Package: cpuminer-multi Version: 1.12.00 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 155 Depends: libc6 (>= 2.17), libcurl3 (>= 7.16.2), libjansson4 (>= 2.0.1) Filename: amd64/cpuminer-multi_1.12.00_amd64.deb Size: 61542 MD5sum: 7536167d0a3f4676d2f756f279563750 SHA1: 69af9ce15c19521789d75e7a963db22e2a9ed66d SHA256: a11b0d99f9c24d492466a6d70b61e172f67327546fbb0197f128c0d5e5796a1d Section: networking Priority: optional Description: cpuminer-multi This is a multi-threaded CPU miner . Package: leocad Version: 17.07 Architecture: amd64 Maintainer: Peter Bartfai Installed-Size: 1877 Depends: libc6 (>= 2.14), libgcc1 (>= 1:3.4), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 5.2), zlib1g (>= 1:1.1.4) Filename: amd64/leocad_17.07_amd64.deb Size: 789474 MD5sum: df3152f8015713438858f39a70865323 SHA1: 8bc8cff395cc9180329afa8de2cb3e3714bfb487 SHA256: 3b843798f1ea8790d9b5f2756969fdc3cc160c5115b73d72e0d85be5f5786a61 Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: leocad Version: 17.07 Architecture: i386 Maintainer: Peter Bartfai Installed-Size: 1808 Depends: libc6 (>= 2.4), libgcc1 (>= 1:3.4), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 5.2), zlib1g (>= 1:1.1.4) Filename: i386/leocad_17.07_i386.deb Size: 780770 MD5sum: 6faf27e85bbd5a48954003d00c40e309 SHA1: 09d12e8c5f475a590e8f02a42e5a8767d9c11b08 SHA256: 80a106f481dee7e306677a8ad14663ee3a93902f75d2cd3c0257fd6c37fcbaee Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: ncsdk Version: 1.12.00 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 360 Filename: amd64/ncsdk_1.12.00_amd64.deb Size: 52572 MD5sum: 7e9549bcc76dfd86e91234b88e5fd47f SHA1: 0a179676e90090e3c585c28041b3b524684a6dea SHA256: 7a0cdcb801ac0a13a31c82ace53cd3f2ce3c8b4339ee8d43e19aaef60e7edb65 Section: devel Priority: optional Description: ncsdk This Intel® Movidius™ Neural Compute software developer kit (NCSDK) is provided for users of the Intel® Movidius™ Neural Compute Stick (Intel® Movidius™ NCS). Package: owasp-zap Version: 2.14.0-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 241906 Recommends: openjdk-8-jre Filename: i386/owasp-zap_2.14.0-1_i386.deb Size: 195680788 MD5sum: 1ca2c86e29b18759f0d68ff980c5cfa9 SHA1: 288f0d267809e9ac6d31be4c686ef8559f3b7519 SHA256: 60fadb4cfaf83e4c2e90d6dabfc3cf95951bb3b3721c204ee1fb3b95a96b9602 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: x48 Version: 0.6.2 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 269 Depends: libc6 (>= 2.15), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: amd64/x48_0.6.2_amd64.deb Size: 86852 MD5sum: c81d5ecedaddfc6d8a7a46c962924af2 SHA1: e5d816d44c9fcb9ab94bfd58a860da6035f87bef SHA256: 8764b7057b210ea2fd4c19c63188b0e9a5a2e31a07ff3f91cc6e1dbebea7c0dd Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: x48 Version: 0.6.2 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 267 Depends: libc6 (>= 2.15), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: i386/x48_0.6.2_i386.deb Size: 84154 MD5sum: c12d10256ae8d4df1fd017ed077c6574 SHA1: 1d87ffc38a17dd0cfb5d698084b1e282c0686dfb SHA256: 8a45a58c730cacfbca5d8248a71f2db677eaed4fd9677886618266336502c598 Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: zap Version: 2.16.1-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 264222 Recommends: openjdk-17-jre Filename: i386/zap_2.16.1-1_i386.deb Size: 213856514 MD5sum: 076b8aad8c5bf50ba2bb6fc79e455500 SHA1: 56f0943c7b00a9d8c8444f979275f7361376f376 SHA256: 63fbe3f4c8c5289fe1be0d4716a0df37eb448a7ab71c446a27066405a5c50872 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: zap Version: 2.17.0-1 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) Installed-Size: 273330 Recommends: openjdk-17-jre Filename: amd64/zap_2.17.0-1_amd64.deb Size: 221278308 MD5sum: b4495202e9a4d0627e6dda1c67629704 SHA1: 2731230c1041e6dab7f92128a2d2d43acd688a92 SHA256: 2e338a7d10f6c16cd4fc75651e72fc24a074dc9fcc781335e994fa624e156b5a Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.