From 11b3ca17cbf5829a324454ebbebd374015525d96 Mon Sep 17 00:00:00 2001 From: Meir Wahnon Date: Fri, 13 Nov 2015 23:18:11 +0200 Subject: [PATCH] evolve update --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8287800..07d1da9 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ A curated list of tools for incident response ### Memory Analysis Tools * [Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework -* [Evolve](https://github.com/JamesHabben/evolve) +* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework * [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory * [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution * [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools