The Volatility Framework 2.0 : An advanced memory forensics framework
Labels:
Hacking Tools,
Reverse Engineering,
Security Tools
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.
What's new in 2.0
- Restructured and depolluted namespace
- Usage and Development Documentation
- New Configuration Subsystem
- New Caching Subsystem
- New Pluggable address spaces with automated election
- New Address Spaces (i.e. EWF, Firewire)
- Updated Object Model and Profile Subsystems (VolatilityMagic)
- Support for Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7
- Updated Scanning Framework
- Volshell integration
- Over 40 new plugins!
Subscribe to our Daily Newsletter via email - Be First to know about Security and Penetration testing tools. or Join our Huge Hackers Community on Facebook , Google+ and Twitter .
Subscribe Top Hacker Stories via email
Posted by Mohit Kumar at Monday, June 25, 2012 0 Comments
The Hacker News - Daily Updates