# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
github.setup google rekall 1.7.1 v
description collection of tools for the extraction of digital \
artifacts from volatile memory (RAM) samples
long_description The Rekall Framework is a completely open collection \
of tools, implemented in Python under the GNU General \
Public License, for the extraction of digital artifacts \
from volatile memory (RAM) samples. The extraction \
techniques are performed completely independent of \
the system being investigated but offer visibilty \
into the runtime state of the system. The framework \
is intended to introduce people to the techniques and \
complexities associated with extracting digital \
artifacts from volatile memory samples and provide a \
platform for further work into this exciting area of research.
homepage http://www.rekall-forensic.com/
checksums rmd160 5b9c262ced3014cbbd043d99d43adbb52d42d9ad \
sha256 3a0aea688acd027506f0f44d17b6602b596baa683cac7532006491b99cebf67d \
python.default_version 37
depends_build-append port:py${python.version}-setuptools