Ycarus Gentoo ebuild

pentoo

These ebuilds come from .

If you have some problems, go to the official site first.

app-forensics

bulk_extractor : Scans a disk image for regular expressions and other content ( https://github.com/simsong/bulk_extractor )

cortex : A powerful observable analysis and active response engine ( https://thehive-project.org/ https://github.com/TheHive-Project/Cortex )

eagleeye : Find people's social media profile using reverse image search ( https://github.com/ThoughtfulDev/EagleEye )

fuxploider : File upload vulnerability scanner and exploitation tool ( https://github.com/almandin/fuxploider )

guymager : Guymager is a fast and user friendly forensic imager. ( http://guymager.sourceforge.net/ )

inception : Firewire physical memory manipulation tool exploiting IEEE 1394 SBP-2 DMA ( http://www.breaknenter.org/projects/inception/ )

kjackal : Linux Rootkit Scanner ( https://github.com/dgoulet/kjackal )

lazagne : Credentials recovery project ( https://github.com/AlessandroZ/LaZagne )

libbfio : Library for providing a basic file input/output abstraction layer ( https://github.com/libyal/libbfio )

libforensic1394 : Library for carrying out memory forensics using firewire/ieee1394 ( https://freddie.witherden.org/tools/libforensic1394/ https://github.com/FreddieWitherden/libforensic1394 )

libvshadow : Library and tools to support the Volume Shadow Snapshot (VSS) format. ( https://github.com/libyal/libvshadow )

make-pdf : This tool will embed javascript inside a PDF document ( https://blog.didierstevens.com/programs/pdf-tools/ )

maltego : Visualise, map and mine data ( https://www.paterva.com/ )

mxtract : A memory extractor and analyzer ( https://github.com/rek7/mXtract )

mysql-magic : dump mysql client password from memory ( https://github.com/hc0d3r/mysql-magic )

oletools : A python tools to analyze MS OLE2 files and MS Office documents ( https://github.com/decalage2/oletools )

openscap : Framework which enables integration with Security Content Automation Protocol ( https://www.open-scap.org/ )

openscap-daemon : Manages continuous scans of your infrastructure ( https://www.open-scap.org/tools/openscap-daemon )

origami-pdf : A Ruby framework designed to parse, analyze, and forge PDF documents ( https://github.com/gdelugre/origami )

pcileech : Direct Memory Access (DMA) Attack Software ( https://github.com/ufrisk/pcileech )

pdf-parser : This tool will parse a PDF document to identify the fundamental elements used ( https://blog.didierstevens.com/programs/pdf-tools/ )

pdfid : This tool will scan a PDF document looking for certain keyword ( https://blog.didierstevens.com/programs/pdf-tools/ )

pdfwalker : A GTK frontend to explore the internals of a PDF document with Origami ( https://github.com/gdelugre/pdfwalker )

prochunter : Linux process hunter ( https://gitlab.com/nowayout/prochunter )

reglookup : An utility for reading and querying Windows NT/2K/XP registries ( http://projects.sentinelchicken.org/reglookup/ )

s3tk : A security toolkit for Amazon S3 ( https://github.com/ankane/s3tk )

samhain : Advanced file integrity and intrusion detection tool. ( http://la-samhna.de/samhain/ )

scap-security-guide : Security compliance content in SCAP, Bash, Ansible, and other formats ( https://www.open-scap.org/security-policies/scap-security-guide )

scap-workbench : SCAP Scanner And Tailoring Graphical User Interface ( http://www.open-scap.org https://github.com/OpenSCAP/scap-workbench )

spiderfoot : The most complete OSINT collection and reconnaissance tool ( https://www.spiderfoot.net )

stegoveritas : Automatic image steganography analysis tool ( https://github.com/bannsec/stegoVeritas )

tcpxtract : Extracts files from network packet captures ( http://tcpxtract.sourceforge.net/ )

thehive : A scalable 4-in-1 open source and free Security Incident Response Platform ( https://thehive-project.org )

volatility3 : Framework for analyzing volatile memory ( https://github.com/volatilityfoundation/volatility3/ https://www.volatilityfoundation.org/ )

xmount : Convert on-the-fly between multiple input and output harddisk image types ( https://pinguin.lu/xmount )

yara-rust : Rust bindings for VirusTotal/yara ( https://github.com/Hugal31/yara-rust )

yaramod : Parsing of YARA rules into AST and building new rulesets in C++ ( https://github.com/avast/yaramod )

zsteg : Detect stegano-hidden data in PNG and BMP ( https://github.com/zed-0xff/zsteg )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a pentoo

For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage

If you have a problem : ycarus(-at-)zugaina.org