
mem is a free Digital Forensics and Incident Response tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to mem, including their key features and shared capabilities.
DFIR platform automating investigation, evidence collection, and IR.
Digital forensics platform for evidence acquisition, analysis, and DFIR.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
Incident Response Documentation tool for tracking findings and tasks.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
DFIR platform automating investigation, evidence collection, and IR.
Digital forensics platform for evidence acquisition, analysis, and DFIR.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
Incident Response Documentation tool for tracking findings and tasks.
A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.
Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.
A software that collects forensic artifacts on systems for forensic investigations.
A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
A library to access the Expert Witness Compression Format (EWF) for digital forensics and incident response.
Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.
Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
Automated collection tool for incident response triage in Windows systems.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
A digital investigation platform for parsing, searching, and visualizing evidences with advanced analytics capabilities.
A community-sourced repository of digital forensic artifacts in YAML format.
Documentation project for Digital Forensics Artifact Repository
PowerForensics is a PowerShell digital forensics framework for hard drive forensic analysis.
MalConfScan is a Volatility plugin for extracting configuration data of known malware and analyzing memory images.
Web interface for the Volatility Memory Forensics Framework
Orochi is a collaborative forensic memory dump analysis framework.
A framework/scripting tool to standardize and simplify the process of scripting favorite Live Acquisition utilities for Incident Responders.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A tool for restoring defocused and blurred images with various deconvolution techniques and fast processing capabilities.
A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.
Timeliner is a digital forensics tool that rewrites mactime with an advanced expression engine for complex timeline filtering using BPF syntax.
dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.
Open Source computer forensics platform with modular design for easy automation and scripting.
Custom built application for asynchronous forensic data presentation on an Elasticsearch backend, with upcoming features like Docker-based installation and new UI rewrite in React.
CIRTKit is a DFIR console built on the Viper Framework that integrates various forensic tools and provides modules for packet analysis, memory analysis, and automated incident response workflows.
SwishDbgExt is a Microsoft WinDbg debugging extension that enhances debugging capabilities for kernel developers, troubleshooters, and security experts.
Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.
A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.
A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.
DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.
Toolkit for post-mortem analysis of Docker runtime environments using forensic HDD copies.
A PHP based web application for managing postmortems with pluggable features.
Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.
Incident response framework focused on remote live forensics
Common questions security professionals ask when evaluating alternatives and competitors to mem.
The most popular alternatives to mem include Binalyze, Magnet Forensics, WindowsSCOPE, Aurora Incident Response, and libsmdev. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.