Results from the 2015 Volatility Plugin Contest are in!
by Volatility | Oct 29, 2015 | contest, forensics, linux, malware, volatility, volatility foundation, windows
The competition this year was fierce! We received 12 plugins to the contest. Similar to last year, ranking the submissions was one of the hardest things we’ve had to do. Each plugin is unique in its own way and introduces a capability to open source memory...Windows Malware and Memory Forensics Training in the UK
by Volatility | Mar 16, 2015 | artofmemoryforensics, malware, training, volatility
Windows Malware and Memory Forensics Training by The Volatility Project is the only memory forensics course officially designed, sponsored, and taught by the Volatility developers. One of the main reasons we made Volatility open-source is to encourage and...Advice from Det. Michael Chaves on Memory Forensics, KnTDD, and POS Malware
by Volatility | Feb 2, 2015 | knttools, malware, pos, ram scaper, training, volatility
The following story was shared by Detective Michael Chaves. It describes how he’s used Volatility, KnTDD, and memory forensics over the past year to investigate POS breaches at local businesses. Kudos to Michael for applying his skills in an effective and...Incorporating Disk Forensics with Memory Forensics – Bulk Extractor
by Volatility | Jan 27, 2015 | forensics, malware, volatility
In this post we will take our first look at a tool that is primarily used for disk forensics and show how it can be useful during memory forensics analysis as well. In the coming weeks we will have several follow on posts highlighting other tools and techniques....Announcing the 2014 Volatility Plugin Contest Results!
by Volatility | Oct 29, 2014 | contest, forensics, macosx, malware, rootkits, training, volatility, volatility foundation, windows
The competition this year was fierce! We received a total of nearly 30 plugins to the contest. Ranking the submissions was one of the hardest things we’ve had to do. Each plugin is unique in its own way and introduces a capability to open source memory forensics that...
You must be logged in to post a comment.