security/sleuthkit - The NetBSD Packages Collection

The Sleuth Kit (TSK) opensource forensic toolkit

The Sleuth Kit (TSK) is a library and collection of command line tools that
allow you to investigate disk images. The core functionality of TSK allows
you to analyze volume and file system data. The plug-in framework allows
you to incorporate additional modules to analyze file contents and build
automated systems. The library can be incorporated into larger digital
forensics tools and the command line tools can be directly used to find
evidence.

Build dependencies

devel/libtool-base pkgtools/mktools devel/gmake pkgtools/cwrappers

Runtime dependencies

time/p5-DateTime-TimeZone lang/perl5 devel/libewf

Binary packages

OSArchitectureVersion
NetBSD 8.0i386sleuthkit-4.1.3nb10.tgz
NetBSD 8.0powerpcsleuthkit-4.1.3nb10.tgz
NetBSD 8.0powerpcsleuthkit-4.1.3nb10.tgz
NetBSD 8.0x86_64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0aarch64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0aarch64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0aarch64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0alphasleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv6hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv6hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv6hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv7hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv7hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0earmv7hfsleuthkit-4.1.3nb10.tgz
NetBSD 9.0i386sleuthkit-4.1.3nb10.tgz
NetBSD 9.0i386sleuthkit-4.1.3nb10.tgz
NetBSD 9.0powerpcsleuthkit-4.1.3nb10.tgz
NetBSD 9.0powerpcsleuthkit-4.1.3nb10.tgz
NetBSD 9.0sparc64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0x86_64sleuthkit-4.1.3nb10.tgz
NetBSD 9.0x86_64sleuthkit-4.1.3nb10.tgz
NetBSD 9.3x86_64sleuthkit-4.1.3nb10.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.