Go
Register
|
Log in
Subscribe
bully
Implementation of the WPS brute force attack, written in C
×
Choose email to subscribe with
general
source:
bully
(
main
)
version:
1.4.00-2
maintainer:
Debian Security Tools
(
DMD
)
uploaders:
Karthik
[
DMD
]
arch:
any
std-ver:
4.6.0
VCS:
Git
(
Browse
,
QA
)
versions
[more versions can be listed by madison]
[old versions available from snapshot.debian.org]
[pool directory]
stable:
1.4.00-1
testing:
1.4.00-2
unstable:
1.4.00-2
versioned links
1.4.00-1:
[.dsc, use dget on this link to retrieve source package]
[changelog]
[copyright]
[rules]
[control]
1.4.00-2:
[.dsc, use dget on this link to retrieve source package]
[changelog]
[copyright]
[rules]
[control]
binaries
bully
action needed
lintian reports
1 warning
normal
Lintian reports
1 warning
about this package. You should make the package
lintian clean
getting rid of them.
Standards version of the package is outdated.
wishlist
The package should be updated to follow the last version of
Debian Policy
(Standards-Version
4.6.1
instead of
4.6.0
).
news
[rss feed]
[
2022-04-05
]
bully 1.4.00-2 MIGRATED to testing
(
Debian testing watch
)
[
2022-04-05
]
bully 1.4.00-2 MIGRATED to testing
(
Debian testing watch
)
[
2022-03-30
]
Accepted bully 1.4.00-2 (source) into unstable
(
Samuel Henrique
)
[
2020-10-22
]
bully 1.4.00-1 MIGRATED to testing
(
Debian testing watch
)
[
2020-10-16
]
Accepted bully 1.4.00-1 (source amd64) into unstable, unstable
(
Debian FTP Masters
)
(signed by:
Unit 193
)
bugs
[bug history graph]
all:
0
links
homepage
lintian
(
0
,
1
)
buildd:
logs
,
clang
,
reproducibility
,
cross
popcon
browse source code
edit tags
other distros
screenshots
ubuntu
[Information about Ubuntu for Debian Developers]
version:
1.4.00-2