aboutsummaryrefslogtreecommitdiff
path: root/security/py-rekall
Commit message (Collapse)AuthorAgeFilesLines
* Update py-rekall/py-rekall-core to 1.5.2Antoine Brodin2016-07-162-4/+4
| | | | Notes: svn path=/head/; revision=418626
* Update to 1.5.1Antoine Brodin2016-06-172-4/+5
| | | | Notes: svn path=/head/; revision=417028
* Update rekall to 1.5.0Antoine Brodin2016-04-162-7/+14
| | | | Notes: svn path=/head/; revision=413440
* Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.Mathieu Arnold2016-04-011-2/+2
| | | | | | | | With hat: portmgr Sponsored by: Absolight Notes: svn path=/head/; revision=412349
* - Update libsodium to 1.0.8Vsevolod Stakhov2016-03-231-0/+1
| | | | | | | | | | - Bump revisions of all dependant ports PR: 206482 Submitted by: lev, w.schwarzenfeld@aon.at Notes: svn path=/head/; revision=411691
* Update rekall to 1.4.1Antoine Brodin2015-09-102-36/+6
| | | | | | | | | | It was split in 3 modules - security/py-rekall-core : CORE component with command line interface - security/py-rekall_gui : GUI with ipython and web interface - security/py-rekall : "meta" module Notes: svn path=/head/; revision=396604
* - Fix shebangsDmitry Marakasov2015-06-071-1/+3
| | | | | | | | Approved by: portmgr blanket MFH: 2015Q2 Notes: svn path=/head/; revision=388714
* Update to 1.3.2Antoine Brodin2015-04-272-4/+5
| | | | Notes: svn path=/head/; revision=384859
* Update to 1.3.1Antoine Brodin2015-04-022-6/+5
| | | | | | | Announce: http://rekall-forensic.blogspot.ch/2015/04/announcing-rekall-release-131-dammastock.html Notes: svn path=/head/; revision=383030
* Update to 1.2.0Antoine Brodin2014-12-212-4/+7
| | | | Notes: svn path=/head/; revision=375198
* New port: security/py-rekallAntoine Brodin2014-10-053-0/+58
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. WWW: http://www.rekall-forensic.com/ Notes: svn path=/head/; revision=370110