Date: Sun, 5 Oct 2014 20:12:24 +0000 (UTC) From: Antoine Brodin <antoine@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r370110 - in head/security: . py-rekall Message-ID: <201410052012.s95KCOts088099@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: antoine Date: Sun Oct 5 20:12:23 2014 New Revision: 370110 URL: https://svnweb.freebsd.org/changeset/ports/370110 QAT: https://qat.redports.org/buildarchive/r370110/ Log: New port: security/py-rekall The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. WWW: http://www.rekall-forensic.com/ Added: head/security/py-rekall/ head/security/py-rekall/Makefile (contents, props changed) head/security/py-rekall/distinfo (contents, props changed) head/security/py-rekall/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Sun Oct 5 19:59:18 2014 (r370109) +++ head/security/Makefile Sun Oct 5 20:12:23 2014 (r370110) @@ -795,6 +795,7 @@ SUBDIR += py-pyptlib SUBDIR += py-pysha3 SUBDIR += py-python-registry + SUBDIR += py-rekall SUBDIR += py-rsa SUBDIR += py-service_identity SUBDIR += py-slowaes Added: head/security/py-rekall/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-rekall/Makefile Sun Oct 5 20:12:23 2014 (r370110) @@ -0,0 +1,46 @@ +# Created by: antoine@FreeBSD.org +# $FreeBSD$ + +PORTNAME= rekall +DISTVERSION= 1.1.0.beta +CATEGORIES= security python +MASTER_SITES= CHEESESHOP +PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} + +MAINTAINER= antoine@FreeBSD.org +COMMENT= Memory forensics analysis framework + +LICENSE= GPLv2 +LICENSE_FILE= ${WRKSRC}/LICENSE.txt + +RUN_DEPENDS= cabextract:${PORTSDIR}/archivers/cabextract \ + ${PYTHON_PKGNAMEPREFIX}acora>=1.8:${PORTSDIR}/textproc/py-acora \ + ${PYTHON_PKGNAMEPREFIX}codegen>=1.0:${PORTSDIR}/devel/py-codegen \ + ${PYTHON_PKGNAMEPREFIX}distorm>=0:${PORTSDIR}/devel/py-distorm \ + ${PYTHON_PKGNAMEPREFIX}Flask>=0.10.1:${PORTSDIR}/www/py-flask \ + ${PYTHON_PKGNAMEPREFIX}Flask-Sockets>=0:${PORTSDIR}/www/py-flask-sockets \ + ${PYTHON_PKGNAMEPREFIX}gevent>=1.0.1:${PORTSDIR}/devel/py-gevent \ + ${PYTHON_PKGNAMEPREFIX}gevent-websocket>=0.9.3:${PORTSDIR}/www/py-gevent-websocket \ + ${PYTHON_PKGNAMEPREFIX}ipython>=2.0.0:${PORTSDIR}/devel/ipython \ + ${PYTHON_PKGNAMEPREFIX}pycrypto>=2.3.1:${PORTSDIR}/security/py-pycrypto \ + ${PYTHON_PKGNAMEPREFIX}pyelftools>=0.21:${PORTSDIR}/devel/py-pyelftools \ + ${PYTHON_PKGNAMEPREFIX}pytz>=2012:${PORTSDIR}/devel/py-pytz \ + ${PYTHON_PKGNAMEPREFIX}yaml>=2.10:${PORTSDIR}/devel/py-yaml \ + ${PYTHON_PKGNAMEPREFIX}yara>=0:${PORTSDIR}/security/py-yara + +USES= python:2 +USE_PYTHON= distutils autoplist + +PORTDOCS= CREDITS.txt LEGAL.txt README.md + +OPTIONS_DEFINE= DOCS + +post-patch: + @${CHMOD} -R a+rX ${WRKSRC} + @${REINPLACE_CMD} '/argparse/d' ${WRKSRC}/setup.py + +post-install: + @${MKDIR} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${PORTDOCS:S,^,${WRKSRC}/,} ${STAGEDIR}${DOCSDIR} + +.include <bsd.port.mk> Added: head/security/py-rekall/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-rekall/distinfo Sun Oct 5 20:12:23 2014 (r370110) @@ -0,0 +1,2 @@ +SHA256 (rekall-1.1.0.beta.tar.gz) = 2815ec19aefe7c3ef48a49b5a054f0c8d9242cc9855e525a2ea872ff3da2f4d6 +SIZE (rekall-1.1.0.beta.tar.gz) = 3510576 Added: head/security/py-rekall/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/py-rekall/pkg-descr Sun Oct 5 20:12:23 2014 (r370110) @@ -0,0 +1,10 @@ +The Rekall Framework is a completely open collection of tools, implemented in +Python under the GNU General Public License, for the extraction of digital +artifacts from volatile memory (RAM) samples. The extraction techniques are +performed completely independent of the system being investigated but offer +visibility into the runtime state of the system. The framework is intended to +introduce people to the techniques and complexities associated with extracting +digital artifacts from volatile memory samples and provide a platform for +further work into this exciting area of research. + +WWW: http://www.rekall-forensic.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410052012.s95KCOts088099>