diff options
author | CoprDistGit <infra@openeuler.org> | 2023-05-10 07:41:14 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-05-10 07:41:14 +0000 |
commit | c26bb1aaf0ba1a0fc49f3b9f7e874f0f21e75ae5 (patch) | |
tree | a434b8619f14a6cf8d11f89c3bbebe2c13b52d71 | |
parent | 44c030c49f0a42a8ce2b62dbd8176f90c96acdf7 (diff) |
automatic import of python-qiling
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-qiling.spec | 220 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 222 insertions, 0 deletions
@@ -0,0 +1 @@ +/qiling-1.4.5.tar.gz diff --git a/python-qiling.spec b/python-qiling.spec new file mode 100644 index 0000000..73e831d --- /dev/null +++ b/python-qiling.spec @@ -0,0 +1,220 @@ +%global _empty_manifest_terminate_build 0 +Name: python-qiling +Version: 1.4.5 +Release: 1 +Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture +License: GPLv2 +URL: http://qiling.io +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/10/49/7b8aec99bf42b315ac6e75e31898e088478fd1c8cbd29fb52a90f5ee5c33/qiling-1.4.5.tar.gz +BuildArch: noarch + +Requires: python3-capstone +Requires: python3-unicorn +Requires: python3-pefile +Requires: python3-registry +Requires: python3-keystone-engine +Requires: python3-pyelftools +Requires: python3-gevent +Requires: python3-multiprocess +Requires: python3-pyyaml +Requires: python3-fx +Requires: python3-questionary +Requires: python3-termcolor +Requires: python3-windows-curses +Requires: python3-r2libr +Requires: python3-blake2b-py +Requires: python3-eth-keys +Requires: python3-eth-typing +Requires: python3-eth-utils +Requires: python3-eth-abi +Requires: python3-lru-dict +Requires: python3-py-ecc +Requires: python3-rlp +Requires: python3-trie +Requires: python3-eth-hash[pycryptodome] +Requires: python3-numpy +Requires: python3-rich +Requires: python3-cmd2 +Requires: python3-cached-property +Requires: python3-typing-extensions +Requires: python3-unicornafl +Requires: python3-fuzzercorn + +%description +<p align="center"> +<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png"> +</p> +[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) +Qiling is an advanced binary emulation framework, with the following features: +- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine +- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC +- Support multiple file formats: PE, MachO, ELF, COM, MBR +- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) +- Emulates & sandbox code in an isolated environment +- Provides a fully configurable sandbox +- Provides in-depth memory, register, OS level and filesystem level API +- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) +- Provides virtual machine level API such as save and restore current execution state +- Supports cross architecture and platform debugging capabilities +- Built-in debugger with reverse debugging capability +- Allows dynamic hotpatch on-the-fly running code, including the loaded library +- True framework in Python, making it easy to build customized security analysis tools on top +Qiling also made its way to various international conferences. +2022: +- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) +- [Black Hat, MEA](https://blackhatmea.com/node/724) +2021: +- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) +- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) +- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) +2020: +- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) +- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) +- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) +- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) +- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) +- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) +- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) +- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) +2019: +- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) +- [Hitcon](https://hitcon.org/2019/CMT/agenda) +- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) +Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). + +%package -n python3-qiling +Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture +Provides: python-qiling +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-qiling +<p align="center"> +<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png"> +</p> +[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) +Qiling is an advanced binary emulation framework, with the following features: +- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine +- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC +- Support multiple file formats: PE, MachO, ELF, COM, MBR +- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) +- Emulates & sandbox code in an isolated environment +- Provides a fully configurable sandbox +- Provides in-depth memory, register, OS level and filesystem level API +- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) +- Provides virtual machine level API such as save and restore current execution state +- Supports cross architecture and platform debugging capabilities +- Built-in debugger with reverse debugging capability +- Allows dynamic hotpatch on-the-fly running code, including the loaded library +- True framework in Python, making it easy to build customized security analysis tools on top +Qiling also made its way to various international conferences. +2022: +- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) +- [Black Hat, MEA](https://blackhatmea.com/node/724) +2021: +- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) +- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) +- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) +2020: +- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) +- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) +- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) +- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) +- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) +- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) +- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) +- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) +2019: +- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) +- [Hitcon](https://hitcon.org/2019/CMT/agenda) +- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) +Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). + +%package help +Summary: Development documents and examples for qiling +Provides: python3-qiling-doc +%description help +<p align="center"> +<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png"> +</p> +[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) +Qiling is an advanced binary emulation framework, with the following features: +- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine +- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC +- Support multiple file formats: PE, MachO, ELF, COM, MBR +- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) +- Emulates & sandbox code in an isolated environment +- Provides a fully configurable sandbox +- Provides in-depth memory, register, OS level and filesystem level API +- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) +- Provides virtual machine level API such as save and restore current execution state +- Supports cross architecture and platform debugging capabilities +- Built-in debugger with reverse debugging capability +- Allows dynamic hotpatch on-the-fly running code, including the loaded library +- True framework in Python, making it easy to build customized security analysis tools on top +Qiling also made its way to various international conferences. +2022: +- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) +- [Black Hat, MEA](https://blackhatmea.com/node/724) +2021: +- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) +- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) +- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) +2020: +- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) +- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) +- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) +- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) +- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) +- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) +- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) +- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) +2019: +- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) +- [Hitcon](https://hitcon.org/2019/CMT/agenda) +- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) +Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). + +%prep +%autosetup -n qiling-1.4.5 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-qiling -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 10 2023 Python_Bot <Python_Bot@openeuler.org> - 1.4.5-1 +- Package Spec generated @@ -0,0 +1 @@ +6d431908c4267447b3d71a889fb58d17 qiling-1.4.5.tar.gz |