diff options
Diffstat (limited to 'python-rekall.spec')
-rw-r--r-- | python-rekall.spec | 504 |
1 files changed, 504 insertions, 0 deletions
diff --git a/python-rekall.spec b/python-rekall.spec new file mode 100644 index 0000000..f3e8b7f --- /dev/null +++ b/python-rekall.spec @@ -0,0 +1,504 @@ +%global _empty_manifest_terminate_build 0 +Name: python-rekall +Version: 1.7.1 +Release: 1 +Summary: Rekall Memory Forensic Framework +License: GPL +URL: https://www.rekall-forensic.com/ +Source0: https://mirrors.aliyun.com/pypi/web/packages/af/38/af50983839850a2f803ee7d67a4659580906c32aabc6467eca5695b7c95a/rekall-1.7.1.zip +BuildArch: noarch + + +%description +# The Rekall Forensic and Incident Response Framework + +The Rekall Framework is a completely open collection of tools, +implemented in Python under the Apache and GNU General Public License, +for the extraction and analysis of digital artifacts computer systems. + +The Rekall distribution is available from: +<http://www.rekall-forensic.com/> + +Rekall should run on any platform that supports +[Python](http://www.python.org) + +Rekall supports investigations of the following 32bit and 64bit memory +images: + +- Microsoft Windows XP Service Pack 2 and 3 +- Microsoft Windows 7 Service Pack 0 and 1 +- Microsoft Windows 8 and 8.1 +- Microsoft Windows 10 +- Linux Kernels 2.6.24 to 4.4. +- OSX 10.7-10.12.x. + +Rekall also provides a complete memory sample acquisition capability for all +major operating systems (see the tools directory). + +## Quick start + +Rekall is available as a python package installable via the pip +package manager. To install it, first create a virtal env, switch to +it and then install rekall: + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ pip install rekall-agent rekall +``` + +For windows, Rekall is also available as a self contained installer +package. Please check the download page for the most appropriate installer to +use [Rekall-Forensic.com](http://www.rekall-forensic.com/) + +To install from this git repository you will need to use pip +--editable and follow the correct order of installation (otherwise pip +will pull released dependencies which might be older): + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ git clone https://github.com/google/rekall.git rekall +$ pip install --editable rekall/rekall-lib +$ pip install --editable rekall/rekall-core +$ pip install --editable rekall/rekall-agent +$ pip install --editable rekall +``` + +On Windows you will need to install the Microsoft Visual C compilers +for python (for more info see this blog post +http://rekall-forensic.blogspot.ch/2015/09/installing-rekall-on-windows.html) + +## Mailing Lists + +Mailing lists to support the users and developers of Rekall +can be found at the following address: + + rekall-discuss@googlegroups.com + +## Licensing and Copyright + +Copyright (C) 2007-2011 Volatile Systems +Copyright 2012-2016 Google Inc. All Rights Reserved. + +All Rights Reserved + +This program is free software; you can redistribute it and/or +modify it under the terms of the GNU General Public License +as published by the Free Software Foundation; either version 2 +of the License, or (at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA +02111-1307, USA. + + +## Bugs and Support + +There is no support provided with Rekall. There is NO +warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR +PURPOSE. + +If you think you've found a bug, please report it at: + + https://github.com/google/rekall/issues + +In order to help us solve your issues as quickly as possible, +please include the following information when filing a bug: + +* The version of rekall you're using +* The operating system used to run rekall +* The version of python used to run rekall +* The suspected operating system of the memory image +* The complete command line you used to run rekall + +## History + +In December 2011, a new branch within the Volatility project was created to +explore how to make the code base more modular, improve performance, and +increase usability. The modularity allowed Volatility to be used in GRR, making +memory analysis a core part of a strategy to enable remote live forensics. As a +result, both GRR and Volatility would be able to use each other's strengths. + +Over time this branch has become known as the "scudette" branch or the +"Technology Preview" branch. It was always a goal to try to get these changes +into the main Volatility code base. But, after two years of ongoing +development, the "Technology Preview" was never accepted into the Volatility +trunk version. + +Since it seemed unlikely these changes would be incorporated in the future, it +made sense to develop the Technology Preview branch as a separate project. On +December 13, 2013, the former branch was forked to create a new stand-alone +project named "Rekall.” This new project incorporates changes made to streamline +the codebase so that Rekall can be used as a library. Methods for memory +acquisition and other outside contributions have also been included that were +not in the Volatility codebase. + +Rekall strives to advance the state of the art in memory analysis, implementing +the best algorithms currently available and a complete memory acquisition and +analysis solution for at least Windows, OSX and Linux. + + +## More documentation + +Further documentation is available at +http://www.rekall-forensic.com/ + +%package -n python3-rekall +Summary: Rekall Memory Forensic Framework +Provides: python-rekall +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-rekall +# The Rekall Forensic and Incident Response Framework + +The Rekall Framework is a completely open collection of tools, +implemented in Python under the Apache and GNU General Public License, +for the extraction and analysis of digital artifacts computer systems. + +The Rekall distribution is available from: +<http://www.rekall-forensic.com/> + +Rekall should run on any platform that supports +[Python](http://www.python.org) + +Rekall supports investigations of the following 32bit and 64bit memory +images: + +- Microsoft Windows XP Service Pack 2 and 3 +- Microsoft Windows 7 Service Pack 0 and 1 +- Microsoft Windows 8 and 8.1 +- Microsoft Windows 10 +- Linux Kernels 2.6.24 to 4.4. +- OSX 10.7-10.12.x. + +Rekall also provides a complete memory sample acquisition capability for all +major operating systems (see the tools directory). + +## Quick start + +Rekall is available as a python package installable via the pip +package manager. To install it, first create a virtal env, switch to +it and then install rekall: + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ pip install rekall-agent rekall +``` + +For windows, Rekall is also available as a self contained installer +package. Please check the download page for the most appropriate installer to +use [Rekall-Forensic.com](http://www.rekall-forensic.com/) + +To install from this git repository you will need to use pip +--editable and follow the correct order of installation (otherwise pip +will pull released dependencies which might be older): + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ git clone https://github.com/google/rekall.git rekall +$ pip install --editable rekall/rekall-lib +$ pip install --editable rekall/rekall-core +$ pip install --editable rekall/rekall-agent +$ pip install --editable rekall +``` + +On Windows you will need to install the Microsoft Visual C compilers +for python (for more info see this blog post +http://rekall-forensic.blogspot.ch/2015/09/installing-rekall-on-windows.html) + +## Mailing Lists + +Mailing lists to support the users and developers of Rekall +can be found at the following address: + + rekall-discuss@googlegroups.com + +## Licensing and Copyright + +Copyright (C) 2007-2011 Volatile Systems +Copyright 2012-2016 Google Inc. All Rights Reserved. + +All Rights Reserved + +This program is free software; you can redistribute it and/or +modify it under the terms of the GNU General Public License +as published by the Free Software Foundation; either version 2 +of the License, or (at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA +02111-1307, USA. + + +## Bugs and Support + +There is no support provided with Rekall. There is NO +warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR +PURPOSE. + +If you think you've found a bug, please report it at: + + https://github.com/google/rekall/issues + +In order to help us solve your issues as quickly as possible, +please include the following information when filing a bug: + +* The version of rekall you're using +* The operating system used to run rekall +* The version of python used to run rekall +* The suspected operating system of the memory image +* The complete command line you used to run rekall + +## History + +In December 2011, a new branch within the Volatility project was created to +explore how to make the code base more modular, improve performance, and +increase usability. The modularity allowed Volatility to be used in GRR, making +memory analysis a core part of a strategy to enable remote live forensics. As a +result, both GRR and Volatility would be able to use each other's strengths. + +Over time this branch has become known as the "scudette" branch or the +"Technology Preview" branch. It was always a goal to try to get these changes +into the main Volatility code base. But, after two years of ongoing +development, the "Technology Preview" was never accepted into the Volatility +trunk version. + +Since it seemed unlikely these changes would be incorporated in the future, it +made sense to develop the Technology Preview branch as a separate project. On +December 13, 2013, the former branch was forked to create a new stand-alone +project named "Rekall.” This new project incorporates changes made to streamline +the codebase so that Rekall can be used as a library. Methods for memory +acquisition and other outside contributions have also been included that were +not in the Volatility codebase. + +Rekall strives to advance the state of the art in memory analysis, implementing +the best algorithms currently available and a complete memory acquisition and +analysis solution for at least Windows, OSX and Linux. + + +## More documentation + +Further documentation is available at +http://www.rekall-forensic.com/ + +%package help +Summary: Development documents and examples for