Date: Tue, 21 Jan 2020 10:01:06 +0000 (UTC) From: Antoine Brodin <antoine@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r523711 - in head/security: . py-volatility3 Message-ID: <202001211001.00LA16Ch093280@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: antoine Date: Tue Jan 21 10:01:05 2020 New Revision: 523711 URL: https://svnweb.freebsd.org/changeset/ports/523711 Log: New port: security/py-volatility3 Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. WWW: http://www.volatilityfoundation.org/ Added: head/security/py-volatility3/ head/security/py-volatility3/Makefile (contents, props changed) head/security/py-volatility3/distinfo (contents, props changed) head/security/py-volatility3/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Tue Jan 21 09:35:30 2020 (r523710) +++ head/security/Makefile Tue Jan 21 10:01:05 2020 (r523711) @@ -1010,6 +1010,7 @@ SUBDIR += py-txtorcon SUBDIR += py-virustotal-api SUBDIR += py-volatility + SUBDIR += py-volatility3 SUBDIR += py-vulndb SUBDIR += py-xmlsec SUBDIR += py-yara Added: head/security/py-volatility3/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-volatility3/Makefile Tue Jan 21 10:01:05 2020 (r523711) @@ -0,0 +1,31 @@ +# $FreeBSD$ + +PORTNAME= volatility3 +DISTVERSION= g20200117 +CATEGORIES= security python +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= antoine@FreeBSD.org +COMMENT= Advanced memory forensics framework + +LICENSE= VSL +LICENSE_NAME= Volatility Software License +LICENSE_FILE= ${WRKSRC}/LICENSE.txt +LICENSE_PERMS= dist-mirror dist-sell pkg-mirror pkg-sell auto-accept + +RUN_DEPENDS= ca_root_nss>=0:security/ca_root_nss \ + ${PYTHON_PKGNAMEPREFIX}capstone>=0:devel/py-capstone@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}jsonschema>=0:devel/py-jsonschema@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}pefile>=0:devel/py-pefile@${PY_FLAVOR} \ + ${PYTHON_PKGNAMEPREFIX}yara>=0:security/py-yara@${PY_FLAVOR} + +USE_GITHUB= yes +GH_ACCOUNT= volatilityfoundation +GH_TAGNAME= 9fe6e6b + +USES= python:3.5+ +USE_PYTHON= distutils autoplist + +NO_ARCH= yes + +.include <bsd.port.mk> Added: head/security/py-volatility3/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-volatility3/distinfo Tue Jan 21 10:01:05 2020 (r523711) @@ -0,0 +1,3 @@ +TIMESTAMP = 1579598659 +SHA256 (volatilityfoundation-volatility3-g20200117-9fe6e6b_GH0.tar.gz) = 226be8883f36d5807b7755cd4ebadcdf3064eabf2e27f63b352267243140fb6b +SIZE (volatilityfoundation-volatility3-g20200117-9fe6e6b_GH0.tar.gz) = 282181 Added: head/security/py-volatility3/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-volatility3/pkg-descr Tue Jan 21 10:01:05 2020 (r523711) @@ -0,0 +1,9 @@ +Volatility is the world's most widely used framework for extracting digital +artifacts from volatile memory (RAM) samples. The extraction techniques are +performed completely independent of the system being investigated but offer +visibility into the runtime state of the system. The framework is intended to +introduce people to the techniques and complexities associated with extracting +digital artifacts from volatile memory samples and provide a platform for +further work into this exciting area of research. + +WWW: http://www.volatilityfoundation.org/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202001211001.00LA16Ch093280>