memory-forensics
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating incidents, or performing malware analysis from RAM captures.
Author
Category
Other ToolsInstall
Download and extract to your skills directory
Copy command and send to OpenClaw for auto-install:
Memory Forensics - Memory Forensics Techniques
Skills Overview
Memory Forensics provides comprehensive guidance on memory forensics techniques, covering memory acquisition, process analysis, artifact extraction, and malware detection. It uses the Volatility 3 framework to help security analysts perform incident response and threat hunting.
Use Cases
Core Features
Frequently Asked Questions
What’s the difference between Memory Forensics and Disk Forensics?
Memory forensics analyzes a system’s runtime state (RAM). It can capture information that does not exist on disk: data before encryption, running processes, network connections, clipboard contents, unsaved files, decrypted passwords, and so on. Disk forensics mainly analyzes data stored persistently. They complement each other and are typically used together in investigations.
Which operating systems does Volatility 3 support?
Volatility 3 supports memory analysis for Windows (from XP to Windows 11), Linux, and macOS. Different systems require corresponding symbol tables to correctly parse data structures. Windows analysis is the most mature, with the richest plugin set; Linux supports common distributions; macOS support is relatively limited but still usable.
How do you detect process injection in memory?
Using Volatility’s malfind plugin, you can detect suspicious memory injection indicators such as memory regions with PAGE_EXECUTE_READWRITE permissions, the presence of MZ file headers in non-image VAD regions, and typical shellcode patterns. Combined with vadinfo analysis of memory protection attributes and dlllist checks for abnormal DLL loads, you can comprehensively determine whether injection behavior exists.