Spanish translation by fuurio
Mati Aharoni (Kali Linux Developer)
11 years ago
|
0 |
kali-menu (0.81) kali; urgency=low
|
|
1 |
|
|
2 |
* Spanish translation by fuurio
|
|
3 |
|
|
4 |
-- Mati Aharoni <[email protected]> Tue, 04 Dec 2012 18:11:35 -0500
|
|
5 |
|
0 | 6 |
kali-menu (0.8) kali; urgency=low
|
1 | 7 |
|
2 | 8 |
* Fixing up menu
|
0 | |
[Desktop Entry]
|
1 | |
Name=DNS Analysis
|
2 | |
Name[fr]=Analyse DNS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=DNS Analysis
|
|
2 |
Name[fr]=Analyse DNS
|
|
3 |
Name[es]=Análisis de DNS
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Live Host Identification
|
2 | |
Name[fr]=En Direct D'identification D'hôte
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Live Host Identification
|
|
2 |
Name[fr]=En Direct D'identification D'hôte
|
|
3 |
Name[es]=Identificaciòn de Hosts en línea
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=IDS/IPS Identification
|
2 | |
Name[fr]=Détection de IDS/IPS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=IDS/IPS Identification
|
|
2 |
Name[fr]=Détection de IDS/IPS
|
|
3 |
Name[es]=Identificaciòn de IDS/IPS
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Network Scanners
|
2 | |
Name[fr]=Numérisation Réseau
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Network Scanners
|
|
2 |
Name[fr]=Numérisation Réseau
|
|
3 |
Name[es]=Escáner de Redes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Traffic Analysis
|
2 | |
Name[fr]=L'analyse du Trafic
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Traffic Analysis
|
|
2 |
Name[fr]=L'analyse du Trafic
|
|
3 |
Name[es]=Análisis de Tráfico
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=OS Fingerprinting
|
2 | |
Name[fr]=Détection d'OS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=OS Fingerprinting
|
|
2 |
Name[fr]=Détection d'OS
|
|
3 |
Name[es]=Detección del SO
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=OSINT Analysis
|
2 | |
Name[fr]=Analyse OSINT
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=OSINT Analysis
|
|
2 |
Name[fr]=Analyse OSINT
|
|
3 |
Name[es]=Análisis OSINT
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Route Analysis
|
2 | |
Name[fr]=Analyse Route
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Route Analysis
|
|
2 |
Name[fr]=Analyse Route
|
|
3 |
Name[es]=Análisis de Ruteo
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Service Fingerprinting
|
2 | |
Name[fr]=Détection de Service
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Service Fingerprinting
|
|
2 |
Name[fr]=Détection de Service
|
|
3 |
Name[es]=Detección de Servicio
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SMB Analysis
|
2 | |
Name[fr]=Analyse SMTP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SMB Analysis
|
|
2 |
Name[fr]=Analyse SMTP
|
|
3 |
Name[es]=Análisis SMB
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SMTP Analysis
|
2 | |
Name[fr]=Analyse SMTP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SMTP Analysis
|
|
2 |
Name[fr]=Analyse SMTP
|
|
3 |
Name[es]=Análisis SMTP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SSL Analysis
|
2 | |
Name[fr]=Analyse SSL
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SSL Analysis
|
|
2 |
Name[fr]=Analyse SSL
|
|
3 |
Name[es]=Análisis SSL
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Telephony Analysis
|
2 | |
Name[fr]=Analyse Téléphonie
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Telephony Analysis
|
|
2 |
Name[fr]=Analyse Téléphonie
|
|
3 |
Name[es]=Análisis de Telefonía
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=VoIP Analysis
|
2 | |
Name[fr]=Analyse VoIP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=VoIP Analysis
|
|
2 |
Name[fr]=Analyse VoIP
|
|
3 |
Name[es]=Análisis de VoIP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=VPN Analysis
|
2 | |
Name[fr]=Analyse VPN
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=VPN Analysis
|
|
2 |
Name[fr]=Analyse VPN
|
|
3 |
Name[es]=Análisis VPN
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Information Gathering
|
2 | |
Name[fr]=Récupération d'informations
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Information Gathering
|
|
2 |
Name[fr]=Récupération d'informations
|
|
3 |
Name[es]=Recopilación de Información
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Cisco Tools
|
2 | |
Name[fr]=Outils Cisco
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Cisco Tools
|
|
2 |
Name[fr]=Outils Cisco
|
|
3 |
Name[es]=Herramientas Cisco
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Fuzzing Tools
|
2 | |
Name[fr]=Fuzzers
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Fuzzing Tools
|
|
2 |
Name[fr]=Fuzzers
|
|
3 |
Name[es]=Herramientas para Fuzzing
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Misc Scanners
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Misc Scanners
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Otros Escáner
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Open Source Assessment
|
2 | |
Name[fr]=L'évaluation Open Source
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Open Source Assessment
|
|
2 |
Name[fr]=L'évaluation Open Source
|
|
3 |
Name[es]=Evaluación de Código Abierto
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Database Assessment
|
2 | |
Name[fr]=L'évaluation Database
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Database Assessment
|
|
2 |
Name[fr]=L'évaluation Database
|
|
3 |
Name[es]=Evaluación de Bases de Datos
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=OpenVAS
|
2 | |
Name[fr]=OpenVAS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=OpenVAS
|
|
2 |
Name[fr]=OpenVAS
|
|
3 |
Name[es]=OpenVAS
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Nessus
|
2 | |
Name[fr]=Nessus
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Nessus
|
|
2 |
Name[fr]=Nessus
|
|
3 |
Name[es]=Nessus
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SAINT
|
2 | |
Name[fr]=SAINT
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SAINT
|
|
2 |
Name[fr]=SAINT
|
|
3 |
Name[es]=SAINT
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=NeXpose
|
2 | |
Name[fr]=NeXpose
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=NeXpose
|
|
2 |
Name[fr]=NeXpose
|
|
3 |
Name[es]=NeXpose
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Vulnerability Analysis
|
2 | |
Name[fr]=Analyse de la Vulnérabilité
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Vulnerability Analysis
|
|
2 |
Name[fr]=Analyse de la Vulnérabilité
|
|
3 |
Name[es]=Análisis de Vulnerabilidades
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=CMS Identification
|
2 | |
Name[fr]=L'identification de CMS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=CMS Identification
|
|
2 |
Name[fr]=L'identification de CMS
|
|
3 |
Name[es]=Identificación de CMS
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=IDS/IPS Identification
|
2 | |
Name[fr]=L'identification de IDS/IPS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=IDS/IPS Identification
|
|
2 |
Name[fr]=L'identification de IDS/IPS
|
|
3 |
Name[es]=Identificación de IDS/IPS
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Open Source Analysis
|
2 | |
Name[fr]=Analyse Open Source
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Open Source Analysis
|
|
2 |
Name[fr]=Analyse Open Source
|
|
3 |
Name[es]=Análisis de Código Abierto
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Crawlers
|
2 | |
Name[fr]=Robots d'Indexation
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Crawlers
|
|
2 |
Name[fr]=Robots d'Indexation
|
|
3 |
Name[es]=Indexadores Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Vulnerability Scanners
|
2 | |
Name[fr]=Identification de Vulnérabilité des Web
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Vulnerability Scanners
|
|
2 |
Name[fr]=Identification de Vulnérabilité des Web
|
|
3 |
Name[es]=Escáner de Vulnerabilidades Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Application Proxies
|
2 | |
Name[fr]=Procurations des WebApp
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Application Proxies
|
|
2 |
Name[fr]=Procurations des WebApp
|
|
3 |
Name[es]=Aplicaciones Proxy
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Application Fuzzers
|
2 | |
Name[fr]=Fuzzers des WebApp
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Application Fuzzers
|
|
2 |
Name[fr]=Fuzzers des WebApp
|
|
3 |
Name[es]=Aplicativos para Fuzzing
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Database Exploitation
|
2 | |
Name[fr]=D'exploitation de Base de Données
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Database Exploitation
|
|
2 |
Name[fr]=D'exploitation de Base de Données
|
|
3 |
Name[es]=Explotaciòn de Bases de Datos
