aboutsummaryrefslogtreecommitdiffstats
path: root/graphics
diff options
context:
space:
mode:
authorantoine <antoine@FreeBSD.org>2014-10-06 04:12:23 +0800
committerantoine <antoine@FreeBSD.org>2014-10-06 04:12:23 +0800
commit4cc19c8f0410410a521135941b2780e9f7e510cf (patch)
tree0b13c5315f8f763b595baaec8c9c5914acaba284 /graphics
parenta47b6637037cba2f0e8e5c76fe488254ba7b7803 (diff)
downloadfreebsd-ports-gnome-4cc19c8f0410410a521135941b2780e9f7e510cf.tar.gz
freebsd-ports-gnome-4cc19c8f0410410a521135941b2780e9f7e510cf.tar.zst
freebsd-ports-gnome-4cc19c8f0410410a521135941b2780e9f7e510cf.zip
New port: security/py-rekall
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. WWW: http://www.rekall-forensic.com/
Diffstat (limited to 'graphics')
0 files changed, 0 insertions, 0 deletions