# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 # $Id: Portfile 142815 2015-11-24 03:22:35Z jmr@macports.org $ PortSystem 1.0 PortGroup python 1.0 PortGroup github 1.0 github.setup google rekall 1.0.2 v categories security platforms darwin maintainers yahoo.fr:jul_bsd openmaintainer license GPL-2 supported_archs noarch description collection of tools for the extraction of digital \ artifacts from volatile memory (RAM) samples long_description The Rekall Framework is a completely open collection \ of tools, implemented in Python under the GNU General \ Public License, for the extraction of digital artifacts \ from volatile memory (RAM) samples. The extraction \ techniques are performed completely independent of \ the system being investigated but offer visibilty \ into the runtime state of the system. The framework \ is intended to introduce people to the techniques and \ complexities associated with extracting digital \ artifacts from volatile memory samples and provide a \ platform for further work into this exciting area of research. homepage http://www.rekall-forensic.com/ checksums rmd160 b12a8e61a6545f925ac5803b2dad0459299259ef \ sha256 29bf4d261b937a1bddbf349eb62d71ef81afda353c296944480eb4449c65267f python.default_version 27 depends_build-append port:py${python.version}-setuptools