diff options
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-andriller.spec | 122 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 124 insertions, 0 deletions
@@ -0,0 +1 @@ +/andriller-3.6.3.tar.gz diff --git a/python-andriller.spec b/python-andriller.spec new file mode 100644 index 0000000..61aab58 --- /dev/null +++ b/python-andriller.spec @@ -0,0 +1,122 @@ +%global _empty_manifest_terminate_build 0 +Name: python-andriller +Version: 3.6.3 +Release: 1 +Summary: Andriller CE | Android Forensic Tools +License: MIT License +URL: https://github.com/den4uk/andriller +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz +BuildArch: noarch + +Requires: python3-dateutils +Requires: python3-javaobj-py3 +Requires: python3-pycryptodomex +Requires: python3-dateutil +Requires: python3-XlsxWriter +Requires: python3-Jinja2 +Requires: python3-MarkupSafe +Requires: python3-wrapt-timeout-decorator +Requires: python3-appdirs +Requires: python3-requests +Requires: python3-dataclasses + +%description + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package -n python3-andriller +Summary: Andriller CE | Android Forensic Tools +Provides: python-andriller +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-andriller + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package help +Summary: Development documents and examples for andriller +Provides: python3-andriller-doc +%description help + +[](https://pypi.python.org/pypi/andriller) +[](https://pypi.python.org/pypi/andriller) +[](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%prep +%autosetup -n andriller-3.6.3 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-andriller -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 31 2023 Python_Bot <Python_Bot@openeuler.org> - 3.6.3-1 +- Package Spec generated @@ -0,0 +1 @@ +2b50a776e5aa0c1a6cbccef53c6975fd andriller-3.6.3.tar.gz |