memtriage
RAM analyzer
Analyze Windows machine RAM artifacts using Winpmem and Volatility
Allows you to quickly query a Windows machine for RAM artifacts
218 stars
16 watching
22 forks
Language: Python
last commit: over 4 years ago live-analysismalwarememorymemory-analysismemory-forensicsramvolatilitywindows-machinewinpmem
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates memory analysis of malware samples and memory dumps by extracting binaries, injections, strings, and analyzing code using heuristics and YARA/Clam AV scanners. | 264 |
| Automated tool for forensic analysis of Windows memory dumps | 555 |
| A tool for processing Windows memory images to extract relevant information | 260 |
| A tool for analyzing memory on Windows systems to detect malware IOCs | 707 |
| Automates the process of remotely dumping RAM and creating volatility profiles on Linux clients. | 161 |
| Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |
| A resource for .NET memory analysis and diagnostics | 1,841 |
| Analyzes C code for its memory layout and dependencies | 25 |
| Provides tools and models for analyzing financial time series and detecting patterns in volatility. | 1,342 |
| An AI-powered system that leverages multimodal reasoning and action to analyze visual data and provide insights | 940 |
| An analyzer tool designed to parse and extract data from Windows.edb files, a database used by Windows Search. | 121 |
| Analyzes and validates physical memory from various systems to extract process information and hypervisor details | 281 |
| A web-based tool for analyzing memory dumps using the Volatility framework. | 381 |
| A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,056 |
| A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |