summaryrefslogtreecommitdiff
path: root/python-andriller.spec
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-05-31 08:19:28 +0000
committerCoprDistGit <infra@openeuler.org>2023-05-31 08:19:28 +0000
commitc1b891ac6e2fa8defc1660bc52b73eec69fb517b (patch)
tree53b3713cc4d2a87bec03126e4cdd1e75799a2721 /python-andriller.spec
parent065f72a34f5b46a144cb222ffe3b388af26c6b94 (diff)
automatic import of python-andriller
Diffstat (limited to 'python-andriller.spec')
-rw-r--r--python-andriller.spec122
1 files changed, 122 insertions, 0 deletions
diff --git a/python-andriller.spec b/python-andriller.spec
new file mode 100644
index 0000000..61aab58
--- /dev/null
+++ b/python-andriller.spec
@@ -0,0 +1,122 @@
+%global _empty_manifest_terminate_build 0
+Name: python-andriller
+Version: 3.6.3
+Release: 1
+Summary: Andriller CE | Android Forensic Tools
+License: MIT License
+URL: https://github.com/den4uk/andriller
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz
+BuildArch: noarch
+
+Requires: python3-dateutils
+Requires: python3-javaobj-py3
+Requires: python3-pycryptodomex
+Requires: python3-dateutil
+Requires: python3-XlsxWriter
+Requires: python3-Jinja2
+Requires: python3-MarkupSafe
+Requires: python3-wrapt-timeout-decorator
+Requires: python3-appdirs
+Requires: python3-requests
+Requires: python3-dataclasses
+
+%description
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%package -n python3-andriller
+Summary: Andriller CE | Android Forensic Tools
+Provides: python-andriller
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-andriller
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%package help
+Summary: Development documents and examples for andriller
+Provides: python3-andriller-doc
+%description help
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%prep
+%autosetup -n andriller-3.6.3
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-andriller -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Wed May 31 2023 Python_Bot <Python_Bot@openeuler.org> - 3.6.3-1
+- Package Spec generated