BDEPEND=ruby_targets_ruby32? ( dev-ruby/bundler:2[ruby_targets_ruby32(-)] dev-ruby/bundler-audit[ruby_targets_ruby32(-)] ) ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) >=dev-vcs/git-1.8.2.1[curl] DEFINED_PHASES=compile config configure install postinst prepare setup test unpack DEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) DESCRIPTION=Advanced framework for developing, testing, and using vulnerability exploit code EAPI=8 HOMEPAGE=http://www.metasploit.org/ IUSE=development +java nexpose oracle +pcap test ruby_targets_ruby32 LICENSE=BSD PROPERTIES=live RDEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib >=app-eselect/eselect-metasploit-0.16 ruby_targets_ruby32? ( dev-lang/ruby:3.2 ) REQUIRED_USE=|| ( ruby_targets_ruby32 ) RESTRICT=strip test SLOT=9999 _eclasses_=git-r3 875eb471682d3e1f18da124be97dcc81 multilib b2a329026f2e404e9e371097dda47f96 multiprocessing 1e32df7deee68372153dca65f4a7c21f ruby-ng f0dedda0b5f19492ca5de91d98bc1708 ruby-utils a5d18cde09a96648a4d316ada2786cdb toolchain-funcs 14648d8795f7779e11e1bc7cf08b7536 _md5_=0a3b3abd59f76348d833919e5645148c