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Applications
|
2 | |
Name[fr]=Applications Web
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Applications
|
|
2 |
Name[fr]=Applications Web
|
|
3 |
Name[es]=Aplicaciones Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Online Attacks
|
2 | |
Name[fr]=Les Attaques en Ligne
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Online Attacks
|
|
2 |
Name[fr]=Les Attaques en Ligne
|
|
3 |
Name[es]=Ataques con Conexión
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Offline Attacks
|
2 | |
Name[fr]=Attaques Hors Connexion
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Offline Attacks
|
|
2 |
Name[fr]=Attaques Hors Connexion
|
|
3 |
Name[es]=Ataques sin Conexiòn
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=GPU Tools
|
2 | |
Name[fr]=Outils de GPU
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=GPU Tools
|
|
2 |
Name[fr]=Outils de GPU
|
|
3 |
Name[es]=Herramientas para GPU
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Password Attacks
|
2 | |
Name[fr]=Attaques de Mot de Passe
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Password Attacks
|
|
2 |
Name[fr]=Attaques de Mot de Passe
|
|
3 |
Name[es]=Ataques de contraseñas
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Aircrack-ng Suite
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Aircrack-ng Suite
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Suite Aircrack-ng
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Wireless Tools
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Wireless Tools
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Herramientas Wireless
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Bluetooth Tools
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Bluetooth Tools
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Herramientas Bluetooth
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=NFC Tools
|
2 | |
Name[fr]=Outils NFC
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=NFC Tools
|
|
2 |
Name[fr]=Outils NFC
|
|
3 |
Name[es]=Herramientas NFC
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=RFIDiot PCSC
|
2 | |
Name[fr]=RFIDiot PCSC
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=RFIDiot PCSC
|
|
2 |
Name[fr]=RFIDiot PCSC
|
|
3 |
Name[es]=RFIDiot PCSC
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=RFIDiot ACG
|
2 | |
Name[fr]=RFIDiot ACG
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=RFIDiot ACG
|
|
2 |
Name[fr]=RFIDiot ACG
|
|
3 |
Name[es]=RFIDiot ACG
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=RFIDiot FROSCH
|
2 | |
Name[fr]=RFIDiot FROSCH
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=RFIDiot FROSCH
|
|
2 |
Name[fr]=RFIDiot FROSCH
|
|
3 |
Name[es]=RFIDiot FROSCH
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=RFID / NFC Tools
|
2 | |
Name[fr]=Outils RFID / NFC
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=RFID / NFC Tools
|
|
2 |
Name[fr]=Outils RFID / NFC
|
|
3 |
Name[es]=Herramientas RFID / NFC
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Wireless Attacks
|
2 | |
Name[fr]=Attaques Sans Fil
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Wireless Attacks
|
|
2 |
Name[fr]=Attaques Sans Fil
|
|
3 |
Name[es]=Ataques Wireless
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Cisco Attacks
|
2 | |
Name[fr]=Attaques Cisco
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Cisco Attacks
|
|
2 |
Name[fr]=Attaques Cisco
|
|
3 |
Name[es]=Ataques Cisco
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Metasploit Framework
|
2 | |
Name[fr]=Metasploit
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Metasploit Framework
|
|
2 |
Name[fr]=Metasploit
|
|
3 |
Name[es]=Plataforma Metasploit
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SAP Exploitation
|
2 | |
Name[fr]=L'exploitation SAP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SAP Exploitation
|
|
2 |
Name[fr]=L'exploitation SAP
|
|
3 |
Name[es]=Explotación de SAP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Fast-Track
|
2 | |
Name[fr]=Fast-Track
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Fast-Track
|
|
2 |
Name[fr]=Fast-Track
|
|
3 |
Name[es]=Fast-Track
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=BeEF XSS Framework
|
2 | |
Name[fr]=BeEF XSS Cadre
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=BeEF XSS Framework
|
|
2 |
Name[fr]=BeEF XSS Cadre
|
|
3 |
Name[es]=Plataforma XSS BeEF
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Social Engineering Toolkit
|
2 | |
Name[fr]=Social Engineering Toolkit
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Social Engineering Toolkit
|
|
2 |
Name[fr]=Social Engineering Toolkit
|
|
3 |
Name[es]=Herramienta de Ingeniería Social
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Exploit Database
|
2 | |
Name[fr]=Exploit Database
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Exploit Database
|
|
2 |
Name[fr]=Exploit Database
|
|
3 |
Name[es]=Base de Datos de Exploits
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Online Archives
|
2 | |
Name[fr]=Online Archives
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Online Archives
|
|
2 |
Name[fr]=Online Archives
|
|
3 |
Name[es]=Archivos en línea
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Exploitation Tools
|
2 | |
Name[fr]=Outils Exploitation
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Exploitation Tools
|
|
2 |
Name[fr]=Outils Exploitation
|
|
3 |
Name[es]=Herramientas de Explotaciòn
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Voice and Surveillance
|
2 | |
Name[fr]=Voix et de Surveillance
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Voice and Surveillance
|
|
2 |
Name[fr]=Voix et de Surveillance
|
|
3 |
Name[es]=Voz y Vigilancia
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=VoIP Tools
|
2 | |
Name[fr]=Outils VoIP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=VoIP Tools
|
|
2 |
Name[fr]=Outils VoIP
|
|
3 |
Name[es]=Herramientas VoIP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Network Sniffers
|
2 | |
Name[fr]=Renifleurs de Réseau
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Network Sniffers
|
|
2 |
Name[fr]=Renifleurs de Réseau
|
|
3 |
Name[es]=Husmeando Redes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Network Spoofing
|
2 | |
Name[fr]=Usurpation Réseau
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Network Spoofing
|
|
2 |
Name[fr]=Usurpation Réseau
|
|
3 |
Name[es]=Envenenamiento de Redes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=VoIP Tools
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=VoIP Tools
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Herramientas VoIP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Sniffers
|
2 | |
Name[fr]=Renifleurs Web
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Sniffers
|
|
2 |
Name[fr]=Renifleurs Web
|
|
3 |
Name[es]=Husmeando la Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Sniffing/Spoofing
|
2 | |
Name[fr]=Renifler et l'Usurpation
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Sniffing/Spoofing
|
|
2 |
Name[fr]=Renifler et l'Usurpation
|
|
3 |
Name[es]=Husmeando/Envenenando
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=OS Backdoors
|
2 | |
Name[fr]=Backdoors OS
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=OS Backdoors
|
|
2 |
Name[fr]=Backdoors OS
|
|
3 |
Name[es]=Puertas Traseras para SO
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Tunneling Tools
|
2 | |
Name[fr]=Tunnel
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Tunneling Tools
|
|
2 |
Name[fr]=Tunnel
|
|
3 |
Name[es]=Herramientas para Túneles
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Backdoors
|
2 | |
Name[fr]=Backdoors Web
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Backdoors
|
|
2 |
Name[fr]=Backdoors Web
|
|
3 |
Name[es]=Puertas Traseras para Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Maintaining Access
|
2 | |
Name[fr]=Maintien de l'Accès
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Maintaining Access
|
|
2 |
Name[fr]=Maintien de l'Accès
|
|
3 |
Name[es]=Manteniendo Acceso
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Debuggers
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Debuggers
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Depurador
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Disassembly
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Disassembly
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Desensamblar
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Misc RE Tools
|
2 | |
Name[fr]=
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Misc RE Tools
|
|
2 |
Name[fr]=
|
|
3 |
Name[es]=Otras Herramientas de Ingeniería Reversa
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Reverse Engineering
|
2 | |
Name[fr]=L'ingénierie Inverse
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Reverse Engineering
|
|
2 |
Name[fr]=L'ingénierie Inverse
|
|
3 |
Name[es]=Ingeniería Reversa
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Network Stress Testing
|
2 | |
Name[fr]=Tests de Stress Réseau
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Network Stress Testing
|
|
2 |
Name[fr]=Tests de Stress Réseau
|
|
3 |
Name[es]=Pruebas de Stress para Redes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=WLAN Stress Testing
|
2 | |
Name[fr]=Stress Tests WLAN
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=WLAN Stress Testing
|
|
2 |
Name[fr]=Stress Tests WLAN
|
|
3 |
Name[es]=Pruebas de Stress para WLAN
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=VoIP Stress Testing
|
2 | |
Name[fr]=Stress Tests VoIP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=VoIP Stress Testing
|
|
2 |
Name[fr]=Stress Tests VoIP
|
|
3 |
Name[es]=Pruebas de Stress para VoIP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Web Stress Testing
|
2 | |
Name[fr]=Stress Tests Web
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Web Stress Testing
|
|
2 |
Name[fr]=Stress Tests Web
|
|
3 |
Name[es]=Pruebas de Stress para Web
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Stress Testing
|
2 | |
Name[fr]=Stress Tests
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Stress Testing
|
|
2 |
Name[fr]=Stress Tests
|
|
3 |
Name[es]=Pruebas de Stress
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Android Tools
|
2 | |
Name[fr]=Outils Android
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Android Tools
|
|
2 |
Name[fr]=Outils Android
|
|
3 |
Name[es]=Herramientas Android
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Arduino Tools
|
2 | |
Name[fr]=Outils Arduino
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Arduino Tools
|
|
2 |
Name[fr]=Outils Arduino
|
|
3 |
Name[es]=Herramientas Arduino
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Teensy Tools
|
2 | |
Name[fr]=Outils Teensy
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Teensy Tools
|
|
2 |
Name[fr]=Outils Teensy
|
|
3 |
Name[es]=Herramientas Teensy
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Hardware Hacking
|
2 | |
Name[fr]=Piratage du Matériel
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Hardware Hacking
|
|
2 |
Name[fr]=Piratage du Matériel
|
|
3 |
Name[es]= Hackeo de Hardware
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Anti-Virus Forensics Tools
|
2 | |
Name[fr]=Outils Criminalistique Anti-Virus
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Anti-Virus Forensics Tools
|
|
2 |
Name[fr]=Outils Criminalistique Anti-Virus
|
|
3 |
Name[es]=Herramientas Forenses de Anti-Virus
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Digital Anti-Forensics
|
2 | |
Name[fr]=Numériques Anti-Forensics
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Digital Anti-Forensics
|
|
2 |
Name[fr]=Numériques Anti-Forensics
|
|
3 |
Name[es]=Anti-Forensia Digital
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Digital Forensics
|
2 | |
Name[fr]=Criminalistique Numérique
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Digital Forensics
|
|
2 |
Name[fr]=Criminalistique Numérique
|
|
3 |
Name[es]=Forensia Digital
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensic Analysis Tools
|
2 | |
Name[fr]=Outils d'Investigation Analyse
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensic Analysis Tools
|
|
2 |
Name[fr]=Outils d'Investigation Analyse
|
|
3 |
Name[es]=Herramientas de Análisis Forense
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensic Carving Tools
|
2 | |
Name[fr]=Criminalistique Outils à Ciseler
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensic Carving Tools
|
|
2 |
Name[fr]=Criminalistique Outils à Ciseler
|
|
3 |
Name[es]=Herramientas Forenses de Recuperación
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensic Hashing Tools
|
2 | |
Name[fr]=Criminalistique Outils de Hachage
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensic Hashing Tools
|
|
2 |
Name[fr]=Criminalistique Outils de Hachage
|
|
3 |
Name[es]=Herramientas Forenses de Hashing
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensic Imaging Tools
|
2 | |
Name[fr]=Outils d'Investigation d'Imagerie
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensic Imaging Tools
|
|
2 |
Name[fr]=Outils d'Investigation d'Imagerie
|
|
3 |
Name[es]=Herramientas Forenses para Imágenes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensic Suites
|
2 | |
Name[fr]=Suites Criminalistique
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensic Suites
|
|
2 |
Name[fr]=Suites Criminalistique
|
|
3 |
Name[es]=Suite de Forensia
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Network Forensics
|
2 | |
Name[fr]=Criminalistique de Réseau
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Network Forensics
|
|
2 |
Name[fr]=Criminalistique de Réseau
|
|
3 |
Name[es]=Forensia en Redes
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Password Forensics Tools
|
2 | |
Name[fr]=Outils Criminalistique Mot de Passe
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Password Forensics Tools
|
|
2 |
Name[fr]=Outils Criminalistique Mot de Passe
|
|
3 |
Name[es]=Herramientas Forenses para contraseñas
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=PDF Forensics Tools
|
2 | |
Name[fr]=Outils d'Investigation PDF
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=PDF Forensics Tools
|
|
2 |
Name[fr]=Outils d'Investigation PDF
|
|
3 |
Name[es]=Herramientas Forenses para PDF
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=RAM Forensics Tools
|
2 | |
Name[fr]=Outils d'Investigation RAM
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=RAM Forensics Tools
|
|
2 |
Name[fr]=Outils d'Investigation RAM
|
|
3 |
Name[es]=Herramientas Forenses para RAM
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Forensics
|
2 | |
Name[fr]=Criminalistique
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Forensics
|
|
2 |
Name[fr]=Criminalistique
|
|
3 |
Name[es]=Forensia
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Evidence Management
|
2 | |
Name[fr]=Gestion de la Preuve
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Evidence Management
|
|
2 |
Name[fr]=Gestion de la Preuve
|
|
3 |
Name[es]=Gestión de Evidencia
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Media Capture
|
2 | |
Name[fr]=Capture des Médias
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Media Capture
|
|
2 |
Name[fr]=Capture des Médias
|
|
3 |
Name[es]=Capturador de Medios
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Reporting Tools
|
2 | |
Name[fr]=Rapports
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Reporting Tools
|
|
2 |
Name[fr]=Rapports
|
|
3 |
Name[es]=Herramientas de Reporte
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=GPSd
|
2 | |
Name[fr]=GPSd
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=GPSd
|
|
2 |
Name[fr]=GPSd
|
|
3 |
Name[es]=GPSd
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=HTTP
|
2 | |
Name[fr]=HTTP
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=HTTP
|
|
2 |
Name[fr]=HTTP
|
|
3 |
Name[es]=HTTP
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=MySQL
|
2 | |
Name[fr]=MySQL
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=MySQL
|
|
2 |
Name[fr]=MySQL
|
|
3 |
Name[es]=MySQL
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=PCSCD
|
2 | |
Name[fr]=PCSCD
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=PCSCD
|
|
2 |
Name[fr]=PCSCD
|
|
3 |
Name[es]=PCSCD
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=SSH
|
2 | |
Name[fr]=SSH
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=SSH
|
|
2 |
Name[fr]=SSH
|
|
3 |
Name[es]=SSH
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Radius
|
2 | |
Name[fr]=Radius
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Radius
|
|
2 |
Name[fr]=Radius
|
|
3 |
Name[es]=Radius
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=BeEF
|
2 | |
Name[fr]=BeEF
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=BeEF
|
|
2 |
Name[fr]=BeEF
|
|
3 |
Name[es]=BeEF
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=Metasploit
|
2 | |
Name[fr]=Metasploit
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=Metasploit
|
|
2 |
Name[fr]=Metasploit
|
|
3 |
Name[es]=Metasploit
|
|
4 |
Type=Directory
|
0 | |
[Desktop Entry]
|
1 | |
Name=System Services
|
2 | |
Name[fr]=Services
|
3 | |
Type=Directory
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=System Services
|
|
2 |
Name[fr]=Services
|
|
3 |
Name[es]=Servicios del Sistema
|
|
4 |
Type=Directory
|