gwee (Generic Web Exploitation Engine) is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. WWW: http://tigerteam.se/dl/gwee/ ='Atom feed' href='http://tfcis.org/~lantw44/cgit/cgit.cgi/freebsd-ports-gnome/atom/lang/python-doc-html?h=mate-1.18' type='application/atom+xml'/>
aboutsummaryrefslogtreecommitdiffstats
path: root/lang/python-doc-html
Commit message (Expand)AuthorAgeFilesLines
* - Make Python 2.5.1 the default Python versionalexbl2007-07-301-0/+17
* Update to Python 2.4.4.delphij2007-02-141-0/+15
* Add checksums for Python 2.5 documents.perky2006-10-101-0/+15
* Add new size and checksums for Python 2.4.3perky2006-04-021-0/+15
* SHA256-ify (approved by krion@)edwin2006-02-011-69/+241
* eplace ugly "@unexec rmdir %D... 2>/dev/null || true" with @dirrmtryedwin2006-01-226-6/+6
* - Update to Python 2.4.2. [1]perky2005-10-021-0/+5
* Add new checksums for 2.4.1 and unbreak port.perky2005-04-112-2/+5
* BROKEN: Incorrect distinfokris2005-04-111-0/+2
* Add checksums for 2.4 documents.perky2004-12-021-0/+5
* Update to 2.3.4.perky2004-05-271-0/+5
* Use the SORT macro from bsd.port.mk.trevor2004-01-221-2/+3
* - Update to Python-2.3.3perky2003-12-20