mirror of
https://github.com/meirwah/awesome-incident-response.git
synced 2024-12-25 23:29:30 -05:00
commit
d147e6286d
@ -32,6 +32,9 @@ A curated list of tools and resources for security incident response, aimed to h
|
||||
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
|
||||
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
|
||||
* [Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
|
||||
* [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis.
|
||||
* [Memoryze for Mac](https://www.fireeye.com/services/freeware/memoryze-for-the-mac.html) - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however.
|
||||
|
||||
|
||||
### Memory Imaging Tools
|
||||
* [OSForensics](http://www.osforensics.com/) - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual process’s memory space or physical memory dump can be done
|
||||
|
Loading…
Reference in New Issue
Block a user