diff options
author | CoprDistGit <infra@openeuler.org> | 2023-05-31 08:19:28 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2023-05-31 08:19:28 +0000 |
commit | c1b891ac6e2fa8defc1660bc52b73eec69fb517b (patch) | |
tree | 53b3713cc4d2a87bec03126e4cdd1e75799a2721 /python-andriller.spec | |
parent | 065f72a34f5b46a144cb222ffe3b388af26c6b94 (diff) |
automatic import of python-andriller
Diffstat (limited to 'python-andriller.spec')
-rw-r--r-- | python-andriller.spec | 122 |
1 files changed, 122 insertions, 0 deletions
diff --git a/python-andriller.spec b/python-andriller.spec new file mode 100644 index 0000000..61aab58 --- /dev/null +++ b/python-andriller.spec @@ -0,0 +1,122 @@ +%global _empty_manifest_terminate_build 0 +Name: python-andriller +Version: 3.6.3 +Release: 1 +Summary: Andriller CE | Android Forensic Tools +License: MIT License +URL: https://github.com/den4uk/andriller +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz +BuildArch: noarch + +Requires: python3-dateutils +Requires: python3-javaobj-py3 +Requires: python3-pycryptodomex +Requires: python3-dateutil +Requires: python3-XlsxWriter +Requires: python3-Jinja2 +Requires: python3-MarkupSafe +Requires: python3-wrapt-timeout-decorator +Requires: python3-appdirs +Requires: python3-requests +Requires: python3-dataclasses + +%description + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package -n python3-andriller +Summary: Andriller CE | Android Forensic Tools +Provides: python-andriller +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-andriller + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package help +Summary: Development documents and examples for andriller +Provides: python3-andriller-doc +%description help + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%prep +%autosetup -n andriller-3.6.3 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-andriller -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 31 2023 Python_Bot <Python_Bot@openeuler.org> - 3.6.3-1 +- Package Spec generated |