From f79dc0c08d9e87e12e3b63c9df388b93fb5d6a0c Mon Sep 17 00:00:00 2001 From: ktwo/ShaneK2 Date: Fri, 20 Jan 2017 18:57:32 -0800 Subject: [PATCH] Added inVtero.net Link to my new memory analysis platform ;) --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f62a8bf..06d4af6 100644 --- a/README.md +++ b/README.md @@ -101,6 +101,7 @@ A curated list of tools and resources for security incident response, aimed to h ### Memory Analysis Tools * [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework +* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support * [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools * [LiME](https://github.com/504ensicsLabs/LiME) - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices * [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis