Package: cpuminer-multi Version: 1.12.00 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 175 Depends: libc6 (>= 2.17), libcurl3 (>= 7.16.2), libjansson4 (>= 2.0.1) Filename: amd64/cpuminer-multi_1.12.00_amd64.deb Size: 57968 MD5sum: 3aa549ab16f6b0339024a6bbc9ebcfa9 SHA1: 159711de53dde6d3fd83c414c7199f681ac01155 SHA256: 31741e203abf7c73381379d154f3ea8c38bd7fed37ab347b2056c8370996e6ff Section: networking Priority: optional Description: cpuminer-multi This is a multi-threaded CPU miner . Package: leocad Version: 17.07 Architecture: amd64 Maintainer: Peter Bartfai Installed-Size: 1842 Depends: libc6 (>= 2.14), libgcc1 (>= 1:4.1.1), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 4.9), zlib1g (>= 1:1.1.4) Filename: amd64/leocad_17.07_amd64.deb Size: 773460 MD5sum: 897e2276f2213585ce9387f51829d6d1 SHA1: 7a7651b8d9440e68468afeb468911ef5fdc31bea SHA256: 6712daed42c613f3d849ba35e1a13b97df88c58c678410a8a8bd7e54b6254a06 Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: leocad Version: 17.07 Architecture: i386 Maintainer: Peter Bartfai Installed-Size: 1769 Depends: libc6 (>= 2.3.6-6~), libgcc1 (>= 1:4.1.1), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 4.9), zlib1g (>= 1:1.1.4) Filename: i386/leocad_17.07_i386.deb Size: 760730 MD5sum: 5236eff4faf4e3b618472c774dc0dc63 SHA1: 054b7c6351bd38a0f969b23a011d08b98b87d8ee SHA256: bffb8b5079353066ef92542183ba294493a80e7e0a5ae4e94c8696c0b936cd4a Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: ncsdk Version: 1.12.00 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 380 Filename: amd64/ncsdk_1.12.00_amd64.deb Size: 52544 MD5sum: 1dbe1427663d6a705f47d6847a04a1c4 SHA1: 6055f20ace2b6b02d008309f2747f9d6c57e738d SHA256: 7d0073c24af2477003feb06420bdf16d0fe1d8510e2528d9eb6cf795f4c6babe Section: devel Priority: optional Description: ncsdk This Intel® Movidius™ Neural Compute software developer kit (NCSDK) is provided for users of the Intel® Movidius™ Neural Compute Stick (Intel® Movidius™ NCS). Package: owasp-zap Version: 2.14.0-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 241917 Recommends: openjdk-8-jre Filename: i386/owasp-zap_2.14.0-1_i386.deb Size: 196647194 MD5sum: 24f75fc0d1ddb280c9c15b243e4901ab SHA1: 96398ba3acccca586a10f71a54a5d485fae181f3 SHA256: c939b7dfa304a348a69cf46afa75042859e647aedea19706f99a0742efa7c4c9 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: x48 Version: 0.6.2 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 281 Depends: libc6 (>= 2.14), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: amd64/x48_0.6.2_amd64.deb Size: 85932 MD5sum: 60b3920861aa926891aba7192321a556 SHA1: 6bab0700e50cabbf6cb0847f0fbecf0a735a2f4f SHA256: c01970dc01db586bc9c7a19b42fb38bacb918727c487839b88a2852eeda6d584 Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: x48 Version: 0.6.2 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 284 Depends: libc6 (>= 2.7), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: i386/x48_0.6.2_i386.deb Size: 82756 MD5sum: d80920b1c79cc5fb2c683df2b0f38462 SHA1: ba82f2365d2587c8c41a10505ae07d8633edadde SHA256: f8cd3915648a07f8a346d491ee6dc1b449bfe44cd82b8928f5a0ac76b4f27655 Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: zap Version: 2.16.1-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 264236 Recommends: openjdk-17-jre Filename: i386/zap_2.16.1-1_i386.deb Size: 213835738 MD5sum: 6bad12c5d109113d167302f03c8f7e57 SHA1: e7f3d4319b6253cc7319cf2016104ec4a97e3cd7 SHA256: 4d4e84d6c547f84f2239918af43ebd4a250bcfffc5f408c7fc7043bc043c1a28 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: zap Version: 2.17.0-1 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 273342 Recommends: openjdk-17-jre Filename: amd64/zap_2.17.0-1_amd64.deb Size: 221323212 MD5sum: 2f596cb65db89afb004234741d8103ba SHA1: 45a875d014c732c2f980e0d3e8e9d0ab7557b85e SHA256: 3fcff92e473d1e7561ef3f88e5c5b8ac5caf11dda2d97e0f5eabf6401f8594f9 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.