Source: redsnarf
Section: misc
Priority: optional
Maintainer: Kali Developers <devel@kali.org>
Uploaders: Sophie Brun <sophie@offensive-security.com>,
           Arnaud Rebillout <arnaudr@kali.org>,
Build-Depends:
 bash-completion,
 debhelper-compat (= 13),
Standards-Version: 4.7.0
Homepage: https://github.com/nccgroup/redsnarf
Vcs-Git: https://gitlab.com/kalilinux/packages/redsnarf.git
Vcs-Browser: https://gitlab.com/kalilinux/packages/redsnarf

Package: redsnarf
Architecture: all
Depends:
 creddump7,
 passing-the-hash,
 python3-docopt,
 python3-impacket,
 python3-ipy,
 python3-ldap,
 python3-libnmap,
 python3-netaddr,
 python3-pycryptodome,
 python3-pyuserinput,
 python3-smb,
 python3-termcolor,
 python3-wget,
 ${misc:Depends},
 ${shlibs:Depends},
Description: Pentesting tool for retrieving credentials from Windows workstations
 This package contains a pentesting / redteaming tool by Ed Williams for
 retrieving hashes and credentials from Windows workstations, servers and domain
 controllers using OpSec Safe Techniques.  RedSnarf functionality includes:
   * Retrieval of local SAM hashes
   * Enumeration of user/s running with elevated system privileges and their
     corresponding lsa secrets password;
   * Retrieval of MS cached credentials;
   * Pass-the-hash;
   * Quickly identify weak and guessable username/password combinations
     (default of administrator/Password01);
   * The ability to retrieve hashes across a range;
   * Hash spraying
