1 | # -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 |
---|
2 | # $Id: Portfile 70206 2010-08-01 23:28:25Z ryandesign@macports.org $ |
---|
3 | |
---|
4 | PortSystem 1.0 |
---|
5 | PortGroup python 1.0 |
---|
6 | PortGroup github 1.0 |
---|
7 | |
---|
8 | github.setup google rekall v1.0.2 |
---|
9 | categories security |
---|
10 | platforms darwin |
---|
11 | maintainers yahoo.fr:jul_bsd openmaintainer |
---|
12 | license GPL-2 |
---|
13 | |
---|
14 | description collection of tools for the extraction of digital \ |
---|
15 | artifacts from volatile memory (RAM) samples |
---|
16 | |
---|
17 | long_description The Rekall Framework is a completely open collection \ |
---|
18 | of tools, implemented in Python under the GNU General \ |
---|
19 | Public License, for the extraction of digital artifacts \ |
---|
20 | from volatile memory (RAM) samples. The extraction \ |
---|
21 | techniques are performed completely independent of \ |
---|
22 | the system being investigated but offer visibilty \ |
---|
23 | into the runtime state of the system. The framework \ |
---|
24 | is intended to introduce people to the techniques and \ |
---|
25 | complexities associated with extracting digital \ |
---|
26 | artifacts from volatile memory samples and provide a \ |
---|
27 | platform for further work into this exciting area of research. |
---|
28 | |
---|
29 | homepage http://www.rekall-forensic.com/ |
---|
30 | |
---|
31 | supported_archs noarch |
---|
32 | python.versions 26 27 |
---|
33 | python.default_version 27 |
---|
34 | |
---|
35 | checksums rmd160 b12a8e61a6545f925ac5803b2dad0459299259ef \ |
---|
36 | sha256 29bf4d261b937a1bddbf349eb62d71ef81afda353c296944480eb4449c65267f |
---|
37 | |
---|