Get Help Now
    24/7 Support

    Lists of memory forensics tools

    Snowboardtaco has shared an article ‘Tools 101: Volatility Usage’. It contains few lists of tools which may be used for creating memory dumps and analysing of memory dumps.

     

    There are the lists of the article:

    • Memory acquisition tools.
    • Volatiity usage.
    • Listing available profiles.
    • Rogue process identification.
    • Rooikit identification.
    • Network artifacts.
    • Code injection identification.
    • Registry key analysis.
    • Hash dump.
    • Processes.
    • File detection.

     

    More.



    DISCLAIMER: THIS POST IS FOR INFORMATIONAL PURPOSES ONLY AND IS NOT TO BE CONSIDERED LEGAL ADVICE ON ANY SUBJECT MATTER. DIGITAL FORENSICS CORP. IS NOT A LAWFIRM AND DOES NOT PROVIDE LEGAL ADVICE OR SERVICES. By viewing posts, the reader understands there is no attorney-client relationship, the post should not be used as a substitute for legal advice from a licensed professional attorney, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation.