mirror of
https://github.com/meirwah/awesome-incident-response.git
synced 2024-10-01 01:06:19 -04:00
Adding rekall
This commit is contained in:
parent
28dcc63414
commit
7159e5b0ac
@ -26,7 +26,8 @@ A curated list of tools and resources for security incident response, aimed to h
|
|||||||
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
|
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
|
||||||
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
|
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
|
||||||
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
|
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
|
||||||
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
|
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
|
||||||
|
* [Rekall](http://www.rekall-forensic.com/) open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
|
||||||
|
|
||||||
### Memory Imaging Tools
|
### Memory Imaging Tools
|
||||||
* [OSForensics](http://www.osforensics.com/) - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual process’s memory space or physical memory dump can be done
|
* [OSForensics](http://www.osforensics.com/) - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual process’s memory space or physical memory dump can be done
|
||||||
|
Loading…
Reference in New Issue
Block a user