BDEPEND=ruby_targets_ruby31? ( dev-ruby/bundler:2[ruby_targets_ruby31(-)] dev-ruby/bundler-audit[ruby_targets_ruby31(-)] ) ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) >=dev-vcs/git-1.8.2.1[curl] DEFINED_PHASES=compile config configure install postinst prepare setup test unpack DEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) DESCRIPTION=Advanced framework for developing, testing, and using vulnerability exploit code EAPI=8 HOMEPAGE=http://www.metasploit.org/ IUSE=development +java nexpose oracle +pcap test ruby_targets_ruby31 LICENSE=BSD PROPERTIES=live RDEPEND=app-arch/xz-utils dev-db/postgresql:*[server] dev-db/sqlite || ( app-crypt/johntheripper-jumbo >=app-crypt/johntheripper-1.7.9-r1[-minimal(-)] ) dev-libs/libffi dev-libs/libxml2 dev-libs/libxslt dev-libs/openssl net-analyzer/nmap net-libs/libpcap sys-libs/zlib >=app-eselect/eselect-metasploit-0.16 ruby_targets_ruby31? ( dev-lang/ruby:3.1 ) REQUIRED_USE=|| ( ruby_targets_ruby31 ) RESTRICT=strip test SLOT=9999 _eclasses_=git-r3 fbb2889c81f3a05910c1524db69425c1 multilib c19072c3cd7ac5cb21de013f7e9832e0 multiprocessing 30ead54fa2e2b5f9cd4e612ffc34d0fe ruby-ng 4ef520a992dc54fdd8f49d875c1ab2c0 ruby-utils 820207a5d3f0e2e31c28080f131f2037 toolchain-funcs e56c7649b804f051623c8bc1a1c44084 _md5_=5b014bc807f524fb78de92a313189665