{ "info": { "author": "Shubham Mittal, Sudhanshu Chauhan, Kunal Aggarwal", "author_email": "upgoingstaar@gmail.com", "bugtrack_url": null, "classifiers": [], "description": "UNKNOWN\n\n\n", "description_content_type": null, "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/DataSploit/datasploit", "keywords": "", "license": "GPLv3", "maintainer": "", "maintainer_email": "", "name": "datasploit", "package_url": "https://pypi.org/project/datasploit/", "platform": "", "project_url": "https://pypi.org/project/datasploit/", "project_urls": { "Homepage": "https://github.com/DataSploit/datasploit" }, "release_url": "https://pypi.org/project/datasploit/1.0/", "requires_dist": [ "BeautifulSoup (==3.2.1)", "anyjson (==0.3.3)", "beautifulsoup4 (==4.4.1)", "billiard (==3.3.0.23)", "bs4 (==0.0.1)", "clearbit (==0.1.4)", "config (==0.3.9)", "dnspython (==1.14.0)", "future (==0.15.2)", "idna (==2.1)", "ipwhois (==0.15.1)", "json2html (==1.0.1)", "lxml (==3.6.0)", "piplapis-python (==5.1.0)", "pymongo (==3.3.0)", "python-Wappalyzer (==0.2.2)", "python-whois (==0.6.2)", "pytz (==2016.6.1)", "requests (==2.10.0)", "requests-file (==1.4)", "simplejson (==3.8.2)", "termcolor", "tldextract (==2.0.1)", "tqdm (==4.7.6)", "tweepy (==3.5.0)" ], "requires_python": "", "summary": "A framework to perform various OSINT techniques, aggregate all the raw data, and give data in multiple formats.", "version": "1.0" }, "last_serial": 3048903, "releases": { "0.1": [ { "comment_text": "", "digests": { "md5": "4406a9ee8678a077988ced3309dba6c3", "sha256": "bb5a423d0819db45437fee06fdd0cbedd06d4c80a9904f92092b7b97007fdc34" }, "downloads": -1, "filename": "datasploit-0.1-py2-none-any.whl", "has_sig": false, "md5_digest": "4406a9ee8678a077988ced3309dba6c3", "packagetype": "bdist_wheel", "python_version": "py2", "requires_python": null, "size": 2100, "upload_time": "2017-06-25T14:04:18", "url": "https://files.pythonhosted.org/packages/27/78/7f9f9a1a00079ee466769521425c6179c3a60b38d5fcbdc4b0a9aa0e5d96/datasploit-0.1-py2-none-any.whl" }, { "comment_text": "", "digests": { "md5": "aa615c1b167afb4c7aab8cda904442a9", "sha256": "9e83f2936e801f1da78f7e0b0d053049f143730af0a7b7ed67508483a12b1a72" }, "downloads": -1, "filename": "datasploit-0.1.tar.gz", "has_sig": false, "md5_digest": "aa615c1b167afb4c7aab8cda904442a9", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 895, "upload_time": "2017-06-25T14:04:19", "url": "https://files.pythonhosted.org/packages/3d/9a/9486e35d519130211d994d037e04fbf5a4033b9a59994004ad32cd16e8f5/datasploit-0.1.tar.gz" } ], "1.0": [ { "comment_text": "", "digests": { "md5": "44f711182f05833ec41803546d97ba76", "sha256": "55dab47c55a5968761aa593d2ab537ef5d382b4817df4f641c2738b951423675" }, "downloads": -1, "filename": "datasploit-1.0-2-py2-none-any.whl", "has_sig": false, "md5_digest": "44f711182f05833ec41803546d97ba76", "packagetype": "bdist_wheel", "python_version": "py2", "requires_python": null, "size": 45348, "upload_time": "2017-07-26T01:21:16", "url": "https://files.pythonhosted.org/packages/ab/89/a3b19930e9ba3081d8d9d7ab1252dccf014bf02bca1bcb5268273ab58862/datasploit-1.0-2-py2-none-any.whl" }, { "comment_text": "", "digests": { "md5": "f317e99850fde5fba65d908709affff3", "sha256": "ff131ef34f7ec54bba288da2b0c9dd788fc1aa5c7094209004e7e4b3d59f8a44" }, "downloads": -1, "filename": "datasploit-1.0-2.tar.gz", "has_sig": false, "md5_digest": "f317e99850fde5fba65d908709affff3", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 20562, "upload_time": "2017-07-26T01:21:19", "url": "https://files.pythonhosted.org/packages/a1/43/b97d92eb82ee8c5cbc9519e8edf12c8c59fa6b4a3ba216a7514babdefd07/datasploit-1.0-2.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "44f711182f05833ec41803546d97ba76", "sha256": "55dab47c55a5968761aa593d2ab537ef5d382b4817df4f641c2738b951423675" }, "downloads": -1, "filename": "datasploit-1.0-2-py2-none-any.whl", "has_sig": false, "md5_digest": "44f711182f05833ec41803546d97ba76", "packagetype": "bdist_wheel", "python_version": "py2", "requires_python": null, "size": 45348, "upload_time": "2017-07-26T01:21:16", "url": "https://files.pythonhosted.org/packages/ab/89/a3b19930e9ba3081d8d9d7ab1252dccf014bf02bca1bcb5268273ab58862/datasploit-1.0-2-py2-none-any.whl" }, { "comment_text": "", "digests": { "md5": "f317e99850fde5fba65d908709affff3", "sha256": "ff131ef34f7ec54bba288da2b0c9dd788fc1aa5c7094209004e7e4b3d59f8a44" }, "downloads": -1, "filename": "datasploit-1.0-2.tar.gz", "has_sig": false, "md5_digest": "f317e99850fde5fba65d908709affff3", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 20562, "upload_time": "2017-07-26T01:21:19", "url": "https://files.pythonhosted.org/packages/a1/43/b97d92eb82ee8c5cbc9519e8edf12c8c59fa6b4a3ba216a7514babdefd07/datasploit-1.0-2.tar.gz" } ] }