diff --git a/README.md b/README.md index 728ad07..df53864 100644 --- a/README.md +++ b/README.md @@ -176,6 +176,7 @@ Digital Forensics and Incident Response (DFIR) teams are groups of people in an * [Volatility 3](https://github.com/volatilityfoundation/volatility3) - The volatile memory extraction framework (successor of Volatility) * [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - Automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. * [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility. +* [VolWeb](https://github.com/k1nd0ne/VolWeb) - Volatility3 efficient and visual web UI. * [WindowsSCOPE](http://www.windowsscope.com/windowsscope-cyber-forensics/) - Memory forensics and reverse engineering tool used for analyzing volatile memory offering the capability of analyzing the Windows kernel, drivers, DLLs, and virtual and physical memory. ### Memory Imaging Tools