How to Install and Uninstall bully Package on Ubuntu 22.04 LTS (Jammy Jellyfish)
Last updated: December 27,2024
Notice
You can also install and uninstall the bully on the following distributions in the same way, as they are all based on the Ubuntu system
- Kubuntu 22.04 LTS
- Lubuntu 22.04 LTS
- Xubuntu 22.04 LTS
- Ubuntu MATE 22.04 LTS
- Ubuntu Studio 22.04 LTS
- Pop!_OS 22.04 LTS
- Zorin OS 16 / Zorin OS 17
- Ubuntu Budgie 22.04
1. Install "bully" package
Learn how to install bully on Ubuntu 22.04 LTS (Jammy Jellyfish)
$
sudo apt update
Copied
$
sudo apt install
bully
Copied
2. Uninstall "bully" package
In this section, we are going to explain the necessary steps to uninstall bully on Ubuntu 22.04 LTS (Jammy Jellyfish):
$
sudo apt remove
bully
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the bully package on Ubuntu 22.04 LTS (Jammy Jellyfish)
Package: bully
Architecture: amd64
Version: 1.4.00-1
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 178
Depends: libc6 (>= 2.14), liblua5.3-0, libpcap0.8 (>= 0.9.8), pixiewps, aircrack-ng
Filename: pool/universe/b/bully/bully_1.4.00-1_amd64.deb
Size: 71816
MD5sum: d546230026d487fa16e9448c77c57b9c
SHA1: 5e3625f7c5da796855d889a5ae073db1b0d7c46e
SHA256: a969cee2d983a63662b5e336ae5b0ba4ecda4f2c73275c2231dd8cb25b2308d0
SHA512: 47823595527d8967f4c8efbfc3c4f794bf2d9e87521653949de0ac29165686f5c7173eb27fad69394abc325bc88a0699d9f572993c3ab10af6a2fd843b163edb
Homepage: https://github.com/kimocoder/bully
Description: Implementation of the WPS brute force attack, written in C
Description-md5: 843948b83008f74192d3401f79caea4c
Architecture: amd64
Version: 1.4.00-1
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 178
Depends: libc6 (>= 2.14), liblua5.3-0, libpcap0.8 (>= 0.9.8), pixiewps, aircrack-ng
Filename: pool/universe/b/bully/bully_1.4.00-1_amd64.deb
Size: 71816
MD5sum: d546230026d487fa16e9448c77c57b9c
SHA1: 5e3625f7c5da796855d889a5ae073db1b0d7c46e
SHA256: a969cee2d983a63662b5e336ae5b0ba4ecda4f2c73275c2231dd8cb25b2308d0
SHA512: 47823595527d8967f4c8efbfc3c4f794bf2d9e87521653949de0ac29165686f5c7173eb27fad69394abc325bc88a0699d9f572993c3ab10af6a2fd843b163edb
Homepage: https://github.com/kimocoder/bully
Description: Implementation of the WPS brute force attack, written in C
Description-md5: 843948b83008f74192d3401f79caea4c