# This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # pixiewps/ # pixiewps/distinfo # pixiewps/pkg-descr # pixiewps/Makefile # pixiewps/pkg-plist # echo c - pixiewps/ mkdir -p pixiewps/ > /dev/null 2>&1 echo x - pixiewps/distinfo sed 's/^X//' >pixiewps/distinfo << '51df0194dfc3c218d14e31251af5721f' XSHA256 (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 16b65e4fc376b3812135f83b450c9e286ef12c872ac91b048710e3e442d44e75 XSIZE (wiire-pixiewps-1.1-08a78c3c_GH0.tar.gz) = 28836 51df0194dfc3c218d14e31251af5721f echo x - pixiewps/pkg-descr sed 's/^X//' >pixiewps/pkg-descr << '5d21dc1be62d5fc6b47ef5fb17b89ee8' XPixiewps is a tool written in C used to bruteforce offline the WPS pin Xexploiting the low or non-existing entropy of some APs (pixie dust attack). XIt is meant for educational purposes only. XAll credits for the research go to Dominique Bongard. 5d21dc1be62d5fc6b47ef5fb17b89ee8 echo x - pixiewps/Makefile sed 's/^X//' >pixiewps/Makefile << '693465c28f5059dcc63ec5dc1b3ce806' X# $FreeBSD$ X XPORTNAME=pixiewps XPORTVERSION=1.1 XCATEGORIES=security XMASTER_SITES=https://github.com/wiire/pixiewps/ X XMAINTAINER=franz@bett.ag XCOMMENT=Offline WPS bruteforce utility X XLICENSE= GPLv3 X XUSE_GITHUB= yes XGH_ACCOUNT= wiire XGH_PROJECT= pixiewps XGH_TAGNAME= 08a78c3c X XUSES= gmake XWRKSRC_SUBDIR= src/ X XPLIST_FIlES= bin/pixiewps X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin X X.include 693465c28f5059dcc63ec5dc1b3ce806 echo x - pixiewps/pkg-plist sed 's/^X//' >pixiewps/pkg-plist << 'b2f539d7aee30e390f0eebb66221e644' Xbin/pixiewps b2f539d7aee30e390f0eebb66221e644 exit