mem Logo

mem

0
Free
Visit Website

Tool used for dumping memory from Android devices. Root access is required. ./mem pid out_path where pid is the target PID to capture and out_path is the local dir to write output. If out_path is not there, writes to stdout. To ensure forensic soundness, mem should be copied into memory (/dev or another tmpfs location), and netcat should be used to write data out over ADB to avoid writing to the device. Netcat versions compiled for Android can be found at https://github.com/MobileForensicsResearch/netcat. Eg: 1: On local machine run: adb forward tcp:9999 tcp:9999 2: From adb shell run: ./mem pid | nc -l -p 9999 3: On local machine run: nc 127.0.0.1 9999 > output_file

FEATURES

ALTERNATIVES

A reverse engineering framework with a focus on usability and code cleanliness

A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

A free, open source collection of tools for forensic artifact and image analysis.

A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.

A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.

A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

A suite of console tools for working with timestamps in Windows with 100-nanosecond precision.