Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA and OpenCL, it is currently by far the most powerful attack against one of the world's most used security-protocols.
27 lines
847 B
Text
27 lines
847 B
Text
@comment $NetBSD: PLIST,v 1.1 2013/05/24 04:17:19 othyro Exp $
|
|
bin/pyrit
|
|
${PYSITELIB}/cpyrit/__init__.py
|
|
${PYSITELIB}/cpyrit/__init__.pyc
|
|
${PYSITELIB}/cpyrit/__init__.pyo
|
|
${PYSITELIB}/cpyrit/_cpyrit_cpu.so
|
|
${PYSITELIB}/cpyrit/config.py
|
|
${PYSITELIB}/cpyrit/config.pyc
|
|
${PYSITELIB}/cpyrit/config.pyo
|
|
${PYSITELIB}/cpyrit/cpyrit.py
|
|
${PYSITELIB}/cpyrit/cpyrit.pyc
|
|
${PYSITELIB}/cpyrit/cpyrit.pyo
|
|
${PYSITELIB}/cpyrit/network.py
|
|
${PYSITELIB}/cpyrit/network.pyc
|
|
${PYSITELIB}/cpyrit/network.pyo
|
|
${PYSITELIB}/cpyrit/pckttools.py
|
|
${PYSITELIB}/cpyrit/pckttools.pyc
|
|
${PYSITELIB}/cpyrit/pckttools.pyo
|
|
${PYSITELIB}/cpyrit/storage.py
|
|
${PYSITELIB}/cpyrit/storage.pyc
|
|
${PYSITELIB}/cpyrit/storage.pyo
|
|
${PYSITELIB}/cpyrit/util.py
|
|
${PYSITELIB}/cpyrit/util.pyc
|
|
${PYSITELIB}/cpyrit/util.pyo
|
|
${PYSITELIB}/pyrit_cli.py
|
|
${PYSITELIB}/pyrit_cli.pyc
|
|
${PYSITELIB}/pyrit_cli.pyo
|