From b5eeec36b16fb812310df8281303f2092e456a90 Mon Sep 17 00:00:00 2001 From: Meir Wahnon Date: Wed, 24 Feb 2016 19:50:41 +0200 Subject: [PATCH] reverting... --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 21a1585..d12c832 100644 --- a/README.md +++ b/README.md @@ -46,7 +46,7 @@ A curated list of tools and resources for security incident response, aimed to h * [Belkasoft Live RAM Capturer](http://belkasoft.com/ram-capturer) - A tiny free forensic tool to reliably extract the entire content of the computer’s volatile memory – even if protected by an active anti-debugging or anti-dumping system ### Process Dump Tools -* [PMDump](http://www.securityfocus.com/tools/2466) - PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process +* [PMDump](http://www.ntsecurity.nu/toolbox/pmdump/) - PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process * [Microsoft User Mode Process Dumper](http://www.microsoft.com/en-us/download/details.aspx?id=4060) - The User Mode Process Dumper (userdump) dumps any running Win32 processes memory image on the fly ### Timeline tools