%global _empty_manifest_terminate_build 0 Name: python-qiling Version: 1.4.5 Release: 1 Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture License: GPLv2 URL: http://qiling.io Source0: https://mirrors.nju.edu.cn/pypi/web/packages/10/49/7b8aec99bf42b315ac6e75e31898e088478fd1c8cbd29fb52a90f5ee5c33/qiling-1.4.5.tar.gz BuildArch: noarch Requires: python3-capstone Requires: python3-unicorn Requires: python3-pefile Requires: python3-registry Requires: python3-keystone-engine Requires: python3-pyelftools Requires: python3-gevent Requires: python3-multiprocess Requires: python3-pyyaml Requires: python3-fx Requires: python3-questionary Requires: python3-termcolor Requires: python3-windows-curses Requires: python3-r2libr Requires: python3-blake2b-py Requires: python3-eth-keys Requires: python3-eth-typing Requires: python3-eth-utils Requires: python3-eth-abi Requires: python3-lru-dict Requires: python3-py-ecc Requires: python3-rlp Requires: python3-trie Requires: python3-eth-hash[pycryptodome] Requires: python3-numpy Requires: python3-rich Requires: python3-cmd2 Requires: python3-cached-property Requires: python3-typing-extensions Requires: python3-unicornafl Requires: python3-fuzzercorn %description

[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) Qiling is an advanced binary emulation framework, with the following features: - Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine - Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC - Support multiple file formats: PE, MachO, ELF, COM, MBR - Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) - Emulates & sandbox code in an isolated environment - Provides a fully configurable sandbox - Provides in-depth memory, register, OS level and filesystem level API - Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) - Provides virtual machine level API such as save and restore current execution state - Supports cross architecture and platform debugging capabilities - Built-in debugger with reverse debugging capability - Allows dynamic hotpatch on-the-fly running code, including the loaded library - True framework in Python, making it easy to build customized security analysis tools on top Qiling also made its way to various international conferences. 2022: - [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) - [Black Hat, MEA](https://blackhatmea.com/node/724) 2021: - [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) - [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) - [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) 2020: - [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) - [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) - [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) - [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) - [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) - [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) - [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) - [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) 2019: - [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) - [Hitcon](https://hitcon.org/2019/CMT/agenda) - [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). %package -n python3-qiling Summary: Qiling is an advanced binary emulation framework that cross-platform-architecture Provides: python-qiling BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-qiling

[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) Qiling is an advanced binary emulation framework, with the following features: - Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine - Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC - Support multiple file formats: PE, MachO, ELF, COM, MBR - Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) - Emulates & sandbox code in an isolated environment - Provides a fully configurable sandbox - Provides in-depth memory, register, OS level and filesystem level API - Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) - Provides virtual machine level API such as save and restore current execution state - Supports cross architecture and platform debugging capabilities - Built-in debugger with reverse debugging capability - Allows dynamic hotpatch on-the-fly running code, including the loaded library - True framework in Python, making it easy to build customized security analysis tools on top Qiling also made its way to various international conferences. 2022: - [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) - [Black Hat, MEA](https://blackhatmea.com/node/724) 2021: - [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) - [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) - [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) 2020: - [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) - [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) - [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) - [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) - [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) - [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) - [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) - [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) 2019: - [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) - [Hitcon](https://hitcon.org/2019/CMT/agenda) - [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). %package help Summary: Development documents and examples for qiling Provides: python3-qiling-doc %description help

[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134) Qiling is an advanced binary emulation framework, with the following features: - Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine - Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC - Support multiple file formats: PE, MachO, ELF, COM, MBR - Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/) - Emulates & sandbox code in an isolated environment - Provides a fully configurable sandbox - Provides in-depth memory, register, OS level and filesystem level API - Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc) - Provides virtual machine level API such as save and restore current execution state - Supports cross architecture and platform debugging capabilities - Built-in debugger with reverse debugging capability - Allows dynamic hotpatch on-the-fly running code, including the loaded library - True framework in Python, making it easy to build customized security analysis tools on top Qiling also made its way to various international conferences. 2022: - [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553) - [Black Hat, MEA](https://blackhatmea.com/node/724) 2021: - [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119) - [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/) - [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643) 2020: - [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781) - [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062) - [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009) - [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245) - [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/) - [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/) - [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/) - [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php) 2019: - [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing) - [Hitcon](https://hitcon.org/2019/CMT/agenda) - [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/) Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org). %prep %autosetup -n qiling-1.4.5 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-qiling -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Thu Jun 08 2023 Python_Bot - 1.4.5-1 - Package Spec generated