head	1.3;
access;
symbols
	RELEASE_8_3_0:1.3
	RELEASE_9_0_0:1.3
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.2
	RELEASE_6_4_0:1.2
	RELEASE_5_EOL:1.2
	RELEASE_7_0_0:1.2
	RELEASE_6_3_0:1.2
	PRE_XORG_7:1.2
	RELEASE_4_EOL:1.2
	RELEASE_6_2_0:1.2
	RELEASE_6_1_0:1.2
	RELEASE_5_5_0:1.2
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1;
locks; strict;
comment	@# @;


1.3
date	2011.07.03.14.03.42;	author ohauer;	state Exp;
branches;
next	1.2;

1.2
date	2005.11.25.18.01.14;	author pav;	state Exp;
branches;
next	1.1;

1.1
date	2004.11.11.21.10.04;	author pav;	state Exp;
branches;
next	;


desc
@@


1.3
log
@-remove MD5
@
text
@SHA256 (SP148.tgz) = 1fe680f9f749268d77c515972a35a04d0418cc847554fc261f0b2a9aa6841317
SIZE (SP148.tgz) = 631577
@


1.2
log
@- Add SHA256
@
text
@a0 1
MD5 (SP148.tgz) = e5851a07067945eb2b0475dbdb4adf1c
@


1.1
log
@Add spike-proxy, a professional-grade tool for looking for application-level
vulnerabilities in web applications. SPIKE Proxy covers the basics, such as SQL
Injection and cross-site-scripting, but it's completely open Python
infrastructure allows advanced users to customize it for web applications that
other tools fall apart on.

PR:		ports/69943
Submitted by:	Yonatan <Yonatan@@Xpert.com>
@
text
@d2 1
@

