Perform Memory Forensics
Discover the Tools
Last updated
Discover the Tools
Last updated
Memory forensics tool and framework
Website:
Author: The Volatility Foundation
License: Volatility Software License:
Notes: Invoke using: vol3, volshell3. Before using, download symbols by following the links from and place them in /usr/local/lib/python3.8/dist-packages/volatility3/framework/symbols
State File:
Memory forensics tool and framework
Website:
Author:
License: GNU General Public License (GPL) v2:
Notes: Use vol.py
to invoke this version of Volatility. To eliminate conflicts among command-line options for Volatility plugins, the following yarascan
options have been changed: -Y
became -U
and -C
became -c
.
State File:
Compare two memory images of Linux systems by using Volatility.
Website: Author: Monnappa K A License: Free, unknown license Notes: linux_mem_diff.py State File:
Find 128-bit and 256-bit AES keys in a memory image.
Website: Author: Nadia Heninger, Alex Halderman License: Free, unknown license Notes: aeskeyfind State File:
Extract interesting strings from binary files.
Find BER-encoded RSA private keys in a memory image.
Website: Author: License: Portions Public Domain, portions MIT License: State File:
Website: Author: Nadia Heninger, Alex Halderman License: Free, unknown license Notes: rsakeyfind State File: