From c1b891ac6e2fa8defc1660bc52b73eec69fb517b Mon Sep 17 00:00:00 2001 From: CoprDistGit Date: Wed, 31 May 2023 08:19:28 +0000 Subject: automatic import of python-andriller --- .gitignore | 1 + python-andriller.spec | 122 ++++++++++++++++++++++++++++++++++++++++++++++++++ sources | 1 + 3 files changed, 124 insertions(+) create mode 100644 python-andriller.spec create mode 100644 sources diff --git a/.gitignore b/.gitignore index e69de29..4bfa22e 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1 @@ +/andriller-3.6.3.tar.gz diff --git a/python-andriller.spec b/python-andriller.spec new file mode 100644 index 0000000..61aab58 --- /dev/null +++ b/python-andriller.spec @@ -0,0 +1,122 @@ +%global _empty_manifest_terminate_build 0 +Name: python-andriller +Version: 3.6.3 +Release: 1 +Summary: Andriller CE | Android Forensic Tools +License: MIT License +URL: https://github.com/den4uk/andriller +Source0: https://mirrors.nju.edu.cn/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz +BuildArch: noarch + +Requires: python3-dateutils +Requires: python3-javaobj-py3 +Requires: python3-pycryptodomex +Requires: python3-dateutil +Requires: python3-XlsxWriter +Requires: python3-Jinja2 +Requires: python3-MarkupSafe +Requires: python3-wrapt-timeout-decorator +Requires: python3-appdirs +Requires: python3-requests +Requires: python3-dataclasses + +%description +![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) +[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package -n python3-andriller +Summary: Andriller CE | Android Forensic Tools +Provides: python-andriller +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-andriller +![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) +[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%package help +Summary: Development documents and examples for andriller +Provides: python3-andriller-doc +%description help +![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) +[![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) +[![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) +Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. +## Features +- Automated data extraction and decoding +- Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) +- Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) +- Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) +- Selection of individual database decoders for Android apps +- Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) +- Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) +- Unpacking the Android backup files + +%prep +%autosetup -n andriller-3.6.3 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-andriller -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Wed May 31 2023 Python_Bot - 3.6.3-1 +- Package Spec generated diff --git a/sources b/sources new file mode 100644 index 0000000..538e49a --- /dev/null +++ b/sources @@ -0,0 +1 @@ +2b50a776e5aa0c1a6cbccef53c6975fd andriller-3.6.3.tar.gz -- cgit v1.2.3