Ycarus Gentoo ebuild

spike

These ebuilds come from .

If you have some problems, go to the official site first.

net-wireless

aircrackgui-m4 : GUI frontend for aircrack-ng suite ( https://code.google.com/p/aircrackgui-m4/ )

b43-openfwwf : OpenBroadcom Firmware ( http://www.ing.unibs.it/openfwwf/ )

bluemaho : BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices ( http://wiki.thc.org/BlueMaho )

bt-audit : A small bluetooth audit suite ( http://www.betaversion.net/btdsd/ )

btscanner : A utility for bluetooth scanning and discovery ( http://www.pentest.co.uk/cgi-bin/viewcat.cgi?cat=downloads )

bully : A wifi-protected-setup (WPS) brute force attack tool, similar to reaver ( https://github.com/bdpurcell/bully )

cowpatty : WLAN tools for bruteforcing 802.11 WPA/WPA2 keys ( http://www.willhackforsushi.com/?page_id=50 )

crda : Central Regulatory Domain Agent for wireless networks ( http://wireless.kernel.org/en/developers/Regulatory )

desknfc : a KDE4 plasmoid which offer NFC content access ( https://github.com/nfc-tools )

dsd : Digital Speech Decoder ( https://github.com/szechyjs/dsd )

grimwepa : A password cracker for both WEP and WPA-encrypted access points ( http://code.google.com/p/grimwepa/ )

horst : Small 802.11 wireless LAN analyzer ( http://br1.einfach.org/tech/horst/ )

hostapd : IEEE 802.11 wireless LAN Host AP daemon ( http://hostap.epitest.fi )

karmetasploit : KARMA + Metasploit 3 == Karmetasploit ( http://dev.metasploit.com/redmine/projects/framework/wiki/Karmetasploit )

mana-toolkit : wifi rogue AP attacks and MitM ( https://github.com/sensepost/mana )

mdk : Bruteforce hidden SSID ( http://homepages.tu-darmstadt.de/~p_larbig/wlan/ )

mfoc : Mifare Classic Offline Cracker ( https://code.google.com/p/mfoc/ )

morse2txt : Morse code decoder ( http://morse2txt.sourceforge.net/ )

n4p : Configures network automatically to perform MITM, ARP, SSLstrip, WPA Cracking, and rogue AP attacks ( https://github.com/Cyb3r-Assassin )

pixiewps : Bruteforce offline the WPS pin exploiting the low or non-existing entropy ( https://github.com/wiire/pixiewps )

reaver : Brute force attack against Wifi Protected Setup ( http://code.google.com/p/reaver-wps/ )

reaver-wps-fork-t6x : Utilise Pixie Dust Attack to find the correct WPS PIN. ( https://github.com/t6x/reaver-wps-fork-t6x )

rfidler : command line rfid interface ( https://github.com/ApertureLabsLtd/RFIDler.git )

rfidtool : command line rfid interface ( http://www.bindshell.net/tools/rfidtool )

sdrsharp : simple, intuitive, small and fast DSP application for SDR ( http://sdrsharp.com/ )

virtualradar-bin : Open-source .NET application for ads-b mapping ( http://www.virtualradarserver.co.uk/Default.aspx )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a spike

For Paludis use this rsync : rsync://gentoo.zugaina.org/spike-portage

If you have a problem : ycarus(-at-)zugaina.org