Allows you to quickly query a Windows machine for RAM artifacts
-
Updated
Jul 17, 2020 - Python
Allows you to quickly query a Windows machine for RAM artifacts
Process heap analysis framework - Windows/Linux - record type inference and forensics
👀Dynamic memory watcher/tracer/analyzer for CTF pwn
pwn & ctf tools for windows
Emma Memory and Mapfile Analyser
Introducing the Temporal Dimension to Memory Forensics - ACM Transactions on Privacy and Security 2019
A Python-based tool for analyzing and manipulating the memory of running processes on a Windows system. Features include listing processes, searching for processes by name or PID, scanning memory for specific values, writing values to memory, and checking for changes in memory values.
This script allows you to connect to a serial port and display incoming data in real-time. It also includes options to format, filter, and log the data.
A POC tool for initial quick memory analysis. DFIR for fun and learning!
A ProcInjectionsFind volatility plugin runs against malware-infected memory images or memory of live VMs and examines each memory region of all running processes to conclude if it is the result of process injection.
Collection of scripts to analyze the memory accesses on HEVC and VVC Test Models
CSCI570 Analysis of Algorithms Project: Sequence Alignment Problem
Graph process memory usage over time w/ Plotly
Add a description, image, and links to the memory-analysis topic page so that developers can more easily learn about it.
To associate your repository with the memory-analysis topic, visit your repo's landing page and select "manage topics."