volatility (@volatility) 's Twitter Profile
volatility

@volatility

Official account of the Volatility Memory Analysis Project and Windows Malware and Memory Forensics Training. volatilityfoundation.org

ID: 15709883

linkhttp://github.com/volatilityfoundation calendar_today03-08-2008 12:02:59

3,3K Tweet

21,21K Followers

11 Following

volatility (@volatility) 's Twitter Profile Photo

.volatility #PluginContest #Contender Shusei Tomonaga: ETW Scan is an investigative tool to aid security researchers, reverse engineers & incident responders in leveraging Windows Event Tracing for Windows (ETW) data for enhanced threat hunting & analysis. #DFIR #memoryforensics

volatility (@volatility) 's Twitter Profile Photo

.volatility #PluginContest #Contender Thomas Clarke: Image Extraction, NSRL Filtering & Image Classifiers plugins help investigators extract memory-resident images & sort those images using numerous classifiers. #DFIR #memoryforensics

volatility (@volatility) 's Twitter Profile Photo

.volatility #PluginContest #Contender Kartik N. Iyer + Parag H. Rughani: Thread Local Storage (TLS) Callback is a feature-rich plugin designed to detect, analyze & disassemble TLS callbacks in memory samples. #DFIR #memoryforensics

volatility (@volatility) 's Twitter Profile Photo

.volatility #PluginContest #Contender Valentin Obst: btf2json focuses on large-scale Linux memory analysis, incorporating information in the vmlinuz file to create #Volatility3 symbol tables without the need for a full debug kernel. #DFIR #memoryforensics

volatility (@volatility) 's Twitter Profile Photo

.volatility #PluginContest #Contender Sylvain Peyrefitte: ScringsScan + VadScringsScan provide syntax-aware scanning for 6 languages in kernel memory in Linux, macOS & Windows + in-process VADs in Windows, improving in-memory script payloads searching. #DFIR #memoryforensics

Jamie Levy๐Ÿฆ‰ (@gleeda) 's Twitter Profile Photo

We had some awesome submissions to the volatility #PluginContest. The first place submission is a HUGE contribution to #memoryforensics on the Linux side, and solves a hard problem that others have grappled with for some time! #DFIR

volatility (@volatility) 's Twitter Profile Photo

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-theโ€ฆ

Andrew Case (@attrc) 's Twitter Profile Photo

We are VERY excited to announce that Volatility 3 has now reached feature parity with Volatility 2! With this parity release, Volatility 2 is now deprecated. Full details in the blog post linked below.

Volexity (@volexity) 's Twitter Profile Photo

Congratulations to all of the Volatility contributors - this was no small feat! We are proud to be a sustaining sponsor of this important open-source project that remains the worldโ€™s most widely used memory forensics platform. #dfir

Andrew Case (@attrc) 's Twitter Profile Photo

I will be showing off @Volatility 3 during my talk on Wednesday afternoon at RVAsec. Be sure to attend and come say hello if you will be around!

volatility (@volatility) 's Twitter Profile Photo

The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year. See the full details in our blog post: volatilityfoundation.org/announcing-ftsโ€ฆ

The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year. 
 
See the full details in our blog post: volatilityfoundation.org/announcing-ftsโ€ฆ
Andrew Case (@attrc) 's Twitter Profile Photo

The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year. See the full details in our blog post: volatilityfoundation.org/announcing-ftsโ€ฆ

Andrew Case (@attrc) 's Twitter Profile Photo

Our highly popular and technical training, "Malware and Memory Forensics with Volatility", has been fully converted to volatility 3 and significantly updated, including many new sections and 8 new, in-depth labs. Available online and in VA in October. memoryanalysis.net/courses-malwarโ€ฆ