GET /api/v1/ports/reaver/
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"name": "reaver",
"portdir": "security/reaver",
"version": "1.6.6",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/t6x/reaver-wps-fork-t6x",
"description": "Brute-force attack against Wi-Fi Protected Setup",
"long_description": "Reaver implements a brute-force attack against Wi-Fi Protected Setup which can crack the WPS PIN of a wireless access point in a matter of hours and subsequently recover the WPA/WPA2 passphrase. Reaver includes Wash, a utility for identifying potentially vulnerable access points.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 1822
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"libpcap"
]
},
{
"type": "run",
"ports": [
"aircrack-ng"
]
}
],
"depends_on": []
}