# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4

PortSystem          1.0
PortGroup           python 1.0
PortGroup           github 1.0

github.setup        google rekall 1.7.1 v
# Change github.tarball_from to 'releases' or 'archive' next update
github.tarball_from tarball
revision            0
categories          security
platforms           {darwin any}
maintainers         nomaintainer
license             GPL-2
supported_archs     noarch

description         collection of tools for the extraction of digital \
                    artifacts from volatile memory (RAM) samples

long_description    The Rekall Framework is a completely open collection \
                    of tools, implemented in Python under the GNU General \
                    Public License, for the extraction of digital artifacts \
                    from volatile memory (RAM) samples. The extraction \
                    techniques are performed completely independent of \
                    the system being investigated but offer visibilty \
                    into the runtime state of the system. The framework \
                    is intended to introduce people to the techniques and \
                    complexities associated with extracting digital \
                    artifacts from volatile memory samples and provide a \
                    platform for further work into this exciting area of research.

homepage            http://www.rekall-forensic.com/

checksums           rmd160  5b9c262ced3014cbbd043d99d43adbb52d42d9ad \
                    sha256  3a0aea688acd027506f0f44d17b6602b596baa683cac7532006491b99cebf67d \
                    size    5581340

python.default_version  37

depends_build-append port:py${python.version}-setuptools