dfrws2005-challenge

Memory analysis challenge

A challenge to extract information from a stolen laptop's memory after a malicious actor has deleted logs and covers their tracks

MEMORY ANALYSIS was one of the primary themes of DFRWS 2005. In an effort to motivate discourse, research and tool development in this area, the Organizing Committee created the intrusion/intellectual property theft scenario detailed below. This memory challenge was open to all, and team efforts were encouraged.

GitHub

1 stars
3 watching
0 forks
last commit: over 2 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
evild3ad/memprocfs-analyzer Automated forensic analysis tool for Windows memory dumps 540
ftramer/steal-ml An implementation of extraction attacks against Machine Learning models offered by Cloud-based services 344
securityjoes/forensicminer Automates evidence collection and analysis from Windows machines using PowerShell. 148
teamdfir/sift A suite of tools and images for building and managing digital forensics environments on AWS 491
shanek2/invtero.net Analyzes and validates physical memory from various systems to extract process information and hypervisor details 279
travisfoley/dfirtriage A digital forensic tool designed to gather and analyze data from Windows-based systems in incident response scenarios. 334
idiom/pftriage Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. 77
nccgroup/windowsmempagedelta Software designed to monitor Windows executable memory page changes to detect anomalies in system behavior 28
mdecrevoisier/microsoft-eventlog-mindmap Provides detailed mindmaps on Microsoft auditing capacities and event logs for security and monitoring 1,044
codeyourweb/fastfinder Tools for detecting suspicious files and directories on Windows and Linux endpoints. 232
zhangtp1996/openfe_reproduce Reproduce experiments and results from a research paper on fraud detection using machine learning algorithms. 3
iamgroot42/mimir Measures memorization in Large Language Models (LLMs) to detect potential privacy issues 121
rek7/mxtract Analyzes and dumps memory to extract sensitive information from running processes 582
ksreenivasan/ood_federated_learning Researchers investigate vulnerabilities in Federated Learning systems by introducing new backdoor attacks and exploring methods to defend against them. 64
lhfowl/robbing_the_fed This implementation allows an attacker to directly obtain user data from federated learning gradient updates by modifying the shared model architecture. 23