5 Commits

Author SHA1 Message Date
sthen
0e9102df37 use MODPY_PI MASTER_SITES where the files are the same as on googlecode.
update some HOMEPAGEs and add some comments.
2016-01-26 13:29:11 +00:00
sthen
3451d0c08d Chase Location: header redirects for googlecode-hosted HOMEPAGEs and
bump REVISION.
2016-01-26 13:05:26 +00:00
sthen
c8e507e16e handler new py-libmagic, breakage reported by chris@ 2014-08-20 00:29:15 +00:00
sthen
a29724f5c1 minor update to binwalk 1.2.2-1 2013-11-02 20:32:49 +00:00
sthen
6759175a8c import sysutils/binwalk, req'd by chris@, ok zhuk@
Binwalk is a firmware analysis tool designed to assist in the analysis,
extraction, and reverse engineering of firmware images and other binary
blobs. It is simple to use, fully scriptable, and can be easily extended
via custom signatures, extraction rules, and plugin modules.

Binwalk supports various types of analysis useful for inspecting and
reverse engineering firmware, including:

    Embedded file identification and extraction
    Executable code identification
    Type casting
    Entropy analysis and graphing
    Heuristic data analysis
    "Smart" strings analysis

Binwalk's file signatures are (mostly) compatible with the magic signatures
used by the Unix file utility, and include customized/improved signatures
for files that are commonly found in firmware images such as compressed
files, firmware headers, kernels, bootloaders, filesystems, etc.
2013-10-27 09:58:41 +00:00