mem Logo

mem

0
Free
Visit Website

Tool used for dumping memory from Android devices. Root access is required. ./mem pid out_path where pid is the target PID to capture and out_path is the local dir to write output. If out_path is not there, writes to stdout. To ensure forensic soundness, mem should be copied into memory (/dev or another tmpfs location), and netcat should be used to write data out over ADB to avoid writing to the device. Netcat versions compiled for Android can be found at https://github.com/MobileForensicsResearch/netcat. Eg: 1: On local machine run: adb forward tcp:9999 tcp:9999 2: From adb shell run: ./mem pid | nc -l -p 9999 3: On local machine run: nc 127.0.0.1 9999 > output_file

FEATURES

ALTERNATIVES

Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.

A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.

A python module for orchestrating content acquisitions and analysis via Amazon SSM.

Educational CTF-styled challenges for Memory Forensics.

A portable volatile memory acquisition tool for Linux.

Automated Mac Forensic Triage Collector

Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.

An extensible network forensic analysis framework with deep packet analysis and plugin support.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved