0xAGUNZ / awesome-memory-forensics

A curated list of awesome Memory Forensics for DFIR

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Awesome Memory Forensics

Awesome

A curated list of awesome Memory Forensics for DFIR.

Memory Forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are stealthy enough to avoid leaving data on the computer's hard drive. Consequently, the memory (RAM) must be analyzed for forensic information.

Fundamental

  • Operating Systems
  • Computer Structure
  • Reverse Engineering
  • Malware Analysis
  • Windows Internals
  • Digital Forensics
  • Incident Response

⚙️ Tools

Memory Acquisition

Introduce commercial and open source tools for memory acquisition.

Memory Analysis

Introduce commercial and open source tools for memory analysis.

  • Volcano - A comprehensive, cross-platform, next- generation memory analysis solution, Volexity Volcano Professional’s powerful core extracts, indexes, and correlates artifacts to provide unprecedented visibility into systems’ runtime state and trustworthiness.
  • Volatility3 - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples.
  • MemProcFS - The Memory Process File System (MemProcFS) is an easy and convenient way of viewing physical memory as files in a virtual file system.
  • WinDbg - The Windows Debugger (WinDbg) can be used to debug kernel-mode and user-mode code, analyze crash dumps, and examine the CPU registers while the code executes.
  • Volatility - The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples.
  • Volafox - macOS Memory Analysis Toolkit' is developed on Python 2.x (Deprecated)
  • Rekall - A new branch within the Volatility project was created to explore how to make the code base more modular, improve performance, and increase usability. (Deprecated)
  • Redline - The Windows Debugger (WinDbg) can be used to debug kernel-mode and user-mode code, analyze crash dumps, and examine the CPU registers while the code executes. (Deprecated)

Books

Course

🖥 Videos

13 Cubed

DFIR Science

Black Hat 2022

Black Hat 2019

SANS Digital Forensics and Incident Response

ETC

Articles

JPCERT

Blogs

WriteUps

Papers

Digital Investigation

DFRWS USA 2022

DFRWS EU 2022

  • Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
  • Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing
  • Memory forensic analysis of a programmable logic controller in industrial control systems

DFRWS USA 2021

  • Duck Hunt: Memory Forensics of USB Attack Platforms
  • Seance: Divination of Tool-Breaking Changes in Forensically Important Binaries
  • Leveraging Intel DCI for Memory Forensics

DFRWS EU 2021

DFRWS USA 2020

Test Dataset

  • Digital Corpora
  • NIST
  • Memory Forensic Training
  • MemLabs

🏆 Challenges

🌳 Contributors

Thank you for your contribution!

We welcome any contribution to the extent that Code of Conduct and the License comply.

About

A curated list of awesome Memory Forensics for DFIR

License:MIT License