#volatility3

2025-03-28

"btf2json can generate Volatility 3 profiles from a stripped Linux kernel, i.e., without debugging information, and its System.map file."

github.com/vobst/btf2json

volatilityfoundation.org/the-2

#volatility3 #linux #dfir

2025-03-28

The 2024 @volatility #PluginContest review is complete! We received 6 submissions from 6 countries for 7 #Volatility3 plugins, a Linux profile generation tool & 9 supporting utilities!

We are excited to announce that the @volatility #PluginContest First Place winner is:

Valentin Obst for btf2json

Read the full Contest Results:
volatilityfoundation.org/the-2

Congrats to all winners & thank you to all participants! 

#DFIR #memoryforensics

Volexity :verified:volexity@infosec.exchange
2025-01-28

On Thursday, Feb 6, @attrc will be at @WWHackinFest to present "Effectively Detecting Modern Code Injection Techniques with Volatility 3". See the full conference agenda here: wildwesthackinfest.com/wild-we. 

#dfir #memoryforensics #Volatility3 @volatility

2024-09-04

And the winner is Mariano Graziano, who has won a pass to #FTSCon and a seat in the upcoming in-person Malware & Memory Forensics Training on #Volatility3! Thanks to all who shared photos as we celebrate 10 years of The #ArtOfMemoryForensics!

infosec.exchange/@volatility/1

2024-08-14

To celebrate the 10th anniversary of The #ArtOfMemoryForensics, we are giving away 1 seat at the upcoming in-person Malware & Memory Forensics Training on #Volatility3 with a pass to From The Source #FTSCon! Just post a pic of your book & tag @volatility!

For more information on the upcoming in-person Malware & Memory Forensics Training on #Volatility3 happening in Arlington VA October 22-25, 2024: events.humanitix.com/malware-a

For more information on From The Source #FTSCon, hosted by the @volatility Foundation in Arlington VA on Monday, October 21, 2024: events.humanitix.com/from-the-

The winner will be selected at random on August 31, 2024 from all posts (across Twitter/X, LinkedIn & Mastodon) that feature a pic of their copy of The #ArtOfMemoryForensics that tags @volatility.

2024-07-19

For the first time, we are hosting an in-person, public offering of our Malware & Memory Forensics Training focused solely on #Volatility3!

When & Where:
October 22–25, 2024
Arlington, VA

Read more in our latest blog post: volatilityfoundation.org/in-pe

#dfir #memoryforensics

Volexity :verified:volexity@infosec.exchange
2024-04-16

Learn how to perform detection + triage of sophisticated malware against Windows 10+ systems using #Volatility3 from @volexity Director of Research & @volatility core developer @attrc at @bsidesseattle on April 27! Topics covered in his talk include process code injection, credential dumping, lateral movement, memory-only rootkits + anti-forensics concealment of malicious activity.

See the full conference schedule here: bsidesseattle.com/2024-schedul

#dfir #memoryforensics #memoryanalysis

2024-03-15

The 2023 #Volatility #PluginContest review is complete! We received 9 submissions from 7 countries for 27 plugins, 3 translation layers & 2 supporting utilities!

And the @volatility #PluginContest First Place winner is:
Valentin Obst: BPF Memory Forensics with Volatility 3

You can read the full Contest Results here: volatilityfoundation.org/the-2

Congrats to all winners & thank you to all participants!

We are also excited to announce in-person Malware & Memory Forensics Training on #Volatility3 is coming October 2024! AND the @volatility Foundation is hosting a one-day summit in conjunction with the training!

See details in the Contest Results post: volatilityfoundation.org/the-2

#DFIR #memoryforensics

2023-08-14

New blog post – #MemoryForensics R&D Illustrated: Recovering Raw Sockets on Windows 10+. We present our recent research to modernize @volatility’s ability to detect usage of raw sockets by malicious apps + creation of a new #Volatility3 plugin: volatility-labs.blogspot.com/2

#dfir

2023-03-22

In the latest @volatility blog post, Memory Forensics R&D Illustrated: Detecting Hidden Windows Services, we walk through our R&D process to develop a new #Volatility3 plugin that automatically detects hidden services on Windows: volatility-labs.blogspot.com/2

#memoryforensics #dfir

2023-02-02

My kingdom for an unstripped kernel image!

#Volatility3 #Linux #Symbols

Jim JonesGreatBigTable
2022-12-11

I finished day 10 this morning and just completed day 11 of the challenge.

Day 11 focuses on analyzing a memory dump of a compromised machine using the tool, .

This was a very straightforward challenge, which I enjoyed. I used my extra time to play around with other options that weren't explored in the tasks of the challenge. Very worthwhile and another tool for my tool chain.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst