BDEPEND=ruby_targets_ruby33? ( dev-ruby/bundler:2[ruby_targets_ruby33(-)] dev-ruby/bundler-audit[ruby_targets_ruby33(-)] ) ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) >=dev-vcs/git-1.8.2.1[curl] DEFINED_PHASES=compile config configure install postinst prepare setup test unpack DEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) DESCRIPTION=Advanced framework for developing, testing, and using vulnerability exploit code EAPI=8 HOMEPAGE=http://www.metasploit.org/ IUSE=development +java nexpose oracle +pcap test ruby_targets_ruby33 LICENSE=BSD PROPERTIES=live RDEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib >=app-eselect/eselect-metasploit-0.16 ruby_targets_ruby33? ( dev-lang/ruby:3.3 ) REQUIRED_USE=|| ( ruby_targets_ruby33 ) RESTRICT=strip test SLOT=9999 _eclasses_=git-r3 7b584b5dc33e3bc66ff5b9271bf41764 multilib fc812e8eb2170022c28272d80a1f9e77 multiprocessing 45d0620f25c2f063ad6276ecd9ed9399 ruby-ng 705ab926556cb5cb4811999dd0c670b0 ruby-utils a3a0978ae7e8a40e253821da24a24782 toolchain-funcs 5195689ff6a73b0e789acfa09d4fbcb9 _md5_=1465430a259764eac4e6fd52b29a1ed9