# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup python 1.0 PortGroup github 1.0 github.setup google rekall 1.7.1 v revision 0 categories security platforms {darwin any} maintainers nomaintainer license GPL-2 supported_archs noarch description collection of tools for the extraction of digital \ artifacts from volatile memory (RAM) samples long_description The Rekall Framework is a completely open collection \ of tools, implemented in Python under the GNU General \ Public License, for the extraction of digital artifacts \ from volatile memory (RAM) samples. The extraction \ techniques are performed completely independent of \ the system being investigated but offer visibilty \ into the runtime state of the system. The framework \ is intended to introduce people to the techniques and \ complexities associated with extracting digital \ artifacts from volatile memory samples and provide a \ platform for further work into this exciting area of research. homepage http://www.rekall-forensic.com/ checksums rmd160 5b9c262ced3014cbbd043d99d43adbb52d42d9ad \ sha256 3a0aea688acd027506f0f44d17b6602b596baa683cac7532006491b99cebf67d \ size 5581340 python.default_version 37 depends_build-append port:py${python.version}-setuptools