# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup github 1.0 PortGroup legacysupport 1.1 github.setup sleuthkit sleuthkit 4.14.0 sleuthkit- github.tarball_from releases revision 0 checksums rmd160 d7e462da991d1a80eb4b3130de92a32ef2310122 \ sha256 fb6ea1801bcfc4c7d3a283d7592c6bd65add655411749513b5c429b86541e9a9 \ size 3831626 categories sysutils maintainers nomaintainer homepage https://www.sleuthkit.org/sleuthkit/ license {cpl ibmpl} description Forensic toolkit long_description The Sleuth Kit (previously known as TASK) is a collection \ of UNIX-based command line file system and media management forensic \ analysis tools. The file system tools allow you to examine file systems of \ a suspect computer in a non-intrusive fashion. Because the tools do not \ rely on the operating system to process the file systems, deleted and \ hidden content is shown. \ The media management tools allow you to examine the layout of disks and \ other media. The Sleuth Kit supports DOS partitions, BSD partitions (disk \ labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT \ disks. With these tools, you can identify where partitions are located and \ extract them so that they can be analyzed with file system analysis tools. compiler.cxx_standard 2014 depends_build-append \ port:autoconf \ port:automake \ port:file \ port:libtool depends_lib-append port:afflib \ port:libewf \ path:lib/libssl.dylib:openssl \ port:sqlite3 \ port:zlib # for the 'sorter' script: depends_run-append port:perl5 configure.args --disable-java patchfiles patch-tsk-img-ewf.cpp.diff