Commit 24ff57f3 authored by dmknght's avatar dmknght

Add description to p*, remove dropped package

parent cc2b4b3e
[Desktop Entry]
Name=netmask
Comment=Determine network masks to specify a range of hosts
Encoding=UTF-8
Exec=menuexec "netmask -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=netsniff-ng
Comment=Linux network sniffer for packet inspection
Encoding=UTF-8
Exec=menuexec "netsniff-ng -h"
Icon=parrot-netsniff-ng.png
......
[Desktop Entry]
Name=nfspy
Comment=Python library for automating the falsification of NFS credentials when mounting an NFS share
Encoding=UTF-8
Exec=menuexec "nfspy -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=nikto
Comment=Web server and CGI scanner
Encoding=UTF-8
Exec=menuexec "nikto -h"
Icon=parrot-nikto.png
......
[Desktop Entry]
Name=nishang
Comment=collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation
Encoding=UTF-8
Exec=menuexec nishang
Icon=parrot-nishang.png
......
[Desktop Entry]
Name=nmap
Comment=Network exploration or security auditing
Encoding=UTF-8
Exec=menuexec "nmap"
Icon=parrot-nmap.png
......
[Desktop Entry]
Name=oclhashcat
Encoding=UTF-8
Exec=menuexec "oclhashcat"
Icon=parrot-menu.png
StartupNotify=false
Terminal=true
Type=Application
Categories=05-02-offline-attacks;04-03-gpu-tools;
X-Parrot-Package=oclhashcat
[Desktop Entry]
Name=ohrwurm
Comment=A small and simple RTP
Encoding=UTF-8
Exec=menuexec "ohrwurm"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=ollydbg
Comment=32-bit assembler level analysing debugger for Microsoft Windows
Encoding=UTF-8
Exec=menuexecg "ollydbg"
Icon=parrot-ollydbg.png
......
[Desktop Entry]
Name=onesixtyone
Comment=SNMP scanner
Encoding=UTF-8
Exec=menuexec "onesixtyone"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=ophcrack-cli
Comment=Windows password cracker based on a time-memory trade-off using rainbow tables (CLI)
Encoding=UTF-8
Exec=menuexec "ophcrack-cli"
Icon=parrot-ophcrack.png
......
[Desktop Entry]
Name=ophcrack
Comment=Windows password cracker based on a time-memory trade-off using rainbow tables (GUI)
Encoding=UTF-8
Exec=menuexecg "ophcrack"
Icon=parrot-ophcrack.png
......
[Desktop Entry]
Name=oscanner
Comment=Oracle assessment framework developed in Java
Encoding=UTF-8
Exec=menuexec "oscanner"
Icon=parrot-oscanner.png
......
[Desktop Entry]
Name=owasp-mantra-ff
Encoding=UTF-8
Exec=menuexecg "owasp-mantra-ff"
Icon=parrot-menu.png
StartupNotify=false
Terminal=false
Type=Application
Categories=03-05-web-vulnerability-scanners;
X-Parrot-Package=owasp-mantra-ff
[Desktop Entry]
Name=p0f
Comment=Passive OS detection based on SYN packets
Encoding=UTF-8
Exec=menuexec "p0f -h"
Icon=parrot-p0f.png
......
[Desktop Entry]
Name=padbuster
Comment=automating Padding Oracle Attacks: decrypt arbitrary ciphertext, encrypt arbitrary plaintext, and perform automated response analysis
Encoding=UTF-8
Exec=menuexec "padbuster"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=paros
Encoding=UTF-8
Exec=menuexecg "paros"
Icon=parrot-Paros.png
StartupNotify=false
Terminal=false
Type=Application
Categories=03-webapp-analysis;03-06-web-application-proxies;
X-Parrot-Package=paros
[Desktop Entry]
Name=pasco
Comment=Forensic tool that examines the content of cache files (index.dat)
Encoding=UTF-8
Exec=menuexec "pasco"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=patator
Comment=Multi-purpose brute-forcer
Encoding=UTF-8
Exec=menuexec "patator -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=pdf-parser
Comment=parse a PDF document to identify the fundamental elements used in the analyzed file
Encoding=UTF-8
Exec=menuexec "pdf-parser -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=pdfbook
Comment=Gathers facebook artifacts from a pd dump
Encoding=UTF-8
Exec=menuexec "pd-fbook -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=pdfid
Comment=Scans PDF files for certain PDF keywords
Encoding=UTF-8
Exec=menuexec "pdfid -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=pdgmail
Comment=Extracts gmail artifacts from a pd dump
Encoding=UTF-8
Exec=menuexec "pdgmail -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=peepdf
Comment=PDF analysis tool written in Python 2
Encoding=UTF-8
Exec=menuexec "peepdf -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=pev
Comment=Text-based tool to analyze PE files
Encoding=UTF-8
Exec=menuexec "pev -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=phishing-frenzy
Encoding=UTF-8
Exec=menuexec "phishing-frenzy -h"
Icon=parrot-phishing-frenzy.png
StartupNotify=false
Terminal=true
Type=Application
Categories=08-02-social-engineering;
X-Parrot-Package=phishing-frenzy
[Desktop Entry]
Name=phrasendrescher
Encoding=UTF-8
Exec=menuexec "pd -h"
Icon=parrot-menu.png
StartupNotify=false
Terminal=true
Type=Application
Categories=05-01-online-attacks;
X-Parrot-Package=phrasendrescher
[Desktop Entry]
Name=pipal
Comment=Statistical analysis on password dumps: password length, charset
Encoding=UTF-8
Exec=menuexec "pipal -h"
Icon=parrot-pipal.png
......
[Desktop Entry]
Name=pixiewps
Comment=bruteforce offline the WPS pin exploiting the low or non-existing entropy (pixie dust attack)
Encoding=UTF-8
Exec=menuexec "pixiewps -h"
Icon=parrot-pixiewps.png
......
[Desktop Entry]
Name=plecost
Comment=Wordpress fingerprinting tool
Encoding=UTF-8
Exec=menuexec "plecost -h"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=postgresql restart
Comment=Restart postgresql database service
Encoding=UTF-8
Exec=menuexec "service postgresql restart"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=postgresql start
Comment=Start postgresql database service
Encoding=UTF-8
Exec=menuexec "service postgresql start"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=postgresql stop
Comment=Stop postgresql database service
Encoding=UTF-8
Exec=menuexec "service postgresql stop"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=powerfuzzer
Comment=Highly automated and fully customizable web fuzzer
Encoding=UTF-8
Exec=menuexecg "powerfuzzer"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=powersploit
Comment=PowerShell Post-Exploitation Framework
Encoding=UTF-8
Exec=menuexec powersploit
Icon=parrot-menu.png
......
[Desktop Entry]
Name=protos-sip
Comment=evaluate implementation level security and robustness of Session Initiation Protocol (SIP) implementations
Encoding=UTF-8
Exec=menuexec "protos-sip -help"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=proxychains
Comment=Redirect connections through proxy servers
Encoding=UTF-8
Exec=menuexec "proxychains"
Icon=parrot-proxychains.png
......
[Desktop Entry]
Name=proxystrike
Comment=Find Sql injection and xss vulnerabilities while browsing an application
Encoding=UTF-8
Exec=menuexecg "proxystrike"
Icon=parrot-menu.png
......
[Desktop Entry]
Name=proxytunnel
Comment=Create tcp tunnels trough HTTPS proxies, for using with SSH
Encoding=UTF-8
Exec=menuexec "proxytunnel -h"
Icon=parrot-menu.png
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment