credslayer-0.1.2-8.red80> K KtĉH2!c31^ Wgeosupport@red-soft.ru  WgAvJȮHʂA#.PNCicJ£i[Y}W72Ӂ/<z.XCU6g#>QOnFܶ(;>Hۯi mVM?G5-ET.m<$3yT BXUrEzo=z1/ S"9 Ti{U b6\qlO:(>PsL2pLaвѧ1-xn?ev>DN@, ''78e1065c864739d8e7e8caf11836aea288f6634480540a66f15305698a0317b68070a57a991d0e5dbc7e8063da8b44da8fe69caf G@PO;5:>=1?!d   WPTlpy     ! $(-2TXd|(38<9@:tGHIXY\]^bd,e1f6l9tTuXv\wxyCcredslayer0.1.28.red80Extract credentials and other details from network capturesCredSLayer goal is to look for credentials and other useful stuff in network captures. Two modes are available, pcap scanning and active processing. The latest listens for packets on a chosen interface and dynamically extracts everything it can.cstapel80.red-soft.ruRED SOFTRED SOFTGPLv3RED SOFTUnspecifiedhttps://github.com/ShellCode33/CredSLayerlinuxnoarch́c795986d43099ac4bbda622b573aed14d85ef0e4f25db3f01fd8954eb1dd3131erootrootcredslayer-0.1.2-8.red80.src.rpmcredslayer@    /usr/bin/python3python3-credslayerrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)0.1.2-8.red803.0.4-14.6.0-14.0-15.4.18-14.18.0cAnton Fadeev - 0:0.1.2-8- Initial build0.1.2-8.red80credslayer/usr/bin/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19noarch-redhat-linux-gnuPython script, ASCII text executableRutf-8fc5feb74971d7539c180cced7563a0340db212661803146302e341b8672b7cad640069fc8b0167de6e9a07bc5988d1f1e5e123666fbd2f52b7a99632fcdc405b?0(/hm]]'\KWb&wJ3Xa";jYLMg+|Uz%Mbq+=0L* GC qP(eahD$pZ5e 4orzI=ڵ"p$ICb qaG|>/-Aj^Ƭ;6F瞚w@ `,/uw:Wbפ v8ߜ{kL;M 1!й]YSĠ7M2ۈۈcn#jgQq-YSsZubnd8Ţ"L" 8}~nz o>T$Pl|p<JsȽBD71)_&1l=;$Usz &K Th!``)\]O. P3^`c2 l` !82`w6Y X@Ѝ Sf8QT *V tnL "k4J 5s\oF4LN U1