| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Notes:
svn path=/head/; revision=418626
|
|
|
|
| |
Notes:
svn path=/head/; revision=417028
|
|
|
|
| |
Notes:
svn path=/head/; revision=413440
|
|
|
|
|
|
|
|
| |
With hat: portmgr
Sponsored by: Absolight
Notes:
svn path=/head/; revision=412349
|
|
|
|
|
|
|
|
|
|
| |
- Bump revisions of all dependant ports
PR: 206482
Submitted by: lev, w.schwarzenfeld@aon.at
Notes:
svn path=/head/; revision=411691
|
|
|
|
|
|
|
|
|
|
| |
It was split in 3 modules
- security/py-rekall-core : CORE component with command line interface
- security/py-rekall_gui : GUI with ipython and web interface
- security/py-rekall : "meta" module
Notes:
svn path=/head/; revision=396604
|
|
|
|
|
|
|
|
| |
Approved by: portmgr blanket
MFH: 2015Q2
Notes:
svn path=/head/; revision=388714
|
|
|
|
| |
Notes:
svn path=/head/; revision=384859
|
|
|
|
|
|
|
| |
Announce: http://rekall-forensic.blogspot.ch/2015/04/announcing-rekall-release-131-dammastock.html
Notes:
svn path=/head/; revision=383030
|
|
|
|
| |
Notes:
svn path=/head/; revision=375198
|
|
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
WWW: http://www.rekall-forensic.com/
Notes:
svn path=/head/; revision=370110
|