From owner-svn-ports-all@freebsd.org Mon Mar 2 14:37:41 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2A5DE2507FB; Mon, 2 Mar 2020 14:37:41 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48WN5w5FRsz4GVJ; Mon, 2 Mar 2020 14:37:40 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 69C131DD14; Mon, 2 Mar 2020 14:37:40 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 022Ebe4U054701; Mon, 2 Mar 2020 14:37:40 GMT (envelope-from 0mp@FreeBSD.org) Received: (from 0mp@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 022Ebdd7054697; Mon, 2 Mar 2020 14:37:39 GMT (envelope-from 0mp@FreeBSD.org) Message-Id: <202003021437.022Ebdd7054697@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: 0mp set sender to 0mp@FreeBSD.org using -f From: Mateusz Piotrowski <0mp@FreeBSD.org> Date: Mon, 2 Mar 2020 14:37:39 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r527637 - in head/security: . py-ropper X-SVN-Group: ports-head X-SVN-Commit-Author: 0mp X-SVN-Commit-Paths: in head/security: . py-ropper X-SVN-Commit-Revision: 527637 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 02 Mar 2020 14:37:41 -0000 Author: 0mp Date: Mon Mar 2 14:37:39 2020 New Revision: 527637 URL: https://svnweb.freebsd.org/changeset/ports/527637 Log: New port: security/py-ropper You can use ropper to look at information about files in different file formats and you can find ROP and JOP gadgets to build chains for different architectures. Ropper supports ELF, MachO and the PE file format. Other files can be opened in RAW format. The following architectures are supported: - x86 / x86_64 - Mips / Mips64 - ARM (also Thumb Mode)/ ARM64 - PowerPC / PowerPC64 Ropper is inspired by ROPgadget, but should be more than a gadgets finder. So it is possible to show information about a binary like header, segments, sections etc. Furthermore it is possible to edit the binaries and edit the header fields, but currently this is not fully implemented and in a experimental state. For disassembly ropper uses the awesome Capstone Framework. Now you can generate rop chain automatically (auto-roper) for execve and mprotect syscall. WWW: https://scoding.de/ropper/ Added: head/security/py-ropper/ head/security/py-ropper/Makefile (contents, props changed) head/security/py-ropper/distinfo (contents, props changed) head/security/py-ropper/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Mon Mar 2 14:30:42 2020 (r527636) +++ head/security/Makefile Mon Mar 2 14:37:39 2020 (r527637) @@ -969,6 +969,7 @@ SUBDIR += py-rekall_lib SUBDIR += py-requests-credssp SUBDIR += py-requests-kerberos + SUBDIR += py-ropper SUBDIR += py-rsa SUBDIR += py-safe SUBDIR += py-scp Added: head/security/py-ropper/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ropper/Makefile Mon Mar 2 14:37:39 2020 (r527637) @@ -0,0 +1,24 @@ +# $FreeBSD$ + +PORTNAME= ropper +DISTVERSION= 1.13.3 +CATEGORIES= security python +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= 0mp@FreeBSD.org +COMMENT= Find gadgets to build rop chains for different architectures + +LICENSE= BSD3CLAUSE +# LICENSE_FILE is not distributed with the Python package. + +RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}capstone>=4.0.1:devel/py-capstone@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}filebytes>=0.10.0:devel/py-filebytes@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}keystone-engine>=0.9.1.3:devel/py-keystone-engine@${PY_FLAVOR} + +USES= python +USE_PYTHON= autoplist distutils + +NO_ARCH= yes + +.include Added: head/security/py-ropper/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ropper/distinfo Mon Mar 2 14:37:39 2020 (r527637) @@ -0,0 +1,3 @@ +TIMESTAMP = 1582056034 +SHA256 (ropper-1.13.3.tar.gz) = dfc87477c0f53d3d2836a384c106373d761cc435eafc477f299523e5404dda43 +SIZE (ropper-1.13.3.tar.gz) = 68927 Added: head/security/py-ropper/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-ropper/pkg-descr Mon Mar 2 14:37:39 2020 (r527637) @@ -0,0 +1,22 @@ +You can use ropper to look at information about files in different +file formats and you can find ROP and JOP gadgets to build chains for +different architectures. Ropper supports ELF, MachO and the PE file +format. Other files can be opened in RAW format. The following +architectures are supported: + +- x86 / x86_64 +- Mips / Mips64 +- ARM (also Thumb Mode)/ ARM64 +- PowerPC / PowerPC64 + +Ropper is inspired by ROPgadget, but should be more than a gadgets +finder. So it is possible to show information about a binary like +header, segments, sections etc. Furthermore it is possible to edit the +binaries and edit the header fields, but currently this is not fully +implemented and in a experimental state. For disassembly ropper uses +the awesome Capstone Framework. + +Now you can generate rop chain automatically (auto-roper) for execve +and mprotect syscall. + +WWW: https://scoding.de/ropper/