Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 5 Oct 2014 20:12:24 +0000 (UTC)
From:      Antoine Brodin <antoine@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r370110 - in head/security: . py-rekall
Message-ID:  <201410052012.s95KCOts088099@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: antoine
Date: Sun Oct  5 20:12:23 2014
New Revision: 370110
URL: https://svnweb.freebsd.org/changeset/ports/370110
QAT: https://qat.redports.org/buildarchive/r370110/

Log:
  New port: security/py-rekall
  
  The Rekall Framework is a completely open collection of tools, implemented in
  Python under the GNU General Public License, for the extraction of digital
  artifacts from volatile memory (RAM) samples. The extraction techniques are
  performed completely independent of the system being investigated but offer
  visibility into the runtime state of the system. The framework is intended to
  introduce people to the techniques and complexities associated with extracting
  digital artifacts from volatile memory samples and provide a platform for
  further work into this exciting area of research.
  
  WWW: http://www.rekall-forensic.com/

Added:
  head/security/py-rekall/
  head/security/py-rekall/Makefile   (contents, props changed)
  head/security/py-rekall/distinfo   (contents, props changed)
  head/security/py-rekall/pkg-descr   (contents, props changed)
Modified:
  head/security/Makefile

Modified: head/security/Makefile
==============================================================================
--- head/security/Makefile	Sun Oct  5 19:59:18 2014	(r370109)
+++ head/security/Makefile	Sun Oct  5 20:12:23 2014	(r370110)
@@ -795,6 +795,7 @@
     SUBDIR += py-pyptlib
     SUBDIR += py-pysha3
     SUBDIR += py-python-registry
+    SUBDIR += py-rekall
     SUBDIR += py-rsa
     SUBDIR += py-service_identity
     SUBDIR += py-slowaes

Added: head/security/py-rekall/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-rekall/Makefile	Sun Oct  5 20:12:23 2014	(r370110)
@@ -0,0 +1,46 @@
+# Created by: antoine@FreeBSD.org
+# $FreeBSD$
+
+PORTNAME=	rekall
+DISTVERSION=	1.1.0.beta
+CATEGORIES=	security python
+MASTER_SITES=	CHEESESHOP
+PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
+
+MAINTAINER=	antoine@FreeBSD.org
+COMMENT=	Memory forensics analysis framework
+
+LICENSE=	GPLv2
+LICENSE_FILE=	${WRKSRC}/LICENSE.txt
+
+RUN_DEPENDS=	cabextract:${PORTSDIR}/archivers/cabextract \
+		${PYTHON_PKGNAMEPREFIX}acora>=1.8:${PORTSDIR}/textproc/py-acora \
+		${PYTHON_PKGNAMEPREFIX}codegen>=1.0:${PORTSDIR}/devel/py-codegen \
+		${PYTHON_PKGNAMEPREFIX}distorm>=0:${PORTSDIR}/devel/py-distorm \
+		${PYTHON_PKGNAMEPREFIX}Flask>=0.10.1:${PORTSDIR}/www/py-flask \
+		${PYTHON_PKGNAMEPREFIX}Flask-Sockets>=0:${PORTSDIR}/www/py-flask-sockets \
+		${PYTHON_PKGNAMEPREFIX}gevent>=1.0.1:${PORTSDIR}/devel/py-gevent \
+		${PYTHON_PKGNAMEPREFIX}gevent-websocket>=0.9.3:${PORTSDIR}/www/py-gevent-websocket \
+		${PYTHON_PKGNAMEPREFIX}ipython>=2.0.0:${PORTSDIR}/devel/ipython \
+		${PYTHON_PKGNAMEPREFIX}pycrypto>=2.3.1:${PORTSDIR}/security/py-pycrypto \
+		${PYTHON_PKGNAMEPREFIX}pyelftools>=0.21:${PORTSDIR}/devel/py-pyelftools \
+		${PYTHON_PKGNAMEPREFIX}pytz>=2012:${PORTSDIR}/devel/py-pytz \
+		${PYTHON_PKGNAMEPREFIX}yaml>=2.10:${PORTSDIR}/devel/py-yaml \
+		${PYTHON_PKGNAMEPREFIX}yara>=0:${PORTSDIR}/security/py-yara
+
+USES=		python:2
+USE_PYTHON=	distutils autoplist
+
+PORTDOCS=	CREDITS.txt LEGAL.txt README.md
+
+OPTIONS_DEFINE=	DOCS
+
+post-patch:
+	@${CHMOD} -R a+rX ${WRKSRC}
+	@${REINPLACE_CMD} '/argparse/d' ${WRKSRC}/setup.py
+
+post-install:
+	@${MKDIR} ${STAGEDIR}${DOCSDIR}
+	${INSTALL_DATA} ${PORTDOCS:S,^,${WRKSRC}/,} ${STAGEDIR}${DOCSDIR}
+
+.include <bsd.port.mk>

Added: head/security/py-rekall/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-rekall/distinfo	Sun Oct  5 20:12:23 2014	(r370110)
@@ -0,0 +1,2 @@
+SHA256 (rekall-1.1.0.beta.tar.gz) = 2815ec19aefe7c3ef48a49b5a054f0c8d9242cc9855e525a2ea872ff3da2f4d6
+SIZE (rekall-1.1.0.beta.tar.gz) = 3510576

Added: head/security/py-rekall/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/py-rekall/pkg-descr	Sun Oct  5 20:12:23 2014	(r370110)
@@ -0,0 +1,10 @@
+The Rekall Framework is a completely open collection of tools, implemented in
+Python under the GNU General Public License, for the extraction of digital
+artifacts from volatile memory (RAM) samples. The extraction techniques are
+performed completely independent of the system being investigated but offer
+visibility into the runtime state of the system. The framework is intended to
+introduce people to the techniques and complexities associated with extracting
+digital artifacts from volatile memory samples and provide a platform for
+further work into this exciting area of research.
+
+WWW: http://www.rekall-forensic.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410052012.s95KCOts088099>