Package: leocad Version: 17.07 Architecture: amd64 Maintainer: Peter Bartfai <pbartfai@stardust.hu> Installed-Size: 1850 Depends: libc6 (>= 2.14), libgcc1 (>= 1:4.1.1), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 4.5), zlib1g (>= 1:1.1.4) Filename: amd64/leocad_17.07_amd64.deb Size: 762368 MD5sum: db5cb845a5281e0977e48651bbfa5b49 SHA1: 0dc324883578060665e7de8047bb5953f5925df2 SHA256: 1e4467ab93fb1dfb2f4fcb375fd8042b234f6f89e72eed4384cffb025a6c982e Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: leocad Version: 17.07 Architecture: i386 Maintainer: Peter Bartfai <pbartfai@stardust.hu> Installed-Size: 1776 Depends: libc6 (>= 2.4), libgcc1 (>= 1:4.1.1), libgl1-mesa-glx | libgl1, libqt4-network (>= 4:4.5.3), libqt4-opengl (>= 4:4.5.3), libqt4-xml (>= 4:4.5.3), libqtcore4 (>= 4:4.8.0), libqtgui4 (>= 4:4.8.0), libstdc++6 (>= 4.5), zlib1g (>= 1:1.1.4) Filename: i386/leocad_17.07_i386.deb Size: 731124 MD5sum: 5525e4b213c4ed06ca2c189dbf118a49 SHA1: 485961e35ebc63836bb9a42ed2f9633d3b4c6764 SHA256: 5711a2f5f69938aaf9bd24645e4d04f29009ad608e551c6c87a11e9908937dd5 Section: graphics Priority: optional Homepage: http://www.leocad.org Description: leocad LeoCAD is a CAD program for creating virtual LEGO models. Package: owasp-zap Version: 2.14.0-1 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 241925 Recommends: openjdk-8-jre Filename: amd64/owasp-zap_2.14.0-1_amd64.deb Size: 196481760 MD5sum: d4c9855ab90f53f881978804eddf092a SHA1: e2bbe1a4afbc95668d9c2775a86a87fd988bd8f8 SHA256: f57d5d89d2bbe9fa52ca7fa85d0f04f8661005ed1c30d7b3a3788bf532a214fa Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: owasp-zap Version: 2.14.0-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 241917 Recommends: openjdk-8-jre Filename: i386/owasp-zap_2.14.0-1_i386.deb Size: 196091544 MD5sum: fd85b19f6526c40bdaa7004103a75499 SHA1: dbf3ae2fbf28fd66daec972201d6594b5311d8d4 SHA256: 946c6265c7aa50a437f9b7469f90d8ae92d684e12f87cee0ba9b077e8dc4239a Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: x48 Version: 0.6.2 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 288 Depends: libc6 (>= 2.15), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: amd64/x48_0.6.2_amd64.deb Size: 85726 MD5sum: c5f5f74232a44c968fa8df167dc593f4 SHA1: b85c5c6e6a31ac68bca6ce78eac3bb0446f41b2b SHA256: d7ea00c47acee2d04508b26e2e7136a6c58cb6c5c611f8a4877f592058d1e2d5 Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: x48 Version: 0.6.2 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 266 Depends: libc6 (>= 2.15), libreadline6 (>= 6.0), libx11-6, libxext6 Filename: i386/x48_0.6.2_i386.deb Size: 76982 MD5sum: fe45934a8bdf0936ff5d6a4acb2fbd54 SHA1: 3100c5bf8e8fefdfd9ca12b09587caeeda68fd98 SHA256: ff75e9aef36c287cab50e3dc4daa6f51b5010993c9015f246fdc8befce476aa2 Section: unknown Priority: optional Description: x48 This emulator is capable of providing a faithful replication of the HP48. It also has a debugger for the saturn processor. Package: zap Version: 2.15.0-1 Architecture: amd64 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 260103 Recommends: openjdk-8-jre Filename: amd64/zap_2.15.0-1_amd64.deb Size: 211741382 MD5sum: 75fcb43c7531f6b0f319639a1da56a1a SHA1: 3f74709f895f9e5443d9bf18d3f3de2d0f04da84 SHA256: 80b3eb7af328a14c65947e0bdfba5dd4867d53889c7ae61f74b95dc2558f3609 Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Package: zap Version: 2.15.0-1 Architecture: i386 Maintainer: Alessandro de Oliviera Faria (A.K.A. CABELO) <cabelo@opensuse.org> Installed-Size: 260103 Recommends: openjdk-8-jre Filename: i386/zap_2.15.0-1_i386.deb Size: 212704986 MD5sum: 993c58a32debdca58c1f7e0b9e320a1a SHA1: c991799eebd49afdb8c55d80884e50e564a3a917 SHA256: c6c40a1e4d89a72e57e921de1a4f55b6447e1feacae8de8a3d8d02bf0921d03f Section: unknown Priority: optional Description: Zed Attack Proxy The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.