cewl 5.5.2-1 source package in Ubuntu


cewl (5.5.2-1) unstable; urgency=medium

  * New upstream version 5.5.2.
  * debian/control: bumped Standards-Version to 4.5.1.
  * debian/copyright:
      - Added a new block for debian/manpage/create-man.sh.
      - Updated upstream and packaging copyright years.
  * debian/manpage/:
      - Switched genallman.sh to create-man.sh (from txt2man).
      - Updated the manpages.
  * debian/patches/:
      - Added leading zero to each patch name.
      - 020_fix-lib-location.patch: updated to make it compliant with the new
        upstream release.
  * debian/tests/control: set the last test as skippable.
  * debian/watch: updated the search rule to make it compliant with new
    standards of the GitHub.

 -- Joao Eriberto Mota Filho <email address hidden>  Sun, 15 Aug 2021 08:56:27 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Original maintainer:
Debian Security Tools
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Kinetic release universe misc
Jammy release universe misc


Jammy: [FULLYBUILT] amd64


File Size SHA-256 Checksum
cewl_5.5.2-1.dsc 1.9 KiB 77845c033fb8f0eb27c4485f333e9556474d4f1257445fca56244f51d60f2d1c
cewl_5.5.2.orig.tar.gz 15.9 KiB 6c4ffba43dab33cfee18a89a7dd3ba3c57aa667387215f4aa54d4560ebfed134
cewl_5.5.2-1.debian.tar.xz 11.4 KiB 405ef2987462c163c6123b868ef43ef4467370d96798612db2fc6a335a5892bc

Available diffs

No changes file available.

Binary packages built by this source

cewl: custom word list generator

 CeWL (Custom Word List generator) is a ruby app which spiders
 a given URL, up to a specified depth, and returns a list of
 words which can then be used for password crackers such as John
 the Ripper. Optionally, CeWL can follow external links.
 CeWL can also create a list of email addresses found in mailto
 links. These email addresses can be used as usernames in brute
 force actions.
 Another tool provided by CeWL project is FAB (Files Already
 Bagged). FAB extracts the content of the author/creator fields,
 from metadata of the some files, to create lists of possible
 usernames. These usernames can be used in association with the
 password list generated by CeWL. FAB uses the same metadata
 extraction techniques that CeWL. Currently, FAB process Office
 pre 2007, Office 2007 and PDF formats.
 CeWL is useful in security tests and forensics investigations.
 CeWL is pronounced "cool".