Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-memory-forensics
A curated list of awesome Memory Forensics for DFIR
https://github.com/digitalisx/awesome-memory-forensics
Last synced: 1 day ago
JSON representation
-
Tool
-
Memory Acquisition
- Surge - Volexity's Surge Collect offers flexible storage options and an intuitive interface that any responder can run to eliminate the issues associated with the corrupt data samples, crashed target computers, and ultimately, unusable data that commonly results from using other tools.
- FTK Imager - FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as Forensic Toolkit (FTK®) is warranted.
- Ram Capturer - Belkasoft Live RAM Capturer is a tiny free forensic tool that allows to reliably extract the entire contents of computer's volatile memory—even if protected by an active anti-debugging or anti-dumping system.
- FEX Memory Imager - FEX Memory Imager (FEX Memory) is a free imaging tool designed to capture the physical Random Access Memory (RAM) of a suspect's running computer. This allows investigators to recover and analyze valuable artifacts found only in memory.
- MacQuisition
- Digital Collector - A powerful forensic imaging software solution to perform triage, live data acquisition and targeted data collection for Windows and Mac computers.
- Volatility3 Inodes Plugin - The plugin is a pushed verion of the lsof plugin extracting inode metadata information from each files.
- Volatility3 Prefetch Plugin - The plugin is scanning, extracting and parsing Windows Prefetch files from Windows XP to Windows 11.
- MAGNET RAM - MAGNET RAM Capture is a free imaging tool designed to capture the physical memory of a suspect's computer, allowing investigators to recover and analyze valuable artifacts that are often only found in memory.
- Winpmem - WinPmem has been the default open source memory acquisition driver for windows for a long time.
- LiME - A Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android.
- AVML - AVML is an X86_64 userland volatile memory acquisition tool written in Rust, intended to be deployed as a static binary.
- fmem - This module creates /dev/fmem device, that can be used for dumping physical memory, without limits of /dev/mem (1MB/1GB, depending on distribution).
- varc - Volatile Artifact Collector gathers a snapshot of volatile data from a system.
- PCILeech - PCILeech uses PCIe hardware devices to read and write target system memory. This is achieved by using DMA over PCIe. No drivers are needed on the target system.
- EVTXtract - EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.
- FTK Imager - FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as Forensic Toolkit (FTK®) is warranted.
-
Memory Analysis
- Volcano - A comprehensive, cross-platform, next- generation memory analysis solution, Volexity Volcano Professional's powerful core extracts, indexes, and correlates artifacts to provide unprecedented visibility into systems' runtime state and trustworthiness.
- WinDbg - The Windows Debugger (WinDbg) can be used to debug kernel-mode and user-mode code, analyze crash dumps, and examine the CPU registers while the code executes.
- Redline - Redline®, FireEye's premier free endpoint security tool, provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile.
- Memoryze - Mandiant's Memoryze™ is free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images and on live systems can include the paging file in its analysis.
- Volatility3 - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
- MemProcFS - The Memory Process File System (MemProcFS) is an easy and convenient way of viewing physical memory as files in a virtual file system.
- Volatility - The Volatility Framework is a completely open collection of tools,
- Volafox - macOS Memory Analysis Toolkit' is developed on Python 2.x (***Deprecated***)
- Rekall - A new branch within the Volatility project was created to explore how to make the code base more modular, improve performance, and increase usability. (***Deprecated***)
- dwarf2json - Go utility that processes files containing symbol and type information to generate Volatilty3 Intermediate Symbol File (ISF) JSON output suitable for Linux and macOS analysis.
-
-
Books
-
Memory Analysis
- The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory.
- Practical Memory Forensics - Jumpstart effective forensic analysis of volatile memory.
-
-
Course
-
Videos
-
13 Cubed
- Introduction to Memory Forensics
- Windows Memory Analysis
- Windows Process Genealogy
- Windows Process Genealogy (Update)
- Memory Forensics Baselines
- Extracting Prefetch from Memory
- Detecting Persistence in Memory
- Introduction to Redline
- Introduction to Redline (Update)
- Profiling Network Activity with Volatility 3 - GeoIP from Memory
- Volatility Profiles and Windows 10
- Dumping Processes with Volatility 3
- First Look at Volatility 3 Public Beta
- Volatility 3 and WSL 2 - Linux DFIR Tools in Windows?
- MemProcFS - This Changes Everything
-
DFIR Science
- Introduction to Memory Forensics with Volatility 3
- Amazon AWS EC2 Forensic Memory Acquisition - LiME
- Forensic Memory Acquisition in Linux - LiME
- Forensic Memory Acquisition in Windows - FTK Imager
- Fast password cracking - Hashcat wordlists from RAM
- What is Random Access Memory?
- Forensics: What data can you find in RAM?
-
Black Hat 2022
-
Black Hat 2019
-
Black Hat 2012
-
SANS Digital Forensics and Incident Response
-
ETC
-
-
Articles
-
JPCERT
- How to Use Volatility 3 Offline
- Migrate Volatility Plugins 2 to 3
- MalConfScan with Cuckoo: Plugin to Automatically Extract Malware Configuration
- Volatility Plugin for Detecting RedLeaves Malware
- A Volatility Plugin Created for Detecting Malware Used in Targeted Attacks
- Volatility Plugin for Detecting Cobalt Strike Beacon
- A New Tool to Detect Known Malware from Memory Images – impfuzzy for Volatility –
-
Blogs
-
CheastSheet
-
-
Papers
-
Digital Investigation
-
DFRWS USA 2022
-
DFRWS EU 2022
-
DFRWS USA 2021
-
DFRWS EU 2021
-
DFRWS USA 2020
-
DFRWS EU 2020
-
-
Datasets
-
DFRWS EU 2020
-
-
Challenges
-
DFRWS EU 2020
- 2022 Volatility Plugin Contest
- 2021 Volatility Plugin Contest
- 2020 Volatility Plugin Contest
- 2019 Volatility Plugin & Analysis Contests
- 2018 Volatility Plugin & Analysis Contests
- 2017 Volatility Plugin Contest
- 2016 Volatility Plugin Contest
- 2015 Volatility Plugin Contest
- 2014 Volatility Plugin Contest
- 2013 Volatility Plugin Contest
-
Sub Categories
Memory Acquisition
17
DFRWS EU 2020
16
13 Cubed
15
Memory Analysis
14
DFIR Science
7
JPCERT
7
Blogs
6
DFRWS USA 2021
3
DFRWS USA 2020
3
DFRWS EU 2022
3
DFRWS USA 2022
2
ETC
1
Black Hat 2019
1
DFRWS EU 2021
1
Black Hat 2022
1
SANS Digital Forensics and Incident Response
1
Digital Investigation
1
Black Hat 2012
1
CheastSheet
1
Keywords
volatility-framework
2
ram
2
python
2
memory
2
malware
2
memory-forensics
2
forensics
2
linux-security
1
rust
1
aws
1
aws-fargate
1
aws-forensics
1
aws-lambda
1
cloud-security
1
dfir
1
dfir-automation
1
docker-forensics
1
eks-forensics
1
fargate-forensics
1
security
1
digital-investigation
1
incident-response
1
volatility
1