Twitter | Search | |
volatility
Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training.
3,272
Tweets
8
Following
16,673
Followers
Tweets
volatility retweeted
Jessica Hyde Jul 17
Excellent presentation from full of great techniques to use memory 4n6 for triage in LE investigations
Reply Retweet Like
volatility retweeted
jeff bryner 16h
Volatility tattoos all around!
Reply Retweet Like
volatility retweeted
Aaron Sparling 2h
is one of the best presenters out there and scary smart too. Oh and a great person. Super jazzed to have been able to chat with him this week.
Reply Retweet Like
volatility retweeted
Jessica Hyde 22h
Learning about HookTracer which automates the complex analysis of API Hooks from
Reply Retweet Like
volatility retweeted
Ben LeDoux 22h
This was an amazing overview of using HookTracer in Volatility, I want to start researching it immediately.
Reply Retweet Like
volatility retweeted
Paul Jaramillo 22h
My Top 5 InfoSec Contributors (famous because of their awesome work) in the Last 5 years, in no particular order - Volatility Crew - Tavis - Rob 2.0 Lee - Chris Sanders - Thomas Rid What is your list?
Reply Retweet Like
volatility retweeted
DanielClemens Jul 16
& you guys are trail blazers!! Keep up the acquisition and carving of memory. Love watching you guys strive for excellence while defining the landscape.
Reply Retweet Like
volatility retweeted
Vee Jul 17
has been a tool in my Arsenal and I must say it has become a very important part of my research into Malware.
Reply Retweet Like
volatility Jul 16
. thanks for expressing your support for the community! We are big fans of the work you and your team are doing at and .
Reply Retweet Like
volatility Jul 15
If you are at this week, don't miss this presentation on Wednesday @ 9:30AM! Read more here:
Reply Retweet Like
volatility retweeted
Andrew Case Jul 11
If you aren't carving network packets out of memory samples then you need to add this to your processes as you are missing important artifacts:
Reply Retweet Like
volatility retweeted
Megan Roddie Jul 7
Still a work in progress, but since it is functional and I spent a lot of time on it already, wanted to share my current work on using for analysis of results. Here is my writeup:
Reply Retweet Like
volatility Jul 3
Replying to @DFRWS
Read more about our presentation of our latest research project here:
Reply Retweet Like
volatility Jul 3
In collaboration w & his students, will be presenting HookTracer research built on at . Thanks to for funding the next generation of memory forensics research & helping us transform the world!
Reply Retweet Like
volatility retweeted
Eoin Carroll Jun 28
Operating System Internals analysis - tools needed: Disassembler, Debugger and don’t forget - what a powerful framework it’s absolutely awesome!
Reply Retweet Like
volatility retweeted
Andrew Case Jun 28
. & I will be back at Vegas teaching our 4 day, hands-on Digital Forensics & Incident Response class. Fully updated for the latest Windows 10 release and with many new labs!
Reply Retweet Like
volatility retweeted
Volexity Jun 12
Reply Retweet Like
volatility retweeted
Andrew Case Jun 26
Anytime you can get on board to help you with a project then you should take it If you ever analyzed a VAD or registry data in Volatility then that was because of his original research: and
Reply Retweet Like
volatility Jun 25
Congratulations to and ! Their research using to explore issues with “smearing” during memory acquisition was published in the April 2019 ACM Transactions on Privacy and Security.
Reply Retweet Like
volatility retweeted
volatility Jun 17
It's time! The contests are live! Due date: Oct 1 2019. Over $5000 in cash prizes for developers AND analysts. Good luck to all!
Reply Retweet Like