%global _empty_manifest_terminate_build 0 Name: python-andriller Version: 3.6.3 Release: 1 Summary: Andriller CE | Android Forensic Tools License: MIT License URL: https://github.com/den4uk/andriller Source0: https://mirrors.aliyun.com/pypi/web/packages/9a/6d/bcd9f330eb1148105ae027efee1cff78b29fe008b2464c1b46c6df0b26a0/andriller-3.6.3.tar.gz BuildArch: noarch Requires: python3-dateutils Requires: python3-javaobj-py3 Requires: python3-pycryptodomex Requires: python3-dateutil Requires: python3-XlsxWriter Requires: python3-Jinja2 Requires: python3-MarkupSafe Requires: python3-wrapt-timeout-decorator Requires: python3-appdirs Requires: python3-requests Requires: python3-dataclasses %description ![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) [![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) [![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) [![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. ## Features - Automated data extraction and decoding - Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) - Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) - Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) - Selection of individual database decoders for Android apps - Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) - Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) - Unpacking the Android backup files %package -n python3-andriller Summary: Andriller CE | Android Forensic Tools Provides: python-andriller BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-andriller ![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) [![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) [![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) [![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. ## Features - Automated data extraction and decoding - Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) - Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) - Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) - Selection of individual database decoders for Android apps - Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) - Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) - Unpacking the Android backup files %package help Summary: Development documents and examples for andriller Provides: python3-andriller-doc %description help ![Build Workflow](https://github.com/den4uk/andriller/actions/workflows/python-package-test.yml/badge.svg) [![License](https://img.shields.io/github/license/den4uk/andriller.svg)](https://pypi.python.org/pypi/andriller) [![PyPI Version](http://img.shields.io/pypi/v/andriller.svg)](https://pypi.python.org/pypi/andriller) [![Twitter Follow](https://img.shields.io/twitter/follow/den4uk?style=social)](https://twitter.com/den4uk) Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats. ## Features - Automated data extraction and decoding - Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support) - Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) - Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (_backup.ab_ files) - Selection of individual database decoders for Android apps - Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right _key_ file) - Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) - Unpacking the Android backup files %prep %autosetup -n andriller-3.6.3 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-andriller -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Fri Jun 09 2023 Python_Bot - 3.6.3-1 - Package Spec generated