#memoryanalysis search results

MemProcFS-Analyzer v0.9 released with various enhancements. YARA support (incl. 284 rules for malware detection), improved ClamAV scan, Recent Folder Artifacts, Hunting Suspicious Image Mounts, Kroll RECmd Batch File v1.21, and much more. #MemProcFS #MemoryAnalysis #DFIR

Evild3ad79's tweet image. MemProcFS-Analyzer v0.9 released with various enhancements. YARA support (incl. 284 rules for malware detection), improved ClamAV scan, Recent Folder Artifacts, Hunting Suspicious Image Mounts, Kroll RECmd Batch File v1.21, and much more. #MemProcFS #MemoryAnalysis #DFIR

🚨 NEWLY UPDATED 🚨 🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 👉 Get your copy: sans.org/u/1Dfb #DFIR

sansforensics's tweet image. 🚨 NEWLY UPDATED 🚨

🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! 

It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 

👉 Get your copy: sans.org/u/1Dfb

#DFIR

Announcing the release of @Volexity Volcano One: Get the performance, automation, analytics & modernization of Volcano Server PLUS the portability & offline capabilities of Volcano UI Pro. Contact us to learn more: volexity.com/company/contac… #memoryanalysis #memoryforensics #dfir

Volexity's tweet image. Announcing the release of @Volexity Volcano One: Get the performance, automation, analytics & modernization of Volcano Server PLUS the portability & offline capabilities of Volcano UI Pro. Contact us to learn more: volexity.com/company/contac…

#memoryanalysis #memoryforensics #dfir

The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

volatility's tweet image. The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

.@Volexity Volcano Server & Volcano One v23.07.13 adds 100 new YARA rules & IOCs to detect tampering with ETW, AMSI, Defender + event logging; brute force logins; redirected standard handles + lots of modern Windows rootkit methods. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v23.07.13 adds 100 new YARA rules & IOCs to detect tampering with ETW, AMSI, Defender + event logging; brute force logins; redirected standard handles + lots of modern Windows rootkit methods. [1/3] 

#dfir #memoryforensics #memoryanalysis

.@Volexity Volcano Server & Volcano One v24.01.17 adds 150 new YARA rules, new IOCs for credential theft on Windows, and detection of new forms of code injection on Linux. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v24.01.17 adds 150 new YARA rules, new IOCs for credential theft on Windows, and detection of new forms of code injection on Linux. [1/3]

#dfir #memoryforensics #memoryanalysis

We are excited to welcome 5 new @NDengineering @ND_CSE #Summer2021Interns to the @Volexity team! They'll be working at a rapidly growing Washington DC startup this summer to help build #nextgen #memoryanalysis software. #GoIrish #memoryforensics #DFIR

Volexity's tweet image. We are excited to welcome 5 new @NDengineering @ND_CSE #Summer2021Interns to the @Volexity team! They'll be working at a rapidly growing Washington DC startup this summer to help build #nextgen #memoryanalysis software. #GoIrish #memoryforensics #DFIR

Forensicators, see how this cheatsheet authored by @sibertor can help! It provides a reference for #memoryanalysis operations in #Rekall, covering acquisition, live memory analysis, and parsing plugins. Download it here: digital-forensics.sans.org/u/xs2 #MemoryForensics #FOR526 #DFIR

sansforensics's tweet image. Forensicators, see how this cheatsheet authored by @sibertor can help! It provides a reference for #memoryanalysis operations in #Rekall, covering acquisition, live memory analysis, and parsing plugins. 

Download it here: digital-forensics.sans.org/u/xs2 

#MemoryForensics #FOR526 #DFIR

We just released MemProcFS-Analyzer v1.2.0 with various enhancements. Check out the changelog for more information. Happy Memory Analysis! #MemProcFS #MemoryAnalysis #DFIR github.com/LETHAL-FORENSI…


🔍 Master #memoryforensics with ease! This new cheat sheet supports @SANSInstitute #FOR508, offering insights into #memoryanalysis tools & techniques. A must-have for forensicators in the field. #ThreatHunting #DigitalForensics #DFIR @chadtilbury 👉sans.org/u/1xIr

sansforensics's tweet image. 🔍 Master #memoryforensics with ease! This new cheat sheet supports @SANSInstitute #FOR508, offering insights into #memoryanalysis tools & techniques. A must-have for forensicators in the field. #ThreatHunting #DigitalForensics #DFIR
@chadtilbury 
👉sans.org/u/1xIr

.@Volexity Volcano Server & Volcano One v24.04.16 adds 75 new YARA rules, as well as new IOCs for hidden home folders, ncat reverse shells, system time changes, and many more. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v24.04.16 adds 75 new YARA rules, as well as new IOCs for hidden home folders, ncat reverse shells, system time changes, and many more. [1/3]

#dfir #memoryforensics #memoryanalysis

If you are new to the concept of #MalwareConfigurations and how to parse them at scale, our latest series covers key approaches. We explore their complex nature, value and how we approach the task of building out parsers. #malware #MemoryAnalysis bit.ly/3Vq7iOQ

Unit42_Intel's tweet image. If you are new to the concept of #MalwareConfigurations and how to parse them at scale, our latest series covers key approaches. We explore their complex nature, value and how we approach the task of building out parsers. #malware #MemoryAnalysis bit.ly/3Vq7iOQ

.@Volexity Volcano Server & Volcano One v23.05.19 adds 125 new YARA rules, many new IOCs incl. process ghosting, integration of Windows registry + event logs into API + timeline results, & a refactored UI/UX alert pane. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v23.05.19 adds 125 new YARA rules, many new IOCs incl. process ghosting, integration of Windows registry + event logs into API + timeline results, & a refactored UI/UX alert pane. [1/3]
#dfir #memoryforensics #memoryanalysis

.@Volexity Volcano Server & Volcano One v23.11.22 adds direct cloud integrations + support for analyzing memory from Windows 23H2 & macOS Sonoma, and extends macOS persistence detection. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v23.11.22 adds direct cloud integrations + support for analyzing memory from Windows 23H2 & macOS Sonoma, and extends macOS persistence detection. [1/3]

#dfir #memoryforensics #memoryanalysis

BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations! LIMITED SEATS 👉sans.org/u/1nSc @SANSEMEA @mathias_fuchs

sansforensics's tweet image. BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth
Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations!
LIMITED SEATS 👉sans.org/u/1nSc
@SANSEMEA 
@mathias_fuchs

The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

volatility's tweet image. The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

🚨 NEWLY UPDATED 🚨 🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 👉 Get your copy: sans.org/u/1Dfb #DFIR

sansforensics's tweet image. 🚨 NEWLY UPDATED 🚨

🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! 

It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 

👉 Get your copy: sans.org/u/1Dfb

#DFIR

Use Visual Studio Code extensions like "Memory Usage" or "Heap Prof" to analyze your app’s memory consumption. Regularly profile to catch leaks early and optimize performance. #VSCode #MemoryAnalysis #CodingTips @code


No Breach. Just Presence. | HD.39 youtu.be/ITdj-xmMJHk?si… via @YouTube No breach. No escalation. Just entropy archived in silence. The scheduler knows. The log persists.🎥 #PassiveMonitoring #DigitalForensics #MemoryAnalysis #ZeroFootprint #OperationalLogging #HD39

hd03933's tweet card. No Breach. Just Presence. | HD.39

youtube.com

YouTube

No Breach. Just Presence. | HD.39


Use Visual Studio Code extensions like "Memory Usage" or "Heap Prof" to monitor and analyze your app's memory consumption in real-time. Identify leaks early and optimize performance efficiently! #VSCode #MemoryAnalysis #DevTips @code


DeepProbe automates memory forensics across Windows, Linux, and macOS, detecting hidden processes, persistence methods, and suspicious connections. Findings are mapped to MITRE ATT&CK for precise analysis. #MemoryAnalysis #ATTACKFramework #OpenSource ift.tt/bvQ7VyY


Tools like Volatility and Rekall make this possible. It’s forensic x-ray vision — and a must-know skill for modern SOC teams. #DigitalForensics #MemoryAnalysis #CyberSecurity #SOC #IncidentResponse #SOCAnalyst #DFIR


We just released MemProcFS-Analyzer v1.2.0 with various enhancements. Check out the changelog for more information. Happy Memory Analysis! #MemProcFS #MemoryAnalysis #DFIR github.com/LETHAL-FORENSI…


🚨 New Writeup Alert! 🚨 "Memory Analysis Introduction | TryHackMe Write-Up | FarrosFR" by Mochammad Farros Fatchur Roji is now live on IW! Check it out here: infosecwriteups.com/32e865e2a1c0 #farrosfr #tryhackme #memoryanalysis #infosec #security


Volatility 3 🔗 github.com/volatilityfoun… 👤 Volatility Foundation 📌 Reinvented: Modular, plugin-ready, Python 3-compatible forensic memory analysis tool—new codebase for 2025+ threats. #MemoryAnalysis #Vol3Power


🎉 Proud to earn my Memory Analysis badge on Let'sDefend! 📈 Digging deeper into memory forensics to stay sharp on the #BlueTeam side. Onward to more skills and a safer digital world! 🌐 #Cybersecurity #MemoryAnalysis @LetsDefendIO app.letsdefend.io/my-rewards/det…


🔍 Memory Analysis in Action! 🔍 Let’s start investigating: Identify malicious processes and modules. Look for unusual network connections. Analyze suspicious memory artifacts. 💪 Every detail matters in securing our endpoints! #Hezbollah #Pakistan #MemoryAnalysis

salamreza01's tweet image. 🔍 Memory Analysis in Action! 🔍

Let’s start investigating:

Identify malicious processes and modules.
Look for unusual network connections.
Analyze suspicious memory artifacts.

💪 Every detail matters in securing our endpoints!
#Hezbollah #Pakistan #MemoryAnalysis

🚀 Elevate your forensic investigations with our #MemoryForensics Cheat Sheet, supporting SANS #FOR508. Navigate #memoryanalysis like a pro with this indispensable guide. Perfect for all levels of expertise. #CyberSecurity #DigitalForensics @chadtilbury 👉sans.org/u/1xIr

sansforensics's tweet image. 🚀 Elevate your forensic investigations with our #MemoryForensics Cheat Sheet, supporting SANS #FOR508. Navigate #memoryanalysis like a pro with this indispensable guide. Perfect for all levels of expertise. #CyberSecurity #DigitalForensics
@chadtilbury 
👉sans.org/u/1xIr

9/10 Volatility Analyzes volatile memory dumps to identify forensic artifacts. Vital for uncovering what’s happening in memory during an incident! 📊 #Volatility #MemoryAnalysis


.@Volexity Volcano Server & Volcano One v24.09.12 adds 320 new YARA rules, IOCs for reverse shells on Linux, support for non-English unicode, and browser history from RAM [1/4] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v24.09.12 adds 320 new YARA rules, IOCs for reverse shells on Linux, support for non-English unicode, and browser history from RAM [1/4]
 
#dfir #memoryforensics #memoryanalysis

Just released MemProcFS-Analyzer v1.1.0 with various enhancements. Offline-Mode, Prefetch files, Microsoft Protection Logs, MemProcFS.log, 376 YARA rules, and much more. #MemProcFS #MemoryAnalysis #DFIR github.com/evild3ad/MemPr…


🚨 NEWLY UPDATED 🚨 🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 👉 Get your copy: sans.org/u/1Dfb #DFIR

sansforensics's tweet image. 🚨 NEWLY UPDATED 🚨

🧠 Struggling w/ #MemoryAnalysis? Our #MemoryForensics Cheat Sheet is here to help! 

It introduces an analysis framework & covers everything from memory acquisition to live memory analysis & tool usage. 

👉 Get your copy: sans.org/u/1Dfb

#DFIR

The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

volatility's tweet image. The 13th annual @volatility #PluginContest is OPEN for submissions! This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

MemProcFS-Analyzer v0.9 released with various enhancements. YARA support (incl. 284 rules for malware detection), improved ClamAV scan, Recent Folder Artifacts, Hunting Suspicious Image Mounts, Kroll RECmd Batch File v1.21, and much more. #MemProcFS #MemoryAnalysis #DFIR

Evild3ad79's tweet image. MemProcFS-Analyzer v0.9 released with various enhancements. YARA support (incl. 284 rules for malware detection), improved ClamAV scan, Recent Folder Artifacts, Hunting Suspicious Image Mounts, Kroll RECmd Batch File v1.21, and much more. #MemProcFS #MemoryAnalysis #DFIR

Announcing the release of @Volexity Volcano One: Get the performance, automation, analytics & modernization of Volcano Server PLUS the portability & offline capabilities of Volcano UI Pro. Contact us to learn more: volexity.com/company/contac… #memoryanalysis #memoryforensics #dfir

Volexity's tweet image. Announcing the release of @Volexity Volcano One: Get the performance, automation, analytics & modernization of Volcano Server PLUS the portability & offline capabilities of Volcano UI Pro. Contact us to learn more: volexity.com/company/contac…

#memoryanalysis #memoryforensics #dfir

Blackstorm Security training courses in Europe and Middle East: #malware #dfir #memoryanalysis #reverseengineering

blackstormsecbr's tweet image. Blackstorm Security training courses in Europe and Middle East: 

#malware #dfir #memoryanalysis #reverseengineering

Forensicators, see how this cheatsheet authored by @sibertor can help! It provides a reference for #memoryanalysis operations in #Rekall, covering acquisition, live memory analysis, and parsing plugins. Download it here: digital-forensics.sans.org/u/xs2 #MemoryForensics #FOR526 #DFIR

sansforensics's tweet image. Forensicators, see how this cheatsheet authored by @sibertor can help! It provides a reference for #memoryanalysis operations in #Rekall, covering acquisition, live memory analysis, and parsing plugins. 

Download it here: digital-forensics.sans.org/u/xs2 

#MemoryForensics #FOR526 #DFIR

🔍 Master #memoryforensics with ease! This new cheat sheet supports @SANSInstitute #FOR508, offering insights into #memoryanalysis tools & techniques. A must-have for forensicators in the field. #ThreatHunting #DigitalForensics #DFIR @chadtilbury 👉sans.org/u/1xIr

sansforensics's tweet image. 🔍 Master #memoryforensics with ease! This new cheat sheet supports @SANSInstitute #FOR508, offering insights into #memoryanalysis tools & techniques. A must-have for forensicators in the field. #ThreatHunting #DigitalForensics #DFIR
@chadtilbury 
👉sans.org/u/1xIr

BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations! LIMITED SEATS 👉sans.org/u/1nSc @SANSEMEA @mathias_fuchs

sansforensics's tweet image. BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth
Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations!
LIMITED SEATS 👉sans.org/u/1nSc
@SANSEMEA 
@mathias_fuchs

BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations! LIMITED SEATS 👉sans.org/u/1nSc @SANSEMEA @mathias_fuchs

sansforensics's tweet image. BETA 1 NOW OPEN | FOR532: Enterprise Memory Forensics In-Depth
Understand structured/unstructured #memoryanalysis in #Windows & #Linux OS & how #Memoryforensics fits into modern #DFIR investigations!
LIMITED SEATS 👉sans.org/u/1nSc
@SANSEMEA 
@mathias_fuchs

We are excited to welcome 5 new @NDengineering @ND_CSE #Summer2021Interns to the @Volexity team! They'll be working at a rapidly growing Washington DC startup this summer to help build #nextgen #memoryanalysis software. #GoIrish #memoryforensics #DFIR

Volexity's tweet image. We are excited to welcome 5 new @NDengineering @ND_CSE #Summer2021Interns to the @Volexity team! They'll be working at a rapidly growing Washington DC startup this summer to help build #nextgen #memoryanalysis software. #GoIrish #memoryforensics #DFIR

.@Volexity Volcano Server & Volcano One v24.01.17 adds 150 new YARA rules, new IOCs for credential theft on Windows, and detection of new forms of code injection on Linux. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v24.01.17 adds 150 new YARA rules, new IOCs for credential theft on Windows, and detection of new forms of code injection on Linux. [1/3]

#dfir #memoryforensics #memoryanalysis

.@Volexity Volcano Server & Volcano One v23.07.13 adds 100 new YARA rules & IOCs to detect tampering with ETW, AMSI, Defender + event logging; brute force logins; redirected standard handles + lots of modern Windows rootkit methods. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v23.07.13 adds 100 new YARA rules & IOCs to detect tampering with ETW, AMSI, Defender + event logging; brute force logins; redirected standard handles + lots of modern Windows rootkit methods. [1/3] 

#dfir #memoryforensics #memoryanalysis

If you are new to the concept of #MalwareConfigurations and how to parse them at scale, our latest series covers key approaches. We explore their complex nature, value and how we approach the task of building out parsers. #malware #MemoryAnalysis bit.ly/3Vq7iOQ

Unit42_Intel's tweet image. If you are new to the concept of #MalwareConfigurations and how to parse them at scale, our latest series covers key approaches. We explore their complex nature, value and how we approach the task of building out parsers. #malware #MemoryAnalysis bit.ly/3Vq7iOQ

To enhance examiner’s ability to conduct #MemoryAnalysis, we have added a new option for analyzing Microsoft crash dumps in #AXIOMCyber 7.0 with the integration of #Comae memory analysis technology. Learn all about it here: ow.ly/XcqC50NLhb6 #DFIR

MagnetForensics's tweet image. To enhance examiner’s ability to conduct #MemoryAnalysis, we have added a new option for analyzing Microsoft crash dumps in #AXIOMCyber 7.0 with the integration of #Comae memory analysis technology. Learn all about it here: ow.ly/XcqC50NLhb6 #DFIR

.@Volexity Volcano Server & Volcano One v24.04.16 adds 75 new YARA rules, as well as new IOCs for hidden home folders, ncat reverse shells, system time changes, and many more. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v24.04.16 adds 75 new YARA rules, as well as new IOCs for hidden home folders, ncat reverse shells, system time changes, and many more. [1/3]

#dfir #memoryforensics #memoryanalysis

.@Volexity Volcano Server & Volcano One v23.05.19 adds 125 new YARA rules, many new IOCs incl. process ghosting, integration of Windows registry + event logs into API + timeline results, & a refactored UI/UX alert pane. [1/3] #dfir #memoryforensics #memoryanalysis

Volexity's tweet image. .@Volexity Volcano Server & Volcano One v23.05.19 adds 125 new YARA rules, many new IOCs incl. process ghosting, integration of Windows registry + event logs into API + timeline results, & a refactored UI/UX alert pane. [1/3]
#dfir #memoryforensics #memoryanalysis

Loading...

Something went wrong.


Something went wrong.


United States Trends