GET /api/v1/ports/reaver/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "name": "reaver",
    "portdir": "security/reaver",
    "version": "1.6.6",
    "license": "GPL-2+",
    "platforms": "darwin",
    "epoch": 0,
    "replaced_by": null,
    "homepage": "https://github.com/t6x/reaver-wps-fork-t6x",
    "description": "Brute-force attack against Wi-Fi Protected Setup",
    "long_description": "Reaver implements a brute-force attack against Wi-Fi Protected Setup which can crack the WPS PIN of a wireless access point in a matter of hours and subsequently recover the WPA/WPA2 passphrase. Reaver includes Wash, a utility for identifying potentially vulnerable access points.",
    "active": true,
    "categories": [
        "net",
        "security"
    ],
    "maintainers": [
        {
            "name": "ryandesign",
            "github": "ryandesign",
            "ports_count": 1822
        }
    ],
    "variants": [
        "universal"
    ],
    "dependencies": [
        {
            "type": "build",
            "ports": [
                "clang-9.0"
            ]
        },
        {
            "type": "extract",
            "ports": [
                "xz"
            ]
        },
        {
            "type": "lib",
            "ports": [
                "libpcap"
            ]
        },
        {
            "type": "run",
            "ports": [
                "aircrack-ng"
            ]
        }
    ],
    "depends_on": []
}