Skip to content

Volatility Documentation Project

gleeda edited this page Feb 13, 2015 · 40 revisions

This is a catalog of research, documentation, analysis, and tutorials generated by members of the volatility community. If you've written about volatility and don't see your work represented in the list, please let us know. The items are in time order, with the most recent items appearing at the top of the table.

Year Month Type Title Author
2015 February Blog Volatility plugin for Dyre Kudelski Security
2015 January Blog Triaging a System Infected with Poweliks Corey Harrell (@corey_harrell)
2015 January Blog Hunting and Decrypting Communications of Gh0st RAT in Memory Monnappa (@monnappa22)
2014 December Blog Pattern-Based Approach for In-Memory ShellCodes Detection Emanuele De Lucia
2014 December Blog Parsing the hiberfil.sys, searching for slack space DiabloHorn
2014 December Book Black Hat Python (Chapter 11 Automating Offensive Forensics) Justin Seitz (@jms_dot_py)
2014 November Video Presentation Reverse All the Things with PANDA Brendan Dolan-Gavitt (@moyix)
2014 November Code Detekt - Malware Triaging Tool Claudio Guarnieri (@botherder)
2014 November Presentation Science, Sharing, and Repeatability in Memory Forensics Brendan Dolan-Gavitt (@moyix)
2014 November Presentation Next Generation Memory Forensics The @volatility developers
2014 November Blog 9447 2014 CTF Write Up: coor coor (using Volatility to extract OTR keys) Bernardo Rodrigues
2014 November Blog Viewing Thread Information in Mac Memory Cem Gurkok (@CGurkok)
2014 November Blog Tracing Bits of Coins in Mac Memory Cem Gurkok (@CGurkok)
2014 November Blog Finding Call Reference Hooks in Mac Memory Cem Gurkok (@CGurkok)
2014 November Blog Detecting Shadow TrustedBSD Policy Tables In Mac Memory Cem Gurkok (@CGurkok)
2014 November Presentation [Memory Forensics for IR- Leveraging Volatility to Hunt Advanced Actors] (http://www.slideshare.net/jared703/vol-ir-jgss114) Jared Greenhill (@jared703)
2014 October Blog Vol-MsDecompress (plugin contest) Jamaal Speights (@jamaalspeights)
2014 October Video SecTor 2014 - Unmasking Careto through Memory Analysis Andrew Case (@attrc)
2014 September Blog How to remotely acquire physical memory using @fresponse and @volatility Ryan Bentz (@grayhatninja)
2014 September Blog Announcing the BETA release of DAMM Vico Marziale (@vicomarziale)
2014 September Blog Volatility autoruns plugin Thomas Chopitea (@tomchop_)
2014 August Blog Volatility Plugin – SQLite Helper Dave Lassalle (@superponible)
2014 August Blog Volatility Plugin – Firefox History Dave Lassalle (@superponible)
2014 August Blog Volatility Plugin – Java IDX Parser Dave Lassalle (@superponible)
2014 August Blog Volatility Plugin – Chrome History Dave Lassalle (@superponible)
2014 August Blog Volatility Plugin – Office Trust Records Dave Lassalle (@superponible)
2014 August Blog Volatility Plugin – SSDeep for malfind and apihooks Dave Lassalle (@superponible)
2014 August Blog Fast Malware Triage Using Openioc_scan Volatility Plugin Takahiro Haruyama (@cci_forensics)
2014 June Paper In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux Golden G. Richard III and Andrew Case
2014 June Paper Applying Memory Forensics to Rootkit Detection Igor Korkin and Ivan Nesterov
2014 May Video TWC: Recalling Windows Memories Paula Januszkiewicz
2014 May Blog Acquiring Linux Memory from a Server Far Far Away Dan Caban
2014 May Slides Mo' Memory No' Problem Glenn P. Edwards, Jr. (@HiddenIllusion) and Ian Ahl (@TekDefense)
2014 May Blog Targeted Forensics: Mapping a Process to a Malicious Command and Control Justin Grosfelt
2014 May Blog Mr Silverlight Drive-by Meet Volatility Timelines Corey Harrell (@corey_harrell)
