Name | CMetasploit JSON |
Version |
0.0.2
JSON |
| download |
home_page | |
Summary | Welcome |
upload_time | 2024-03-03 04:18:31 |
maintainer | |
docs_url | None |
author | Ankit |
requires_python | |
license | MIT |
keywords |
cmetasploit
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
Welcome to the CMetasploit Module .
CMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .
## ( Tools For Ethical Hackers ) ##
Some Features of CMetasploit are :
>> Bruteforce Attacks
>> WordList for Dictionary Attacks Generator
>> Dictionary Attacks
>> Servers Testers
>> Ping Testers
>> Connectivity Testers
How To Use CMetasploit :
pip install CMetasploit
Change Log
================
0.0.1 (03/03/2024)
----------------------
- First Release
Raw data
{
"_id": null,
"home_page": "",
"name": "CMetasploit",
"maintainer": "",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "CMetasploit",
"author": "Ankit",
"author_email": "codexstudiosltd@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/30/f4/df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a/CMetasploit-0.0.2.tar.gz",
"platform": null,
"description": "Welcome to the CMetasploit Module .\r\n\r\nCMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .\r\n ## ( Tools For Ethical Hackers ) ##\r\n\r\nSome Features of CMetasploit are :\r\n\r\n>> Bruteforce Attacks\r\n>> WordList for Dictionary Attacks Generator\r\n>> Dictionary Attacks\r\n>> Servers Testers\r\n>> Ping Testers \r\n>> Connectivity Testers\r\n\r\nHow To Use CMetasploit :\r\n\r\npip install CMetasploit\r\n\r\n\r\nChange Log\r\n================\r\n\r\n0.0.1 (03/03/2024)\r\n----------------------\r\n- First Release\r\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Welcome",
"version": "0.0.2",
"project_urls": null,
"split_keywords": [
"cmetasploit"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "30f4df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a",
"md5": "b9dc82cb95ccdc85128e4d3d8d2d26de",
"sha256": "52945ede9328fd118169d871ec4e88350b07b3ce4103d45dd2664cc9c5c44147"
},
"downloads": -1,
"filename": "CMetasploit-0.0.2.tar.gz",
"has_sig": false,
"md5_digest": "b9dc82cb95ccdc85128e4d3d8d2d26de",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 4410,
"upload_time": "2024-03-03T04:18:31",
"upload_time_iso_8601": "2024-03-03T04:18:31.064410Z",
"url": "https://files.pythonhosted.org/packages/30/f4/df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a/CMetasploit-0.0.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-03-03 04:18:31",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "cmetasploit"
}