda77cdff5904d8",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 131067,
            "upload_time": "2024-04-29T16:53:20",
            "upload_time_iso_8601": "2024-04-29T16:53:20.661445Z",
            "url": "https://files.pythonhosted.org/packages/b2/1f/02d2c0c78c4ae390f5be7e5e76725ce86c4e5b5d592dedefdb3644cb5e6f/secator-0.4.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "30d1fd5703ef1384bcca81d65839cf1976ca512c06b8836247fe80f600eac4f6",
                "md5": "f29fb40d0d3d1f3fe2457ad84afe7df9",
                "sha256": "ad20897341924d6dda99b484c380f098107e1d222c795aebe21b452ee5a3324e"
            },
            "downloads": -1,
            "filename": "secator-0.4.0.tar.gz",
            "has_sig": false,
            "md5_digest": "f29fb40d0d3d1f3fe2457ad84afe7df9",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 35461328,
            "upload_time": "2024-04-29T16:53:24",
            "upload_time_iso_8601": "2024-04-29T16:53:24.018684Z",
            "url": "https://files.pythonhosted.org/packages/30/d1/fd5703ef1384bcca81d65839cf1976ca512c06b8836247fe80f600eac4f6/secator-0.4.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-29 16:53:24",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "freelabz",
    "github_project": "secator",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "secator"
}
        
Elapsed time: 0.28804s