Port details |
- py-rekall Memory forensics analysis framework
- 1.7.2.r1.52_1 security
=0 1.7.2.r1.52_1Version of this port present on the latest quarterly branch.
- DEPRECATED: Unmaintained upstream, use security/py-volatility3 instead
This port expired on: 2021-01-27
- Maintainer: antoine@FreeBSD.org
- Port Added: 2014-10-05 20:12:40
- Last Update: 2021-01-28 18:56:11
- SVN Revision: 563153
- Also Listed In: python
- License: GPLv2
- WWW:
- http://www.rekall-forensic.com/
- Description:
- The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
WWW: http://www.rekall-forensic.com/
-
cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- ${PYTHON_PKGNAMEPREFIX}rekall>0:security/py-rekall@${PY_FLAVOR}
- No installation instructions:
- This port has been deleted.
- PKGNAME: py37-rekall
- Package flavors (<flavor>: <package>)
- distinfo:
- TIMESTAMP = 1551033000
SHA256 (google-rekall-1.7.2rc1-52-g0cba831_GH0.tar.gz) = 90edf50ab2fa643b59d79839b38741e7d8efaf88b015f6886e5161feb0810f6b
SIZE (google-rekall-1.7.2rc1-52-g0cba831_GH0.tar.gz) = 5560819
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- py37-setuptools>0 : devel/py-setuptools@py37
- python3.7 : lang/python37
- Runtime dependencies:
-
- py37-rekall_lib>=1.7.1 : security/py-rekall_lib@py37
- py37-rekall-core>=1.7.1 : security/py-rekall-core@py37
- py37-ipython5>=5.0.0 : devel/ipython5@py37
- py37-setuptools>0 : devel/py-setuptools@py37
- python3.7 : lang/python37
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- N/A
- USES:
- python:3.5+ shebangfix
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.7.2.r1.52_1 28 Jan 2021 18:56:11 |
rene |
Remove expired ports:
2021-01-24 www/sogo4: Unmaintained, please migrate to a newer version of sogo
2021-01-24 www/sogo4-activesync: Unmaintained, please migrate to a newer version
of sogo
2021-01-27 security/py-rekall_lib: Unmaintained upstream
2021-01-27 devel/py-rekall-efilter: Unmaintained upstream
2021-01-27 security/py-rekall: Unmaintained upstream, use
security/py-volatility3 instead
2021-01-27 security/py-rekall-core: Unmaintained upstream
2021-01-27 www/kurly: Upstream is gone
2021-01-27 security/regripper: Upstream repo disappeared |
1.7.2.r1.52_1 27 Dec 2020 20:08:27 |
antoine |
Deprecate rekall ports |
1.7.2.r1.52_1 25 Jan 2020 13:03:55 |
antoine |
Update security/py-artifacts to 20200118 |
1.7.2.r1.52_1 26 Jul 2019 20:46:57 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.
PR: 238330 |
1.7.2.r1.52 24 Feb 2019 20:16:08 |
antoine |
Update rekall to 1.7.2rc1-52 |
1.7.2.r1_2 12 Dec 2018 01:35:36 |
gerald |
Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.
This includes ports
- with USE_GCC=yes or USE_GCC=any,
- with USES=fortran,
- using Mk/bsd.octave.mk which in turn features USES=fortran, and
- with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.
PR: 231590 |
1.7.2.r1_1 06 Aug 2018 11:23:41 |
antoine |
Attempt to unbreak ports depending on ipython |
1.7.2.r1 24 May 2018 17:31:07 |
antoine |
Update to 1.7.2rc1 |
1.6.0_1 10 Mar 2018 17:46:06 |
gerald |
Bump PORTREVISIONs of all users of math/mpc that we just updated to
version 1.1.0 (via revision 464079). |
1.6.0 02 Dec 2017 09:22:02 |
antoine |
Explicitely pass ipython FLAVOR in a few ports |
1.6.0 30 Nov 2017 15:50:34 |
mat |
Convert Python ports to FLAVORS.
Ports using USE_PYTHON=distutils are now flavored. They will
automatically get flavors (py27, py34, py35, py36) depending on what
versions they support.
There is also a USE_PYTHON=flavors for ports that do not use distutils
but need FLAVORS to be set. A USE_PYTHON=noflavors can be set if
using distutils but flavors are not wanted.
A new USE_PYTHON=optsuffix that will add PYTHON_PKGNAMESUFFIX has been
added to cope with Python ports that did not have the Python
PKGNAMEPREFIX but are flavored.
USES=python now also exports a PY_FLAVOR variable that contains the (Only the first 15 lines of the commit message are shown above ) |
1.6.0 09 Jan 2017 18:56:08 |
antoine |
Un-ignore after ipython upgrade |
1.6.0 07 Jan 2017 16:42:10 |
antoine |
- Update py-rekall-core to 1.6.0
- Ignore py-rekall_gui: doesn't work with py-rekall-core 1.6.0 yet
- Ignore py-rekall: requires ipython 5.0.0 |
1.5.2 02 Nov 2016 22:45:14 |
mat |
Cleanup no longer needed CHMOD usage after r424898.
PR: 213743
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight |
1.5.2 16 Jul 2016 10:23:05 |
antoine |
Update py-rekall/py-rekall-core to 1.5.2 |
1.5.1 17 Jun 2016 19:33:07 |
antoine |
Update to 1.5.1 |
1.5.0 16 Apr 2016 13:31:18 |
antoine |
Update rekall to 1.5.0 |
1.4.1_1 01 Apr 2016 14:25:18 |
mat |
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight |
1.4.1_1 23 Mar 2016 09:20:35 |
vsevolod |
- Update libsodium to 1.0.8
- Bump revisions of all dependant ports
PR: 206482
Submitted by: lev, w.schwarzenfeld@aon.at |
1.4.1 10 Sep 2015 21:21:49 |
antoine |
Update rekall to 1.4.1
It was split in 3 modules
- security/py-rekall-core : CORE component with command line interface
- security/py-rekall_gui : GUI with ipython and web interface
- security/py-rekall : "meta" module |
1.3.2_1 07 Jun 2015 15:02:47 |
amdmi3 |
- Fix shebangs
Approved by: portmgr blanket
MFH: 2015Q2 |
1.3.2 27 Apr 2015 15:45:00 |
antoine |
Update to 1.3.2 |
1.3.1 02 Apr 2015 17:19:43 |
antoine |
Update to 1.3.1
Announce: http://rekall-forensic.blogspot.ch/2015/04/announcing-rekall-release-131-dammastock.html |
1.2.0 21 Dec 2014 21:56:40 |
antoine |
Update to 1.2.0 |
1.1.0.b 05 Oct 2014 20:12:24 |
antoine |
New port: security/py-rekall
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
WWW: http://www.rekall-forensic.com/ |