CMetasploit


NameCMetasploit JSON
Version 0.0.2 PyPI version JSON
download
home_page
SummaryWelcome
upload_time2024-03-03 04:18:31
maintainer
docs_urlNone
authorAnkit
requires_python
licenseMIT
keywords cmetasploit
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            Welcome to the CMetasploit Module .

CMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .
                      ## ( Tools For Ethical Hackers ) ##

Some Features of CMetasploit are :

>> Bruteforce Attacks
>> WordList for Dictionary Attacks Generator
>> Dictionary Attacks
>> Servers Testers
>> Ping Testers 
>> Connectivity Testers

How To Use CMetasploit :

pip install CMetasploit


Change Log
================

0.0.1 (03/03/2024)
----------------------
- First Release

            

Raw data

            {
    "_id": null,
    "home_page": "",
    "name": "CMetasploit",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "CMetasploit",
    "author": "Ankit",
    "author_email": "codexstudiosltd@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/30/f4/df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a/CMetasploit-0.0.2.tar.gz",
    "platform": null,
    "description": "Welcome to the CMetasploit Module .\r\n\r\nCMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .\r\n                      ## ( Tools For Ethical Hackers ) ##\r\n\r\nSome Features of CMetasploit are :\r\n\r\n>> Bruteforce Attacks\r\n>> WordList for Dictionary Attacks Generator\r\n>> Dictionary Attacks\r\n>> Servers Testers\r\n>> Ping Testers \r\n>> Connectivity Testers\r\n\r\nHow To Use CMetasploit :\r\n\r\npip install CMetasploit\r\n\r\n\r\nChange Log\r\n================\r\n\r\n0.0.1 (03/03/2024)\r\n----------------------\r\n- First Release\r\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Welcome",
    "version": "0.0.2",
    "project_urls": null,
    "split_keywords": [
        "cmetasploit"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "30f4df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a",
                "md5": "b9dc82cb95ccdc85128e4d3d8d2d26de",
                "sha256": "52945ede9328fd118169d871ec4e88350b07b3ce4103d45dd2664cc9c5c44147"
            },
            "downloads": -1,
            "filename": "CMetasploit-0.0.2.tar.gz",
            "has_sig": false,
            "md5_digest": "b9dc82cb95ccdc85128e4d3d8d2d26de",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 4410,
            "upload_time": "2024-03-03T04:18:31",
            "upload_time_iso_8601": "2024-03-03T04:18:31.064410Z",
            "url": "https://files.pythonhosted.org/packages/30/f4/df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a/CMetasploit-0.0.2.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-03-03 04:18:31",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "cmetasploit"
}
        
Elapsed time: 0.39904s