Volatility Update: Core team is growing!
by Volatility | Sep 29, 2016 | artofmemoryforensics, volatility, volatility foundation
Next year marks the 10-year anniversary of the first public release of Volatility! This would not have beenpossible without the friendship and support of the amazing Volatility Community. One of the original goals of Volatility was to create a project that would help...Malware and Memory Forensics 2017 Schedule (Now with Linux, Mac, and Surge Collect Pro)
by Volatility | Aug 10, 2016 | artofmemoryforensics, linux, macosx, surge, training, volatility, windows
Our most popular training course just got even better! We’re happy to announce the curriculum for Malware and Memory Forensics by The Volatility Project now includes the following: Linux and Mac OS X memory analysis Windows memory acquisition with Volexity Surge...Memory Forensics Across the Enterprise – *Beta*
by Jamie Levy | Jul 18, 2016 | enterprise, training, volatility
I would like to let you know about a *Beta* course opportunity that I’m hosting this summer. The Beta course, Memory Forensics Across the Enterprise – Beta, is offered at a discounted rate exclusively to those who have completed our first course, Windows Malware...The 2016 Volatility Plugin Contest is now live!
by Volatility | Apr 4, 2016 | contest, volatility, volatility foundation
This is a quick update to announce that the 2016 Volatility Plugin contest is now live and accepting submissions until October 1st. Winners of this year’s contest will be receiving over $2,000 in cash prizes as well as plenty of Volatility swag...PlugX: Memory Forensics Lifecycle with Volatility
by Volatility | Nov 6, 2015 | anti-forensics, code injection, contest, impscan, malfind, osdfcon, plugx, rootkits, volatility
At OSDFCon last week, we discussed a case study showing how we identified manipulated memory artifacts in an infected environment. We were then able to rapidly introduce new capabilities to Volatility that could be used proactively in other environments. The...
You must be logged in to post a comment.