rekall +Provides: python3-rekall-doc +%description help +# The Rekall Forensic and Incident Response Framework + +The Rekall Framework is a completely open collection of tools, +implemented in Python under the Apache and GNU General Public License, +for the extraction and analysis of digital artifacts computer systems. + +The Rekall distribution is available from: +<http://www.rekall-forensic.com/> + +Rekall should run on any platform that supports +[Python](http://www.python.org) + +Rekall supports investigations of the following 32bit and 64bit memory +images: + +- Microsoft Windows XP Service Pack 2 and 3 +- Microsoft Windows 7 Service Pack 0 and 1 +- Microsoft Windows 8 and 8.1 +- Microsoft Windows 10 +- Linux Kernels 2.6.24 to 4.4. +- OSX 10.7-10.12.x. + +Rekall also provides a complete memory sample acquisition capability for all +major operating systems (see the tools directory). + +## Quick start + +Rekall is available as a python package installable via the pip +package manager. To install it, first create a virtal env, switch to +it and then install rekall: + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ pip install rekall-agent rekall +``` + +For windows, Rekall is also available as a self contained installer +package. Please check the download page for the most appropriate installer to +use [Rekall-Forensic.com](http://www.rekall-forensic.com/) + +To install from this git repository you will need to use pip +--editable and follow the correct order of installation (otherwise pip +will pull released dependencies which might be older): + +``` +$ virtualenv /tmp/MyEnv +New python executable in /tmp/MyEnv/bin/python +Installing setuptools, pip...done. +$ source /tmp/MyEnv/bin/activate +$ pip install --upgrade setuptools pip wheel +$ git clone https://github.com/google/rekall.git rekall +$ pip install --editable rekall/rekall-lib +$ pip install --editable rekall/rekall-core +$ pip install --editable rekall/rekall-agent +$ pip install --editable rekall +``` + +On Windows you will need to install the Microsoft Visual C compilers +for python (for more info see this blog post +http://rekall-forensic.blogspot.ch/2015/09/installing-rekall-on-windows.html) + +## Mailing Lists + +Mailing lists to support the users and developers of Rekall +can be found at the following address: + + rekall-discuss@googlegroups.com + +## Licensing and Copyright + +Copyright (C) 2007-2011 Volatile Systems +Copyright 2012-2016 Google Inc. All Rights Reserved. + +All Rights Reserved + +This program is free software; you can redistribute it and/or +modify it under the terms of the GNU General Public License +as published by the Free Software Foundation; either version 2 +of the License, or (at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA +02111-1307, USA. + + +## Bugs and Support + +There is no support provided with Rekall. There is NO +warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR +PURPOSE. + +If you think you've found a bug, please report it at: + + https://github.com/google/rekall/issues + +In order to help us solve your issues as quickly as possible, +please include the following information when filing a bug: + +* The version of rekall you're using +* The operating system used to run rekall +* The version of python used to run rekall +* The suspected operating system of the memory image +* The complete command line you used to run rekall + +## History + +In December 2011, a new branch within the Volatility project was created to +explore how to make the code base more modular, improve performance, and +increase usability. The modularity allowed Volatility to be used in GRR, making +memory analysis a core part of a strategy to enable remote live forensics. As a +result, both GRR and Volatility would be able to use each other's strengths. + +Over time this branch has become known as the "scudette" branch or the +"Technology Preview" branch. It was always a goal to try to get these changes +into the main Volatility code base. But, after two years of ongoing +development, the "Technology Preview" was never accepted into the Volatility +trunk version. + +Since it seemed unlikely these changes would be incorporated in the future, it +made sense to develop the Technology Preview branch as a separate project. On +December 13, 2013, the former branch was forked to create a new stand-alone +project named "Rekall.” This new project incorporates changes made to streamline +the codebase so that Rekall can be used as a library. Methods for memory +acquisition and other outside contributions have also been included that were +not in the Volatility codebase. + +Rekall strives to advance the state of the art in memory analysis, implementing +the best algorithms currently available and a complete memory acquisition and +analysis solution for at least Windows, OSX and Linux. + + +## More documentation + +Further documentation is available at +http://www.rekall-forensic.com/ + +%prep +%autosetup -n rekall-1.7.1 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-rekall -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Tue Jun 20 2023 Python_Bot <Python_Bot@openeuler.org> - 1.7.1-1 +- Package Spec generated |