head	1.2;
access;
symbols
	RELEASE_8_3_0:1.2
	RELEASE_9_0_0:1.2
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2009.01.21.19.48.16;	author pav;	state Exp;
branches;
next	1.1;

1.1
date	2006.08.23.13.13.56;	author rafan;	state Exp;
branches;
next	;


desc
@@


1.2
log
@- Original website is now cyberquatted; point to a swik entry instead
@
text
@MOSREF is an exploitation architecture utilizing the power of the MOSVM virtual
machine and Mosquito Lisp to make penetration testing, exploit development,
and general systems security tasks more efficient.

While MOSREF has been developed primarily as a platform for exploitation and
penetration-testing, MOSREF and the underlying MOSVM virtual machine technology
can be used for a variety of security-related and non-security-related tasks.
Moreover, the platform is licensed under the GNU LGPL, and is redistributable
and modifiable under the terms of that license. 

WWW: http://swik.net/mosref
@


1.1
log
@Add mosref 2.0.b3, a secure remote execution framework using a compact
Scheme-influenced VM.

PR:		ports/102238
Submitted by:	Piet Delport
@
text
@d11 1
a11 1
WWW: http://www.ephemeralsecurity.com/mosref/
@

