memory-forensics

Installation
Summary

Acquire, analyze, and extract artifacts from memory dumps for incident response and malware analysis.

  • Supports live memory acquisition across Windows (WinPmem, DumpIt), Linux (LiME, /dev/mem), and macOS (osxpmem), plus virtual machine memory from VMware, VirtualBox, QEMU, and Hyper-V
  • Volatility 3 framework with 30+ plugins covering process analysis, network connections, DLL inspection, code injection detection, registry analysis, and file system artifacts
  • Includes malware analysis and incident response workflows with process tree visualization, hidden process detection, persistence mechanism discovery, and YARA integration for pattern matching
  • Detects injection techniques, rootkits, and credential artifacts; supports string extraction and cross-referencing across multiple data sources for timeline correlation
SKILL.md

Memory Forensics

Comprehensive techniques for acquiring, analyzing, and extracting artifacts from memory dumps for incident response and malware analysis.

Memory Acquisition

Live Acquisition Tools

Windows

# WinPmem (Recommended)
winpmem_mini_x64.exe memory.raw

# DumpIt
DumpIt.exe

# Belkasoft RAM Capturer
# GUI-based, outputs raw format
Related skills

More from wshobson/agents

Installs
6.4K
Repository
wshobson/agents
GitHub Stars
35.2K
First Seen
Jan 20, 2026