Source: evil-ssdp
Section: net
Priority: optional
Maintainer: Lorenzo "Palinuro" Faletra <palinuro@parrotsec.org>
Uploaders: Lorenzo "Palinuro" Faletra <palinuro@parrotsec.org>
Build-Depends: debhelper-compat (= 13), dh-python, python3
Standards-Version: 4.5.1
Homepage: https://github.com/initstring/evil-ssdp

Package: evil-ssdp
Architecture: all
Depends: ${misc:Depends}, ${python3:Depends}, ${shlibs:Depends}
Description: Spoof SSDP replies to phish for NTLM hashes on a network
 This tool responds to SSDP multicast discover requests, posing as a generic
 UPNP device on a local network. Your spoofed device will magically appear in
 Windows Explorer on machines in your local network. Users who are tempted to
 open the device are shown a configurable webpage.
