1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104
|
Source: sleuthkit
Section: admin
Priority: optional
Maintainer: Debian Forensics <forensics-devel@lists.alioth.debian.org>
Uploaders: Joao Eriberto Mota Filho <eriberto@debian.org>
Build-Depends: debhelper (>= 10),
dh-autoreconf,
libafflib-dev (>= 3.6.6),
libewf-dev (>= 20130416),
libsqlite3-dev
Standards-Version: 3.9.8
Homepage: http://www.sleuthkit.org/sleuthkit
Vcs-Browser: https://anonscm.debian.org/git/forensics/sleuthkit.git
Vcs-Git: https://anonscm.debian.org/git/forensics/sleuthkit.git
Package: sleuthkit
Architecture: any
Depends: file,
libdate-manip-perl,
${misc:Depends},
${perl:Depends},
${shlibs:Depends}
Suggests: autopsy, mac-robber
Conflicts: tct
Description: tools for forensics analysis on volume and filesystem data
The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
line file and volume system forensic analysis tools. The filesystem tools
allow you to examine filesystems of a suspect computer in a non-intrusive
fashion. Because the tools do not rely on the operating system to process the
filesystems, deleted and hidden content is shown.
.
The volume system (media management) tools allow you to examine the layout of
disks and other media. You can also recover deleted files, get information
stored in slack spaces, examine filesystems journal, see partitions layout on
disks or images etc. But is very important clarify that the TSK acts over the
current filesystem only.
.
The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
tools, you can identify where partitions are located and extract them so that
they can be analyzed with filesystem analysis tools.
.
Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
Ext4, UFS and YAFFS2.
.
This package contains the set of command line tools in The Sleuth Kit.
Package: libtsk13
Section: libs
Architecture: any
Depends: ${misc:Depends}, ${shlibs:Depends}
Conflicts: libtsk10v5
Replaces: libtsk10v5
Description: library for forensics analysis on volume and filesystem data
The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
line file and volume system forensic analysis tools. The filesystem tools
allow you to examine filesystems of a suspect computer in a non-intrusive
fashion. Because the tools do not rely on the operating system to process the
filesystems, deleted and hidden content is shown.
.
The volume system (media management) tools allow you to examine the layout of
disks and other media. You can also recover deleted files, get information
stored in slack spaces, examine filesystems journal, see partitions layout on
disks or images etc. But is very important clarify that the TSK acts over the
current filesystem only.
.
The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
tools, you can identify where partitions are located and extract them so that
they can be analyzed with filesystem analysis tools.
.
Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
Ext4, UFS and YAFFS2.
.
This package contains the library which can be used to implement all of the
functionality of the command line tools into an application that needs to
analyze data from a disk image.
Package: libtsk-dev
Section: libdevel
Architecture: any
Depends: libtsk13 (= ${binary:Version}), zlib1g-dev, ${misc:Depends}
Description: library for forensics analysis (development files)
The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
line file and volume system forensic analysis tools. The filesystem tools
allow you to examine filesystems of a suspect computer in a non-intrusive
fashion. Because the tools do not rely on the operating system to process the
filesystems, deleted and hidden content is shown.
.
The volume system (media management) tools allow you to examine the layout of
disks and other media. You can also recover deleted files, get information
stored in slack spaces, examine filesystems journal, see partitions layout on
disks or images etc. But is very important clarify that the TSK acts over the
current filesystem only.
.
The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
tools, you can identify where partitions are located and extract them so that
they can be analyzed with filesystem analysis tools.
.
Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
Ext4, UFS and YAFFS2.
.
This package contains header files and static version of the library.
|