New port: security/py-rekall
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. WWW: http://www.rekall-forensic.com/
This commit is contained in:
parent
ad8846e59c
commit
f77c61ef10
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=370110
@ -795,6 +795,7 @@
|
||||
SUBDIR += py-pyptlib
|
||||
SUBDIR += py-pysha3
|
||||
SUBDIR += py-python-registry
|
||||
SUBDIR += py-rekall
|
||||
SUBDIR += py-rsa
|
||||
SUBDIR += py-service_identity
|
||||
SUBDIR += py-slowaes
|
||||
|
46
security/py-rekall/Makefile
Normal file
46
security/py-rekall/Makefile
Normal file
@ -0,0 +1,46 @@
|
||||
# Created by: antoine@FreeBSD.org
|
||||
# $FreeBSD$
|
||||
|
||||
PORTNAME= rekall
|
||||
DISTVERSION= 1.1.0.beta
|
||||
CATEGORIES= security python
|
||||
MASTER_SITES= CHEESESHOP
|
||||
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
|
||||
|
||||
MAINTAINER= antoine@FreeBSD.org
|
||||
COMMENT= Memory forensics analysis framework
|
||||
|
||||
LICENSE= GPLv2
|
||||
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
|
||||
|
||||
RUN_DEPENDS= cabextract:${PORTSDIR}/archivers/cabextract \
|
||||
${PYTHON_PKGNAMEPREFIX}acora>=1.8:${PORTSDIR}/textproc/py-acora \
|
||||
${PYTHON_PKGNAMEPREFIX}codegen>=1.0:${PORTSDIR}/devel/py-codegen \
|
||||
${PYTHON_PKGNAMEPREFIX}distorm>=0:${PORTSDIR}/devel/py-distorm \
|
||||
${PYTHON_PKGNAMEPREFIX}Flask>=0.10.1:${PORTSDIR}/www/py-flask \
|
||||
${PYTHON_PKGNAMEPREFIX}Flask-Sockets>=0:${PORTSDIR}/www/py-flask-sockets \
|
||||
${PYTHON_PKGNAMEPREFIX}gevent>=1.0.1:${PORTSDIR}/devel/py-gevent \
|
||||
${PYTHON_PKGNAMEPREFIX}gevent-websocket>=0.9.3:${PORTSDIR}/www/py-gevent-websocket \
|
||||
${PYTHON_PKGNAMEPREFIX}ipython>=2.0.0:${PORTSDIR}/devel/ipython \
|
||||
${PYTHON_PKGNAMEPREFIX}pycrypto>=2.3.1:${PORTSDIR}/security/py-pycrypto \
|
||||
${PYTHON_PKGNAMEPREFIX}pyelftools>=0.21:${PORTSDIR}/devel/py-pyelftools \
|
||||
${PYTHON_PKGNAMEPREFIX}pytz>=2012:${PORTSDIR}/devel/py-pytz \
|
||||
${PYTHON_PKGNAMEPREFIX}yaml>=2.10:${PORTSDIR}/devel/py-yaml \
|
||||
${PYTHON_PKGNAMEPREFIX}yara>=0:${PORTSDIR}/security/py-yara
|
||||
|
||||
USES= python:2
|
||||
USE_PYTHON= distutils autoplist
|
||||
|
||||
PORTDOCS= CREDITS.txt LEGAL.txt README.md
|
||||
|
||||
OPTIONS_DEFINE= DOCS
|
||||
|
||||
post-patch:
|
||||
@${CHMOD} -R a+rX ${WRKSRC}
|
||||
@${REINPLACE_CMD} '/argparse/d' ${WRKSRC}/setup.py
|
||||
|
||||
post-install:
|
||||
@${MKDIR} ${STAGEDIR}${DOCSDIR}
|
||||
${INSTALL_DATA} ${PORTDOCS:S,^,${WRKSRC}/,} ${STAGEDIR}${DOCSDIR}
|
||||
|
||||
.include <bsd.port.mk>
|
2
security/py-rekall/distinfo
Normal file
2
security/py-rekall/distinfo
Normal file
@ -0,0 +1,2 @@
|
||||
SHA256 (rekall-1.1.0.beta.tar.gz) = 2815ec19aefe7c3ef48a49b5a054f0c8d9242cc9855e525a2ea872ff3da2f4d6
|
||||
SIZE (rekall-1.1.0.beta.tar.gz) = 3510576
|
10
security/py-rekall/pkg-descr
Normal file
10
security/py-rekall/pkg-descr
Normal file
@ -0,0 +1,10 @@
|
||||
The Rekall Framework is a completely open collection of tools, implemented in
|
||||
Python under the GNU General Public License, for the extraction of digital
|
||||
artifacts from volatile memory (RAM) samples. The extraction techniques are
|
||||
performed completely independent of the system being investigated but offer
|
||||
visibility into the runtime state of the system. The framework is intended to
|
||||
introduce people to the techniques and complexities associated with extracting
|
||||
digital artifacts from volatile memory samples and provide a platform for
|
||||
further work into this exciting area of research.
|
||||
|
||||
WWW: http://www.rekall-forensic.com/
|
Loading…
Reference in New Issue
Block a user