summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.gitignore1
-rw-r--r--python-andriller.spec122
-rw-r--r--sources1
3 files changed, 124 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..4bfa22e 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/andriller-3.6.3.tar.gz
diff --git a/python-andriller.spec b/python-andriller.spec
new file mode 100644
index 0000000..61aab58
--- /dev/null
+++ b/python-andriller.spec
@@ -0,0 +1,122 @@
+%global _empty_manifest_terminate_build 0
+Name: python-andriller
+Version: 3.6.3
+Release: 1
+Summary: Andriller CE | Android Forensic Tools
+License: MIT License
+URL: https://github.com/den4uk/andriller
+Source0: https://mirrors.nju.edu.cn/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz
+BuildArch: noarch
+
+Requires: python3-dateutils
+Requires: python3-javaobj-py3
+Requires: python3-pycryptodomex
+Requires: python3-dateutil
+Requires: python3-XlsxWriter
+Requires: python3-Jinja2
+Requires: python3-MarkupSafe
+Requires: python3-wrapt-timeout-decorator
+Requires: python3-appdirs
+Requires: python3-requests
+Requires: python3-dataclasses
+
+%description
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%package -n python3-andriller
+Summary: Andriller CE | Android Forensic Tools
+Provides: python-andriller
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-andriller
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%package help
+Summary: Development documents and examples for andriller
+Provides: python3-andriller-doc
+%description help
+![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg)
+[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller)
+[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk)
+Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
+## Features
+- Automated data extraction and decoding
+- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
+- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
+- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files)
+- Selection of individual database decoders for Android apps
+- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file)
+- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
+- Unpacking the Android backup files
+
+%prep
+%autosetup -n andriller-3.6.3
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-andriller -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Wed May 31 2023 Python_Bot <Python_Bot@openeuler.org> - 3.6.3-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..538e49a
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+2b50a776e5aa0c1a6cbccef53c6975fd andriller-3.6.3.tar.gz