non port: security/py-rekall/distinfo |
Number of commits found: 11 |
Sunday, 24 Feb 2019
|
20:16 antoine
Update rekall to 1.7.2rc1-52
|
Thursday, 24 May 2018
|
17:31 antoine
Update to 1.7.2rc1
|
Saturday, 7 Jan 2017
|
16:42 antoine
- Update py-rekall-core to 1.6.0
- Ignore py-rekall_gui: doesn't work with py-rekall-core 1.6.0 yet
- Ignore py-rekall: requires ipython 5.0.0
|
Saturday, 16 Jul 2016
|
10:23 antoine
Update py-rekall/py-rekall-core to 1.5.2
|
Friday, 17 Jun 2016
|
19:33 antoine
Update to 1.5.1
|
Saturday, 16 Apr 2016
|
13:31 antoine
Update rekall to 1.5.0
|
Thursday, 10 Sep 2015
|
21:21 antoine
Update rekall to 1.4.1
It was split in 3 modules
- security/py-rekall-core : CORE component with command line interface
- security/py-rekall_gui : GUI with ipython and web interface
- security/py-rekall : "meta" module
|
Monday, 27 Apr 2015
|
15:45 antoine
Update to 1.3.2
|
Thursday, 2 Apr 2015
|
17:19 antoine
Update to 1.3.1
Announce: http://rekall-forensic.blogspot.ch/2015/04/announcing-rekall-release-131-dammastock.html
|
Sunday, 21 Dec 2014
|
21:56 antoine
Update to 1.2.0
|
Sunday, 5 Oct 2014
|
20:12 antoine
New port: security/py-rekall
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
WWW: http://www.rekall-forensic.com/
|
Number of commits found: 11 |