• GitHub
  • Contact
The Volatility Foundation - Promoting Accessible Memory Analysis Tools Within the Memory Forensics Community
  • The Volatility Framework
  • Training
  • Events
  • FAQ
  • Contest
  • About
  • Blog
Select Page

Memory Forensics Across the Enterprise – *Beta*

by Jamie Levy | Jul 18, 2016 | enterprise, training, volatility

I would like to let you know about a *Beta* course opportunity that I’m hosting this summer. The Beta course, Memory Forensics Across the Enterprise – Beta, is offered at a discounted rate exclusively to those who have completed our first course, Windows Malware...

Volshell Quickie: The Case of the Missing Unicode Characters

by Jamie Levy | Jun 3, 2015 | quickie, volshell, windows

The other day someone reached out to me because they had a case that involved files with Arabic names.  Unfortunately the filenames were only question marks when using filescan or handles, so I set out to figure out why. In order to figure out why, I created a...

Using mprotect(.., .., PROT_NONE) on Linux

by Jamie Levy | May 15, 2015 | linux, page permissions, volatility

After deciding to revisit some old code of mine (ok, very old), I realized that there was something different about how Linux was allocating pages of data I wanted to hide.   At first, I was glad that I couldn’t see the data using yarascan, but...

2014 Malware and Memory Forensics Training Schedule Part 2

by Jamie Levy | Oct 31, 2013 | malware, training, volatility, windows

The Volatility Team would like to announce that our first public training on the East Coast for 2014 will take place in New York City on May 5th – 9th, 2014. Instructors: Michael Ligh (@iMHLv2), Andrew Case (@attrc), Jamie Levy (@gleeda) To request a link to the...

Sampling RAM Across the (EnCase) Enterprise

by Jamie Levy | Oct 10, 2013 | encase, sampling, volatility, windows

One thing that people may or may not realize is that you can mount memory with EnCase and use Volatility directly against the mounted memory “file”. This can be especially useful for checking your enterprise for infected machines in order to narrow your...
« Older Entries

Volatility Blog Archive

2025

  • + July (1)
  • + May (2)
  • + March (1)

2024

  • + August (1)
  • + July (1)
  • + March (1)

2023

  • + August (1)
  • + July (1)
  • + June (1)
  • + March (1)
  • + February (1)
  • + January (1)

2022

  • + July (1)
  • + February (1)
  • + January (1)

2021

  • + October (1)
  • + August (1)
  • + May (1)
  • + January (1)

2020

  • + November (1)
  • + May (2)

2019

  • + November (1)
  • + October (2)
  • + July (1)
  • + June (1)

2018

  • + November (2)
  • + May (1)
  • + February (1)

2017

  • + November (1)
  • + June (1)
  • + April (1)

2016

  • + December (2)
  • + September (1)
  • + August (2)
  • + July (1)
  • + April (3)

2015

  • + November (2)
  • + October (1)
  • + August (2)
  • + July (2)
  • + June (1)
  • + May (1)
  • + March (1)
  • + February (1)
  • + January (1)

2014

  • + December (1)
  • + October (3)
  • + September (5)
  • + August (6)
  • + July (2)
  • + May (1)
  • + April (2)
  • + February (2)
  • + January (5)

2013

  • + October (3)
  • + September (2)
  • + August (1)
  • + June (9)
  • + May (15)
  • + April (2)
  • + March (2)
  • + February (1)
  • + January (4)

2012

  • + December (2)
  • + November (1)
  • + October (14)
  • + September (19)
bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo
    bluesky logo

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

    All Content © The Volatility Foundation, a 501(c)(3) Nonprofit Organization.

     

    Loading Comments...
     

    You must be logged in to post a comment.