summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-05-10 07:41:14 +0000
committerCoprDistGit <infra@openeuler.org>2023-05-10 07:41:14 +0000
commitc26bb1aaf0ba1a0fc49f3b9f7e874f0f21e75ae5 (patch)
treea434b8619f14a6cf8d11f89c3bbebe2c13b52d71
parent44c030c49f0a42a8ce2b62dbd8176f90c96acdf7 (diff)
automatic import of python-qiling
-rw-r--r--.gitignore1
-rw-r--r--python-qiling.spec220
-rw-r--r--sources1
3 files changed, 222 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..b2a9a09 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/qiling-1.4.5.tar.gz
diff --git a/python-qiling.spec b/python-qiling.spec
new file mode 100644
index 0000000..73e831d
--- /dev/null
+++ b/python-qiling.spec
@@ -0,0 +1,220 @@
+%global _empty_manifest_terminate_build 0
+Name: python-qiling
+Version: 1.4.5
+Release: 1
+Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture
+License: GPLv2
+URL: http://qiling.io
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/10/49/7b8aec99bf42b315ac6e75e31898e088478fd1c8cbd29fb52a90f5ee5c33/qiling-1.4.5.tar.gz
+BuildArch: noarch
+
+Requires: python3-capstone
+Requires: python3-unicorn
+Requires: python3-pefile
+Requires: python3-registry
+Requires: python3-keystone-engine
+Requires: python3-pyelftools
+Requires: python3-gevent
+Requires: python3-multiprocess
+Requires: python3-pyyaml
+Requires: python3-fx
+Requires: python3-questionary
+Requires: python3-termcolor
+Requires: python3-windows-curses
+Requires: python3-r2libr
+Requires: python3-blake2b-py
+Requires: python3-eth-keys
+Requires: python3-eth-typing
+Requires: python3-eth-utils
+Requires: python3-eth-abi
+Requires: python3-lru-dict
+Requires: python3-py-ecc
+Requires: python3-rlp
+Requires: python3-trie
+Requires: python3-eth-hash[pycryptodome]
+Requires: python3-numpy
+Requires: python3-rich
+Requires: python3-cmd2
+Requires: python3-cached-property
+Requires: python3-typing-extensions
+Requires: python3-unicornafl
+Requires: python3-fuzzercorn
+
+%description
+<p align="center">
+<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png">
+</p>
+[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134)
+Qiling is an advanced binary emulation framework, with the following features:
+- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine
+- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC
+- Support multiple file formats: PE, MachO, ELF, COM, MBR
+- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/)
+- Emulates & sandbox code in an isolated environment
+- Provides a fully configurable sandbox
+- Provides in-depth memory, register, OS level and filesystem level API
+- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc)
+- Provides virtual machine level API such as save and restore current execution state
+- Supports cross architecture and platform debugging capabilities
+- Built-in debugger with reverse debugging capability
+- Allows dynamic hotpatch on-the-fly running code, including the loaded library
+- True framework in Python, making it easy to build customized security analysis tools on top
+Qiling also made its way to various international conferences.
+2022:
+- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553)
+- [Black Hat, MEA](https://blackhatmea.com/node/724)
+2021:
+- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119)
+- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/)
+- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643)
+2020:
+- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781)
+- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062)
+- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009)
+- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245)
+- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/)
+- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/)
+- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/)
+- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php)
+2019:
+- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing)
+- [Hitcon](https://hitcon.org/2019/CMT/agenda)
+- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/)
+Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org).
+
+%package -n python3-qiling
+Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture
+Provides: python-qiling
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-qiling
+<p align="center">
+<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png">
+</p>
+[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134)
+Qiling is an advanced binary emulation framework, with the following features:
+- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine
+- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC
+- Support multiple file formats: PE, MachO, ELF, COM, MBR
+- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/)
+- Emulates & sandbox code in an isolated environment
+- Provides a fully configurable sandbox
+- Provides in-depth memory, register, OS level and filesystem level API
+- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc)
+- Provides virtual machine level API such as save and restore current execution state
+- Supports cross architecture and platform debugging capabilities
+- Built-in debugger with reverse debugging capability
+- Allows dynamic hotpatch on-the-fly running code, including the loaded library
+- True framework in Python, making it easy to build customized security analysis tools on top
+Qiling also made its way to various international conferences.
+2022:
+- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553)
+- [Black Hat, MEA](https://blackhatmea.com/node/724)
+2021:
+- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119)
+- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/)
+- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643)
+2020:
+- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781)
+- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062)
+- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009)
+- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245)
+- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/)
+- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/)
+- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/)
+- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php)
+2019:
+- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing)
+- [Hitcon](https://hitcon.org/2019/CMT/agenda)
+- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/)
+Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org).
+
+%package help
+Summary: Development documents and examples for qiling
+Provides: python3-qiling-doc
+%description help
+<p align="center">
+<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png">
+</p>
+[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134)
+Qiling is an advanced binary emulation framework, with the following features:
+- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine
+- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC
+- Support multiple file formats: PE, MachO, ELF, COM, MBR
+- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/)
+- Emulates & sandbox code in an isolated environment
+- Provides a fully configurable sandbox
+- Provides in-depth memory, register, OS level and filesystem level API
+- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc)
+- Provides virtual machine level API such as save and restore current execution state
+- Supports cross architecture and platform debugging capabilities
+- Built-in debugger with reverse debugging capability
+- Allows dynamic hotpatch on-the-fly running code, including the loaded library
+- True framework in Python, making it easy to build customized security analysis tools on top
+Qiling also made its way to various international conferences.
+2022:
+- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553)
+- [Black Hat, MEA](https://blackhatmea.com/node/724)
+2021:
+- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119)
+- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/)
+- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643)
+2020:
+- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781)
+- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062)
+- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009)
+- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245)
+- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/)
+- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/)
+- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/)
+- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php)
+2019:
+- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing)
+- [Hitcon](https://hitcon.org/2019/CMT/agenda)
+- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/)
+Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org).
+
+%prep
+%autosetup -n qiling-1.4.5
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-qiling -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Wed May 10 2023 Python_Bot <Python_Bot@openeuler.org> - 1.4.5-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..5a16ca9
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+6d431908c4267447b3d71a889fb58d17 qiling-1.4.5.tar.gz