Source: evil-winrm-py
Section: python
Priority: optional
Maintainer: Parrot Team <team@parrotsec.org>
Uploaders: Maysec <155771205+MaycoSec@users.noreply.github.com>
Rules-Requires-Root: no
Build-Depends:
 debhelper-compat (= 13),
 dh-sequence-python3,
 python3-setuptools,
 python3-all,
Standards-Version: 4.6.2
Homepage: https://github.com/adityatelange/evil-winrm-py
Vcs-Git: https://gitlab.com/parrotsec/packages/evil-winrm-py.git
Vcs-Browser: https://gitlab.com/parrotsec/packages/evil-winrm-py

Package: evil-winrm-py
Architecture: all
Depends:
 ${python3:Depends},
 ${misc:Depends},
 libkrb5-dev,
 krb5-pkinit,
 python3-krb5,
 python3-gssapi,
Suggests: krb5-user
Description: Execute commands interactively on remote Windows machines using WinRM
 evil-winrm-py is a python-based tool for executing commands on remote Windows 
 machines using the WinRM (Windows Remote Management) protocol. It provides an 
 interactive shell with enhanced features like file upload/download, command 
 history, and colorized output. It supports various authentication methods 
 including NTLM, Pass-the-Hash, Certificate, and Kerberos.
