This repository has been archived by the owner on Aug 7, 2020. It is now read-only.
This repository has been archived by the owner on Aug 7, 2020. It is now read-only.
Open
Description
My first impression was: a great tool. But after I saw the list of dependencies I started to wonder.
Do you really expect it to be installed on a compromised machine??
First of all, it might be no internet in the intranet. Second, you will not be allowed to install all these on a client's machine (unless you developed a tool for hackers which is totally illegal)
Is any solution for this problem?
Metadata
Assignees
Labels
No labels