-
Notifications
You must be signed in to change notification settings - Fork 0
/
setup.cfg
48 lines (46 loc) · 1.57 KB
/
setup.cfg
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
[metadata]
name = shell_exploit_umbraco
version = 0.0.1
author = Maurice Lambert
author_email = [email protected]
maintainer = Maurice Lambert
maintainer_email = [email protected]
description = This module implements a shell to exploit a RCE in umbraco CMS.
long_description = file: README.md
long_description_content_type = text/markdown
url = https://github.com/mauricelambert/Shell-Exploit-Umbraco
project_urls = Github=https://github.com/mauricelambert/Shell-Exploit-Umbraco
classifiers =
Topic :: System
Topic :: Security
Environment :: Console
Topic :: System :: Shells
Operating System :: POSIX
Natural Language :: English
Topic :: System :: Networking
Topic :: Internet :: WWW/HTTP
Programming Language :: Python
Intended Audience :: Developers
Topic :: System :: System Shells
Operating System :: MacOS :: MacOS X
Programming Language :: Python :: 3.8
Operating System :: Microsoft :: Windows
Topic :: System :: Systems Administration
Development Status :: 5 - Production/Stable
Intended Audience :: System Administrators
License :: OSI Approved :: GNU General Public License v3 or later (GPLv3+)
keywords = exploit, umbraco, rce, shell, HackTheBox, python3, web
platforms = Windows, Linux, MacOS
license = GPL-3.0 License
license_files = LICENSE.txt
# requires =
[options]
include_package_data = True
python_requires = >=3.8
scripts =
packages =
py_modules = exploit_shell_umbraco, exploit_umbraco
install_requires =
[egg_info]
tag_build =
tag_date = 0