2014 May Blog GETTING STARTED WITH MEMORY FORENSICS Salim Awad
2014 May Code Volatility USN Journal Parser Tom Spencer
2014 May Blog Post-Mortem Memory Analysis of Cold-Booted Android Devices Hilgers, Macht, Muller, Spreitzenbarth
2014 April Blog Windows Logon Password – Get Windows Logon Password using Wdigest in Memory Dump For-MD (http://for-md.org)
2014 April Blog Hyper-V 2012 and 2012 R2 live virtual machine memory acquisition and analysis Wyatt Roersma (@WyattRoersma)
2014 April Blog Rewriting/anonymizing artifacts Glenn P. Edwards Jr. (@hiddenillusion)
2014 March Blog Analyzing a Linux Memory Dump Ric Messier (@ricmessier)
2014 March Blog Finding Advanced Malware Using Volatility Monnappa (@monnappa22)
2014 March Blog Uroburos Rootkit Hook Analysis and Driver Extraction @spresec
2014 March Code OpenVPN credentials extractor Phaeilo
2014 March Blog Creating Volatility Linux Profiles (openSUSE) @Evild3ad79
2014 March Blog Creating Volatility Linux Profiles (Debian/Ubuntu) @Evild3ad79
2014 February Presentation Hunting Mac Malware with Memory Forensics Andrew Case (@attrc)
2014 February Presentation Hunting for OS X Rootkits in Memory Cem Gurkok (@CGurkok)
2014 February Blog Dumping DarkComet config out of memory using volatility @dfirn00b
2014 February Blog Malware with No Strings Attached - Dynamic Analysis Brian Baskin (@bbaskin)
2014 February Blog Finding malicious DLLs with Volatility Chris Gates (@carnal0wnage)
2014 January Presentation memory forensics introductory work shop Sandro Suffert (@suffert)
2014 January Blog Forensics Analysis of Anti-Forensic Activities Jack Crook (@jackcr)
2014 January Blog PlugX "v2": meet "SController" F4b (@0xf4b)
2014 January Blog PHDays CTF 2014 - FreeBDSM Mariano Graziano (@emd3l)
2013 December Blog Cryptolocker Analysis with Volatility Cornel
2013 December Blog Another look at a cross-platform DDoS botnet Andre' Di Mino (@sempersecurus)
2013 December Blog ANALYZING DARKCOMET IN MEMORY Ian Ahl (@!TekDefense)
2013 December Blog The botmaster: jackcr - 12/27/13 memory image Kyle Oetken (@kyleoetken)
2013 December Blog Malware Capabilities and Conspiracy Theory Jack Crook (@jackcr)
2013 December Blog Analizando un trozito de memoria jony
2013 December Blog A Forensic Overview of a Linux perlbot Andre' Di Mino (@sempersecurus)
2013 December Blog DC3 Forensic Challenge - Memory Analysis J. Oquendo
2013 November Blog Hunting APT RAT 9002 In Memory Using Volatility Plugin Monnappa (@monnappa22)
2013 November Blog Analyzing Malicious Processes Jack Crook (@jackcr)
2013 November Blog Volatility 2.3 and FireEye's diskless, memory-only Trojan.APT.9002 Russ !McRee (@holisticinfosec)
2013 October Blog Locating injected code in memory Jack Crook (@jackcr)
2013 October Blog Analyzing Hyper-V Saved State files in Volatility Wyatt Roersma (@!WyattRoersma)
2013 October Blog/Paper GrrCON DFIR Challenge 2013 Wyatt Roersma (@!WyattRoersma)
2013 October Code Filelist and Virustotal Volatility Plugins Sebastien Bourdon-Richard
2013 October Blog Dumping Malware Configuration Data from Memory with Volatility Brian Baskin (@bbaskin)
2013 October Blog VOLSHELL FOR THE WEB! Martijn Veken (@martijnveken)
2013 September Blog The Hunt for Memory Malware Albert Fruz
2013 August Blog Total Recall Script Released Melissa (@sk3tchymoos3)
2013 August Code Some scripts/plugins for Volatility Glenn P. Edwards Jr (@hiddenillusion)
2013 August Code Volatility Interface to the Binary Analysis Platform Carl Pulley
2013 August Blog Quick Volatility overview and R.E. analysis of Win32.Chebri Evilcry
2013 August Blog JackCR ISSA 2013 Netwars Challange - Memory Issues Bryan Nolen (@!BryanNolen)
2013 August Blog vadimm Jamaal Speights (@jamaalspeights)
2013 August Video Topics in post-mortem debugging Adam Leventhal (@ahl)
2013 August Blog How to install Volatility on Mac OS X (Version 10.8.4) Evild3ad (@Evild3ad79)
2013 August Paper Integrity Verification of User Space Code White, Schatz, Foo
2013 July Blog Hooking IDT in OS X and Detection Cem Gurkok (@CGurkok)
2013 July Blog Advanced Malware Analysis Training Session 7 – Malware Memory Forensics Monnappa (@monnappa22)
2013 July Blog Back to Defense: Finding Hooks in OS X with Volatility Cem Gurkok (@CGurkok)
2013 July Blog Zeus trojan memory forensics with Volatility Javier Nieto Arevalo
2013 July Code Linux Threads and CPU Registers Plugins Edwin Smulders (0x445554434859)
2013 July Blog Offensive Volatility: Messing with the OS X Syscall Table Cem Gurkok (@CGurkok)
2013 July Blog Ethscan: volatility memory forensics framework plugin for recovering Ethernet frames from memory. Jamaal Speights (@jamaalspeights)
2013 June Paper Hypervisor Memory Forensics (pdf) Mariano Graziano (@emd3l)
2013 June Blog Analizando un trozito de memoria neofito (@neosysforensics)
2013 June Blog Volatility 2.2 Class/Api Documentation Jamaal Speights (@jamaalspeights)
2013 May Blog Zues Analysis - Memory Forensics Via Volatility Zubair Ashraf (@zashraf1337)
2013 May Blog Automatic Plugin Generation with Dalvik Inspector Joe Sylve (@jtsylve) and Vico Marziale (@vicomarziale)
2013 May Blog check_dtrace - A Volatility Plugin Arises Cem Gurkok (@CGurkok)
2013 April Blog Actaeon - Hypervisors Hunter Mariano Graziano (@emd3l)
2013 April Blog Forensic Analysis of Memory on Linux Peter Schulik
2013 April Blog Cyber Defense Exercise 2013: Extracting cached passphrases in Truecrypt syreal
2013 April Blog Hunting D-Trace Rootkits with The Volatility Framework Cem Gurkok (@CGurkok)
2013 April Blog Android Application (Dalvik) Memory Analysis & the Chuli Malware Joe Sylve (@jtsylve) and Vico Marziale (@vicomarziale)
2013 March Slides Memory Forensics - Helping to Find What's Not There Melissa Augustine (@sk3tchymoos3)
2013 March Blog Live Linux forensics in a KVM based environment charley pfaff (@bl4ck_0ut)
2013 March Paper Indicators of Compromise in Memory Forensics Chad Robertson (@chrooted)
2013 March Blog OSX Live Memory Forensics with Volatility Jon Schipp (@jonschipp)
2013 March Presentation Memory Analysis with Volatility Russ !McRee (@holisticinfosec)
2013 March Presentation Memory Analysis with Volatility Karl Sigler (@ksigler)
2013 February Blog Memory Dump Hash Cracking Mike Machnik (@machn1k)
2013 February Video Using LiME & Volatility to analyze Linux memory Brian Keefer (@chort0)
2013 February Video Using Cuckoobox & Volatility to analyze APT1 malware Brian Keefer (@chort0)
2013 February Slides My First Incident Response Team Brian Keefer (@chort0)
2013 February Blog Manipulating Memory for Fun & Profit Frederic Bourla
2013 February Blog Using OSForensics with Volatility @PassMarkInc
2013 February Blog Volatility – Memory Analysis Tool Rehan Bashir (@rehan2001)
2013 February Blog Set up your keylogger to report by email? Bad idea! (The case of Ardamax) Alberto Ortega (@a0rtega)
2013 January Paper Live Memory Forensics on Android with Volatility Holger Macht
2013 January Slides Defeating Windows Memory Forensics Luka Milkovic
2013 January Blog Volatility vs Citadel 1.3.4.5 Santiago Vicente @smvicente
2013 January Blog Stabuniq Financial Infostealer Trojan Analysis Quequero & Evilcry
2012 Decemnber Blog Hunting Malware with Memory Analysis Jeremy Scott (@Solutionary)
2012 December Paper @Jackcr Forensic Challenge Bryan Nolen (@!BryanNolen)
2012 December Paper Hunting Mac OS X Rootkits with Memory Forensics K. Lee, J. Kim, H. Koo
2012 November Blog jackr forensic challenge 2 @infoseckitten, @magicked, @alwaysreit
2012 November Video DFIROnline: Android Forensics with Volatility and LiME Andrew Case (@attrc)
2012 November Blog APTish Attack via Metasploit - Part III - Memory Analysis Patrick Olsen (@patrickrolsen)
2012 November Blog @jackcr forensic challenge @infoseckitten, @magicked, @alwaysreit
2012 November Blog Memory Forensics for Malware Analysis Andrew !McNicol
2012 November Blog Automating Volatility @martijnveken
2012 November Paper Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds UC Santa Barbara
2012 October Slides Case Study - Rootkit Analysis m0nna (@monnappa22)
2012 October Blog Backdoors are Forever: Hacking Team and the Targeting of Dissent? Morgan Marquis-Boire (@headhntr)
2012 October Blog Blackhole & Cridex: Season 2 Episode 1: Intuit Spam & SSL traffic analysis Andre' Di Mino (@sempersecurus)
2012 September Paper Acquiring Digital Evidence from Botnet Attacks Junewon Park
2012 September Blog cr0security rootkit analysis Teguh P. Alko
2012 September Blog Linux, Volatility, and Profiles neofito (@neosysforensics)
2012 August Paper/Slides Virtual Machine Introspection in a Hybrid Honeypot Architecture Lengyel, et. al.
2012 August Blog Using Volatility Framework as a Library Adam Pridgen
2012 August Blog Identifying a mounted TrueCrypt volume from artifacts in volatile memory Adam Bridge (bridgeythegeek)
2012 August Blog Pen Test Privilege Escalation Through Suspended Virtual Machines Mark Baggett (@markbaggett)
2012 August Blog Cridex Analysis Using Volatility Andre M. !DiMino (@sempersecurus)
2012 August Blog Extracting processes binary w/ volatility, disk image @ykx100
2012 August Magazine Malware Memory Forensics Monnappa
2012 August Blog Configure Volatility framework on Windows OS Stefano Antenucci
2012 August Blog Recoving tmpfs from Memory with Volatility Andrew Case (@attrc)
2012 June Slides You suck at Memory Analysis Francisco Gama T. R. (@blackthorne)
2012 June Blog QuickPost: Flame & Volatility Michael Ligh (@iMHLv2)
2012 June Blog Announcing Mac Support in Volatility Andrew Case (@attrc)
2012 June Slides Mac Memory Analysis with Volatility Andrew Case (@attrc)
2012 June Blog LiME 1.1 Released Joe Sylve (@jtsylve)
2012 June Blog/Video Training Session Part 8 – Practical Reversing (III) – Memory Forensics Monnappa
2012 June Code Volatility plugin to detect Poison Ivy in memory and dump run-time config Andreas Schuster (@forensikblog)
2012 June Video Memory Analysis During Incident Response Brett Cunningham
2012 June Video Volatility Know How's MrKishorD
2012 June Blog Using Volatility with EnCase Mark Morgan
2012 July Blog From Bahrain With Love: FinFisher’s Spy Kit Exposed? Morgan Marquis-Boire
2012 July Blog Xtreme RAT analysis Malware.lu ([email protected])
2012 July Blog Volatility Guide - Living Doc s0ck3t
2012 May Paper sKyWIper (a.k.a. Flame, Flamer): A complex malware for targeted attacks CrySyS Lab (@CrySysLab)
2012 May Blog Tracking Malware Crumb in Memory @ykx100
2012 April Blog Memory Forensics Cheat Sheet @chadtilbury
2012 April Blog YARA + Volatility ... the beginning @hiddenillusion
2012 April Blog IETab_IE65 Malware Memory Analysis @patrickrolsen
2012 April Blog Registry Analysis in Volatility Tamer Hassan
2012 April Blog Malware Memory Analysis - Volatility Basement Tech
2012 April Video VOLATILITY & DUMPIT : DEADLY COMBO TO GET UR PASSWORDS anupam50
2012 March Video Malgram Dynamic Analyses (SRI International) uses Volatility in their sandbox SRI International
2012 March Blog From Hibernation file to Malware analysis with Volatility Christiaan Beek
2012 March Blog/Video Capstone Project: Volatile Memory Analysis – Identifying Rogue Executables Ben Rogers
2012 March Magazine Memory Timelines Using Volatility’s Timeliner Nick Baronian
2012 March Slides One-byte Modification for Breaking Memory Forensic Analysis Takahiro Haruyama and Hiroshi Suzuki
2012 February Blog RAM dump with VirtualBox: via ELF64 coredump Philippe Teuwen
2012 February Blog Suspected South Korean Malware @patrickrolsen
2012 January Blog Malware Analysis with SIFT and Volatility @patrickrolsen
2012 January Blog Running Volatility Memory Forensics Framework on your android phone! Jamaal Speights
2012 January Slides Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility Joe Sylve (@jtsylve)
2012 January Video Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility Joe Sylve (@jtsylve)
2012 January Paper Acquisition and Analysis of Volatile Memory from Android Devices Joe Sylve (@jtsylve) & Andrew Case (@attrc)
2012 January Blog Ramnit, Zeus and the BAT! Part 2 cbentle2
2011 December Slides Hunting Malware with Volatiltiy 2.0 Frank Boldewin
2011 November Video Using Volatility: Suspicious Process (1/2) Melissa (@sk3tchymoos3)
2011 November Video Using Volatility: Suspicious Process (Part 2/2) Melissa (@sk3tchymoos3)
2011 November Blog GRR: Google Rapid Response and Volatility AAron Walters
2011 November Blog Sandia National Laboratories: Virtual Machine Introspection (VMI) Tools and Volatility Support AAron Walters
2011 November Blog Memory Forensics: Pull Process & Network Connections from a Memory Dump c0decstuff
2011 November Blog Memory Forensics: How to Pull Passwords from a Memory Dump Daniel Dieterle
2011 November Blog Análisis avanzado de memoria de sistemas Microsoft Windows con Volatility Sergio Hernando (@sergiohernando)
2011 November Blog Using Volatility: Suspicious Process Melissa (@sk3tchymoos3)
2011 November Blog Memory Forensics: Analyzing a Stuxnet Memory Dump (And you can too!) Daniel Dieterle
2011 October Article CSI:Internet Episode 4: Open heart surgery Frank Boldewin
2011 October Blog Dirt Jumper DDoS Bot - New versions, New targets Andre M. !DiMino (@sempersecurus)
2011 October Blog [Volatility Memory Forensics Federal Trojan aka R2D2](http://www.evild3ad.com/1136/volatility-memory-forensics-federal-trojan-aka-r2d2/)
2011 October Blog [Volatility Memory Forensics Graphviz](http://www.evild3ad.com/1088/volatility-memory-forensics-graphviz/)
2011 October Blog Ain't Nuthin But a K(Timer) Thing, Baby Michael Ligh (@iMHLv2)
2011 October Blog ZeroAccess, Volatility, and Kernel Timers Michael Ligh (@iMHLv2)
2011 October Video Windows Password Retrieval and Hacking Melissa (@sk3tchymoos3)
2011 September Article CSI:Internet Episode 3: A trip into RAM Frank Boldewin
2011 September Blog MORTO – From a Memory-Dump Point of View p4r4n0id
2011 September Blog Shylock In-Depth Malware Analysis Brad Arndt (@bradarndt)
2011 September Blog toolsmith: Memory Analysis with DumpIt and Volatility Russ !McRee (@holisticinfosec)
2011 September Blog Volatility Memory Forensics Basic Usage for Malware Analysis Evild3ad (@Evild3ad79)
2011 September Blog Zeus Analysis in Volatility 2.0 Brad Arndt (@bradarndt)
2011 September Blog Volatility 2.0 Plugin Vscan Brad Arndt (@bradarndt)
2011 September Blog Volatility 2.0: Timeliner, RegistryAPI, evtlogs and more Jamie Levy (@gleeda)
2011 September Blog Abstract Memory Analysis: Zeus Encryption Keys Michael Ligh (@iMHLv2)
2011 August Slides Linux Memory Analysis Workshop Andrew Case (@attrc)
2011 June Slides Linux Memory Analysis with Volatility Andrew Case (@attrc)
2011 June Paper A survey of main memory acquisition and analysis techniques for the windows operating system Stefan Vomel and Felix C. Freiling
2011 August Blog Volatility 2.0 and OMFW Jamie Levy (@gleeda)
2011 July Blog/Paper Forensic Challenge 2011 - Forensic Analysis of a Compromised Server Mau, Kahlich, Erasmus, Quintero, & Anand
2011 June Blog Stuxnet's Footprint in Memory with Volatility 2.0 Michael Ligh (@iMHLv2)
2011 June Slides Forensic Memory Analysis of Android’s Dalvik VM Andrew Case (@attrc)
2011 May Blog Analyzing Malware Hollow Processes Eric Monti
2011 April Blog Volatility 1.4: new, great (and with a shiny new plugin) lg
2011 April Blog Using "volatility" to study the CVE-2011-0611 Adobe Flash 0-day Andre M. !DiMino (@sempersecurus)
2011 April Blog Volatility 1.4 UserAssist plugin Jamie Levy (@gleeda)
2011 April Blog What's the Difference? (A Brief Volatility 1.4 Plugin Tutorial) Jamie Levy (@gleeda)
2011 April Blog Detecting/Memory Forging Attempt by a Rootkit Michael Ligh (@iMHLv2)
2011 April Blog Investigating Windows Threads with Volatility Michael Ligh (@iMHLv2)
2011 April Blog Applying Forensic Tools to Virtual Machine Introspection Brendan Dolan-Gavitt (@moyix)
2011 April Blog Nuit du hack 2011 CTF Forensic Alexmin
2011 April Blog Apr. 8 CVE-2011-0611 Flash Player Zero day Mila
2011 March Blog Carberp Analysis via Volatility Evilcry
2011 March Blog Update: Volatility printkey Plugin Jamie Levy (@gleeda)
2011 March Blog Volatility 1.4 get_plugins Script Jamie Levy (@gleeda)
2011 March Blog Volatility's New Netscan Module Michael Ligh (@iMHLv2)
2011 March Blog The Mis-leading 'Active' in PsActiveProcessHead and ActiveProcessLinks Michael Ligh (@iMHLv2)
2011 March Blog Automatically Generating Memory Forensic Tools Brendan Dolan-Gavitt (@moyix)
2011 March Blog Analyzing the New Honeynet Memory Analysis Challenge with Volatility Andrew Case (@attrc)
2011 March Blog Bringing Linux Support to Volatility Andrew Case (@attrc)
2011 March Blog Volatility (Undead Security) Matt??
2011 February Blog Shylock via volatility Evilcry
2011 January Blog A Quick Look at Volatility 1.4 RC1 - What's New? Lenny Zeltser (@lennyzeltser)
2011 January Paper De-Anonymizing Live CDs through Physical Memory Analysis Andrew Case (@attrc)
2010 December Blog Identifying Memory Images Jamie Levy (@gleeda)
2010 December Blog Command Line Kung Fu: Episode #127: Making a Difference Hal Pomeranz (@hal_pomeranz)
2010 December Blog REMnux: A Linux Distribution for Reverse-Engineering Malware Lenny Zeltser (@lennyzeltser)
2010 December Blog Peeling Apart TDL4 and Other Seeds of Evil Part I Curt Wilson
2010 November Blog Volatility Memory Forensics lg
2010 Septmeber Blog Recent Advances in Memory Forensics Andreas Schuster (@forensikblog)
2010 August Blog Upated Volatility SQLite plugins Jamie Levy (@gleeda)
2010 July Blog Finding Object Roots in Vista (KPCR) Bradley Schatz
2010 July Blog GDI Utilities: Taking Screenshots of Memory Dumps Brendan Dolan-Gavitt (@moyix)
2010 July Blog Plugin Post: Robust Process Scanner Brendan Dolan-Gavitt (@moyix)
2010 May Blog Memory forensics with SIFT 2.0, Volatility, and PTK Russ !McRee (@holisticinfosec)
2010 May Blog Adding new structure definitions to Volatility Bradley Schatz
2010 April Blog Challenge 3 of the Forensic Challenge 2010 - Banking Troubles @pstutz
2010 April Blog Reading RAM using Firewire muelli
2010 March Paper(s) Challenge 3 of the Forensic Challenge 2010 - Banking Troubles Pascucci, Hudak, and Pulley
2010 February Blog EnCase EnScripts for Memory Forensics Takahiro Haruyama (@cci_forensics)
2010 January Blog Análisis de un caso ¿real?, #3 neofito (@neosysforensics)
2010 January Blog Volatility's Output Rendering Functions Jamie Levy (@gleeda)
2010 January Blog Cross-view analysis with Volatility Andreas Schuster (@forensikblog)
2010 January Blog Using Volatility for Rootkit Detection Xeno Kovah
2009 December Blog New and Updated Volatility Plug-ins Part II Michael Ligh (@iMHLv2)
2009 November Paper Robust Signatures for Kernel Data Structures Brendan Dolan-Gavitt (@moyix)
2009 October Blog Walk-Through: Volatility Batch File Maker and Volatility's ProcDump Forensiczone
2009 October Blog Volatility Batch File Maker Forensiczone
2009 October Blog Volatility 1.3.2 is out! neofito (@neosysforensics)
2009 August Blog Installing Volatility Plugins Jamie Levy (@gleeda)
2009 July Blog Modificando Volatility neofito (@neosysforensics)
2009 July Blog New and Updated Volatility Plug-ins Michael Ligh (@iMHLv2)
2009 June Slides Windows Memory Forensics with Volatility Andreas Schuster (@forensikblog)
2009 May Blog Análisis de un caso ¿real?, #2 neofito (@neosysforensics)
2009 May Blog Volatility Plug-in for IAT/EAT/Inline Hook Detection Michael Ligh (@iMHLv2)
2009 April Blog Reading Passwords from the Keyboard buffer Andreas Schuster (@forensikblog)
2009 April Blog Searching for Mutants Andreas Schuster (@forensikblog)
2009 April Blog Symbolic Link Objects Andreas Schuster (@forensikblog)
2009 April Blog Scanning for Drivers Andreas Schuster (@forensikblog)
2009 April Blog Linking File Objects to Processes Andreas Schuster (@forensikblog)
2009 April Blog Enumerate Object Types Andreas Schuster (@forensikblog)
2009 March Blog Tuneando Volatility neofito (@neosysforensics)
2009 March Blog Análisis de un caso ¿real? neofito (@neosysforensics)
2009 March Blog Volatility y RegRipper, ¡juntos! neofito (@neosysforensics)
2009 March Blog Dumping Memory to Extract Password Hashes CG
2009 March Blog Using Volatility for Introspection Brendan Dolan-Gavitt (@moyix)
2009 March Blog RegRipper and Volatility Prototype Brendan Dolan-Gavitt (@moyix)
2009 March Video Advanced Memory Analysis Brendan Dolan-Gavitt (@moyix)
2009 January Blog Using Volatility (1.3_Beta) Forensiczone
2009 January Blog Memory Registry Tools! Brendan Dolan-Gavitt (@moyix)
2008 November Blog Recovering Coreflood Binaries with Volatility Michael Ligh (@iMHLv2)
2008 November Blog Locating Hidden Clampi DLLs (VAD-style) Michael Ligh (@iMHLv2)
2008 October Blog Plugin Post: Moddump Brendan Dolan-Gavitt (@moyix)
2008 October Slides Upping the ‘Anti’: Using Memory Analysis to Fight Malware AAron Walters
2008 September Blog Window Messages as a Forensic Resource Brendan Dolan-Gavitt (@moyix)
2008 September Paper Forensic analysis of the Windows registry in memory Brendan Dolan-Gavitt (@moyix)
2008 August Blog Auditing the System Call Table Brendan Dolan-Gavitt (@moyix)
2008 August Blog Introducing Volshell Brendan Dolan-Gavitt (@moyix)
2008 August Blog Linking Processes to Users Brendan Dolan-Gavitt (@moyix)
2008 August Paper Digital Forensics Research Workshop 2008 - Submission for Forensic Challenge M. I. Cohen, D. J. Collett, A. Walters
2008 August Slides Volatility 1.3 Open Memory Forensics Workshop AAron Walters
2008 May Blog DFRWS 2008 - Registry Forensics in Memory Brendan Dolan-Gavitt (@moyix)
2007 February Blog 64bit Crash Dumps Andreas Schuster (@forensikblog)
2008 February Paper Using Hashing to Improve Volatile Memory Forensic Analysis AAron Walters
2007 December Blog Searching for Page Directories 3 Andreas Schuster (@forensikblog)
2007 October Blog Hashing of Program Files Andreas Schuster (@forensikblog)
2007 September Paper The VAD Tree: A process-eye view of physical memory Brendan Dolan-Gavitt (@moyix)
2007 August Blog From Volatools to Volatility Andreas Schuster (@forensikblog)
2007 May Blog Copies of Page Directories Andreas Schuster (@forensikblog)
2007 May Blog Searching for Page Directories 2 Andreas Schuster (@forensikblog)
2007 May Blog Searching for Page Directories 1 Andreas Schuster (@forensikblog)
2007 May Blog Walking the VAD Tree Andreas Schuster (@forensikblog)
2007 March Blog Volatools Andreas Schuster (@forensikblog)
2007 February Paper Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process A. Walters and N. Petroni
2007 January Blog How trustworthy is hardware-based memory acquisition? Andreas Schuster (@forensikblog)
2006 December Blog Crash without CtrlScroll Andreas Schuster (@forensikblog)
2006 October Blog Searching in Pool Allocations Andreas Schuster (@forensikblog)
2006 September Blog Memory dumping over FireWire - UMA issues Arne Vidstrom
2006 July Slides FATKit: Detecting Malicious Library Injection and Upping the “Anti” AAron Walters
2006 June Blog DFRWS 2006 Paper Andreas Schuster (@forensikblog)
2006 June Blog Reconstructing a Binary 3 Andreas Schuster (@forensikblog)
2006 April Blog Reconstructing a Binary 2 Andreas Schuster (@forensikblog)
2006 April Blog Reconstructing a Binary 1 Andreas Schuster (@forensikblog)
2006 April Blog Reconstructing the Process Memory Andreas Schuster (@forensikblog)
2006 March Blog DMP File Structurehttp://computer.forensikblog.de/en/2006/03/dmp-file-structure.html Andreas Schuster (@forensikblog)
2006 March Blog Converting Virtual into Physical Addresses Andreas Schuster (@forensikblog)
2006 March Blog Search for Processes and Threads Andreas Schuster (@forensikblog)
2006 February Blog Dating the execution of certain routines Andreas Schuster (@forensikblog)
2006 February Blog _DISPATCHER_HEADER Andreas Schuster (@forensikblog)
2006 February Blog More on Processes and Threads Andreas Schuster (@forensikblog)
2006 February Paper FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory Petroni, Walters, Fraser, Arbaugh
2005 December Blog Timestamps in Thread and Process Objects Andreas Schuster (@forensikblog)