# This is a shell archive echo x binwalk mkdir -p binwalk > /dev/null 2>&1 echo x binwalk/pkg-plist sed 's/^X//' > binwalk/pkg-plist << 'SHAR_END' Xbin/binwalk Xetc/binwalk/magic.binarch Xetc/binwalk/magic.bincast Xetc/binwalk/magic.binwalk Xetc/binwalk/magic.o X@dirrm etc/binwalk SHAR_END echo x binwalk/distinfo sed 's/^X//' > binwalk/distinfo << 'SHAR_END' XSHA256 (binwalk-0.4.1.tar.gz) = fc82c3acbf8d809cfff7896ac69c60e1ebcf1eb30ae7819a89e4ec036cc3b8a9 XSIZE (binwalk-0.4.1.tar.gz) = 695370 SHAR_END echo x binwalk/pkg-descr sed 's/^X//' > binwalk/pkg-descr << 'SHAR_END' XBinwalk is a tool for searching a given binary image for embedded Xfiles and executable code. Specifically, it is designed for identifying Xfiles and code embedded inside of firmware images. Binwalk uses the Xlibmagic library, so it is compatible with magic signatures created Xfor the Unix file utility. X XBinwalk also includes a custom magic signature file which contains Ximproved signatures for files that are commonly found in firmware Ximages such as compressed/archived files, firmware headers, Linux Xkernels, bootloaders, filesystems, etc. XMore details are available at: X XWWW: http://code.google.com/p/binwalk/ SHAR_END echo x binwalk/Makefile sed 's/^X//' > binwalk/Makefile << 'SHAR_END' X# New ports collection makefile for: binwalk X# Date created: Feb 6, 2012 X# Whom: Kurt Jaeger X# X# $FreeBSD$ X XPORTNAME= binwalk XPORTVERSION= 0.4.1 XCATEGORIES= security XMASTER_SITES= GOOGLE_CODE X XMAINTAINER= fbsd-ports@opsec.eu XCOMMENT= Search binary images for embedded files and executable code X XLICENSE= MIT X XGNU_CONFIGURE= yes XCFLAGS+= -I${LOCALBASE}/include XLDFLAGS+= -L${LOCALBASE}/lib X XWRKSRC= ${WRKDIR}/${PORTNAME}-${PORTVERSION}/src X X.include SHAR_END exit