From 583b1f397d85a32bf019cfc1fb0ecd76663e420e Mon Sep 17 00:00:00 2001 From: Explie Date: Wed, 28 Oct 2020 13:34:06 +0100 Subject: [PATCH] Removing KnTTools , no longer available KnTTools are no longer available. The only left over artifacts are: https://github.com/yuzhangiot/kntTools --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index 2d601fd..8e70356 100644 --- a/README.md +++ b/README.md @@ -135,7 +135,6 @@ Digital Forensics and Incident Response (DFIR) teams are groups of people in an * [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework. * [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support. -* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools. * [LiME](https://github.com/504ensicsLabs/LiME) - Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, formerly called DMD. * [MalConfScan](https://github.com/JPCERTCC/MalConfScan) - MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This tool searches for malware in memory images and dumps configuration data. In addition, this tool has a function to list strings to which malicious code refers. * [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis.