Commit 641bf5db authored by Devon Kearns's avatar Devon Kearns

Test build

parent d7a8a296
linux-exploit-suggester (0.6-1) unstable; urgency=low
linux-exploit-suggester (0.6-1kali0) kali; urgency=low
* Initial release (Closes: #nnnn) <nnnn is the bug number of your ITP>
* Initial release (Closes: 0000551)
-- Devon Kearns <dookie@localhost.localdomain> Wed, 28 Aug 2013 11:06:54 -0600
-- Devon Kearns <dookie@kali.org> Wed, 28 Aug 2013 11:06:54 -0600
Source: linux-exploit-suggester
Section: unknown
Section: utils
Priority: extra
Maintainer: Devon Kearns <dookie@localhost.localdomain>
Maintainer: Devon Kearns <dookie@kali.org>
Build-Depends: debhelper (>= 8.0.0)
Standards-Version: 3.9.3
Homepage: <insert the upstream URL, if relevant>
#Vcs-Git: git://git.debian.org/collab-maint/linux-exploit-suggester.git
#Vcs-Browser: http://git.debian.org/?p=collab-maint/linux-exploit-suggester.git;a=summary
Homepage: http://penturalabs.wordpress.com/2013/08/26/linux-exploit-suggester/
Vcs-Git: ssh://git@git.kali.org/packages/linux-exploit-suggester.git
Vcs-Browser: http://git.kali.org/gitweb?p=packages/linux-exploit-suggester.git;a=summary
Package: linux-exploit-suggester
Architecture: all
Depends: ${misc:Depends}
Description: <insert up to 60 chars description>
<insert long description, indented with spaces>
Description: Script to keep track of vulnerabilities and suggest possible exploits
Linux Exploit Suggester; based on operating system release number.
.
This program run without arguments will perform a 'uname -r' to grab the Linux
Operating Systems release version, and return a suggestive list of possible
exploits. Nothing fancy, so a patched/back-ported patch may fool this script.
.
Additionally possible to provide '-k' flag to manually enter the Kernel
Version/Operating System Release Version.
.
This script has been extremely useful on site and in exams. Now Open-sourced
under GPLv2.
Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: linux-exploit-suggester
Source: <url://example.com>
Source: https://github.com/PenturaLabs/Linux_Exploit_Suggester
Files: *
Copyright: <years> <put author's name and email here>
<years> <likewise for another author>
License: <special license>
<Put the license of the package here indented by 1 space>
<This follows the format of Description: lines in control file>
Copyright: 2009 Andy
License: GPL-2+
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
.
<Including paragraphs>
On Debian systems, the complete text of the GNU General
Public License version 2 can be found in "/usr/share/common-licenses/GPL-2".
# If you want to use GPL v2 or later for the /debian/* files use
# the following clauses, or change it to suit. Delete these two lines
Files: debian/*
Copyright: 2013 Devon Kearns <dookie@localhost.localdomain>
Copyright: 2013 Devon Kearns <dookie@kali.org>
License: GPL-2+
This package is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
......@@ -31,8 +39,3 @@ License: GPL-2+
.
On Debian systems, the complete text of the GNU General
Public License version 2 can be found in "/usr/share/common-licenses/GPL-2".
# Please also look if there are files or directories which have a
# different copyright/license attached and list them here.
# Please avoid to pick license terms that are more restrictive than the
# packaged work, as it may make Debian's contributions unacceptable upstream.
usr/bin
usr/share/linux-exploit-suggester
debian/helper-script/* usr/bin/
Linux_Exploit_Suggester.pl usr/share/linux-exploit-suggester/
README.md usr/share/linux-exploit-suggester/
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment