diff --git a/README.md b/README.md index 8004536..6406306 100644 --- a/README.md +++ b/README.md @@ -600,6 +600,8 @@ the [browser malware](#browser-malware) section.* Volatility Memory Forensics Framework. * [FindAES](http://jessekornblum.livejournal.com/269749.html) - Find AES encryption keys in memory. +* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - High speed memory analysis framework + developed in .NET supports all Windows x64, includes code integrity and write support. * [Muninn](https://github.com/ytisf/muninn) - A script to automate portions of analysis using Volatility, and create a readable report. * [Rekall](http://www.rekall-forensic.com/) - Memory analysis framework,