Memory Forensics & Malware Investigation using FTK Imager, Volatility & Autopsy Conducted a digital forensic investigation on an infected Windows 10 Virtual Machine using memory acquisition and analysis techniques. Applied the Digital Forensic Investigation Methodology (DFIM) to collect, analyze, and report findings on malicious activities within system memory and disk images.
-
Notifications
You must be signed in to change notification settings - Fork 0
Qanaan/Memory-Forensics-Malware-Investigation-using-FTK-Imager-Volatility-Autopsy
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Memory Forensics & Malware Investigation using FTK Imager, Volatility & Autopsy
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published