mem Logo

mem

0
Free
Visit Website

Tool used for dumping memory from Android devices. Root access is required. ./mem pid out_path where pid is the target PID to capture and out_path is the local dir to write output. If out_path is not there, writes to stdout. To ensure forensic soundness, mem should be copied into memory (/dev or another tmpfs location), and netcat should be used to write data out over ADB to avoid writing to the device. Netcat versions compiled for Android can be found at https://github.com/MobileForensicsResearch/netcat. Eg: 1: On local machine run: adb forward tcp:9999 tcp:9999 2: From adb shell run: ./mem pid | nc -l -p 9999 3: On local machine run: nc 127.0.0.1 9999 > output_file

FEATURES

ALTERNATIVES

A command-line utility to show and change EXIF information in JPEG files

A network forensics tool for visualizing packet captures as network diagrams with detailed analysis.

A tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container, aiding in digital forensic triage.

Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

Developing APIs to access memory on industrial control system devices.

A library to access the Extensible Storage Engine (ESE) Database File (EDB) format used in various Windows applications.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved