Visit Website

Tool used for dumping memory from Android devices. Root access is required. ./mem pid out_path where pid is the target PID to capture and out_path is the local dir to write output. If out_path is not there, writes to stdout. To ensure forensic soundness, mem should be copied into memory (/dev or another tmpfs location), and netcat should be used to write data out over ADB to avoid writing to the device. Netcat versions compiled for Android can be found at https://github.com/MobileForensicsResearch/netcat. Eg: 1: On local machine run: adb forward tcp:9999 tcp:9999 2: From adb shell run: ./mem pid | nc -l -p 9999 3: On local machine run: nc 127.0.0.1 9999 > output_file

FEATURES

ALTERNATIVES

A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.

Fridump is an open source memory dumping tool using the Frida framework for dumping memory addresses from various platforms.

WinSearchDBAnalyzer can parse and recover records in Windows.edb, providing detailed insights into various data types.

GUI-based memory forensic capture tool for cyber forensics and cyber crime investigation.

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

Open source tool for generating YARA rules about installed software from a running OS.

Automated collection tool for incident response triage in Windows systems.

A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved