BDEPEND=ruby_targets_ruby33? ( dev-ruby/bundler:2[ruby_targets_ruby33(-)] dev-ruby/bundler-audit[ruby_targets_ruby33(-)] ) ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) >=dev-vcs/git-1.8.2.1[curl] DEFINED_PHASES=compile config configure install postinst prepare setup test unpack DEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) DESCRIPTION=Advanced framework for developing, testing, and using vulnerability exploit code EAPI=8 HOMEPAGE=http://www.metasploit.org/ IUSE=development +java nexpose oracle +pcap test ruby_targets_ruby33 LICENSE=BSD PROPERTIES=live RDEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib >=app-eselect/eselect-metasploit-0.16 ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) REQUIRED_USE=|| ( ruby_targets_ruby33 ) RESTRICT=strip test SLOT=9999 _eclasses_=git-r3 875eb471682d3e1f18da124be97dcc81 multilib 404b65bd5212cff83b3935c685419d08 multiprocessing 1e32df7deee68372153dca65f4a7c21f ruby-ng 019f1856057ee80f3bb4b0ad0498fcef ruby-utils a3a0978ae7e8a40e253821da24a24782 toolchain-funcs 7e440a20ac11dece04e3334622e6e5da _md5_=1465430a259764eac4e6fd52b29a1ed9