From 3492ba4daa82c7704a3bada5ee437e2616ea7b33 Mon Sep 17 00:00:00 2001 From: Explie Date: Wed, 28 Oct 2020 13:36:05 +0100 Subject: [PATCH] Fixing broken WindowsSCOPE link Fixing broken WindowsSCOPE link --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8e70356..eabb8e2 100644 --- a/README.md +++ b/README.md @@ -144,7 +144,7 @@ Digital Forensics and Incident Response (DFIR) teams are groups of people in an * [Volatility](https://github.com/volatilityfoundation/volatility) - Advanced memory forensics framework. * [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - Automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation. * [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility. -* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - Memory forensics and reverse engineering tool used for analyzing volatile memory offering the capability of analyzing the Windows kernel, drivers, DLLs, and virtual and physical memory. +* [WindowsSCOPE](http://www.windowsscope.com/windowsscope-cyber-forensics/) - Memory forensics and reverse engineering tool used for analyzing volatile memory offering the capability of analyzing the Windows kernel, drivers, DLLs, and virtual and physical memory. ### Memory Imaging Tools