Source: eaphammer
Section: net
Priority: optional
Maintainer: Kali Developers <devel@kali.org>
Uploaders: Sophie Brun <sophie@offensive-security.com>
Build-Depends: ca-certificates,
               debhelper-compat (= 13),
               dh-python,
               libcurl4-openssl-dev,
               libnfnetlink-dev,
               libnl-3-dev,
               libnl-genl-3-dev,
               libpcap-dev,
               python3,
               wget,
               zlib1g-dev
Standards-Version: 4.6.2
Homepage: https://github.com/s0lst1c3/eaphammer
Vcs-Browser: https://gitlab.com/kalilinux/packages/eaphammer
Vcs-Git: https://gitlab.com/kalilinux/packages/eaphammer.git
Rules-Requires-Root: no

Package: eaphammer
Architecture: any
Depends: apache2,
         asleap,
         dnsmasq,
         hcxdumptool,
         hcxtools,
         iptables,
         python3-bs4,
         python3-flask-cors,
         python3-flask-socketio,
         python3-gevent,
         python3-gevent-websocket,
         python3-jinja2,
         python3-lxml,
         python3-openssl,
         python3-pem,
         python3-pyquery,
         python3-pywebcopy,
         python3-scapy,
         python3-tqdm,
         python3:any,
         responder,
         seclists,
         ${misc:Depends},
         ${python3:Depends},
         ${shlibs:Depends}
Description: toolkit for targeted evil twin attacks against WPA2-Enterprise networks
 This package contains a toolkit for performing targeted evil twin attacks
 against WPA2-Enterprise networks. It is designed to be used in full scope
 wireless assessments and red team engagements. As such, focus is placed on
 providing an easy-to-use interface that can be leveraged to execute powerful
 wireless attacks with minimal manual configuration. To illustrate just how
 fast this tool is, the Quick Start section provides an example of how to
 execute a credential stealing evil twin attack against a WPA/2-EAP network in
 just commands.
