504ensicsLabs / LiMEView external linksLinks
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f…
☆1,931Nov 9, 2025Updated 3 months ago
Alternatives and similar repositories for LiME
Users that are interested in LiME are comparing it to the libraries listed below
Sorting:
- An advanced memory forensics framework☆7,963May 16, 2025Updated 8 months ago
- AVML - Acquire Volatile Memory for Linux☆1,053Feb 3, 2026Updated last week
- Rekall Memory Forensic Framework☆1,998Oct 18, 2020Updated 5 years ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Web App for Volatility framework☆389Jan 13, 2026Updated last month
- Loki - Simple IOC and YARA Scanner☆3,715Jan 12, 2026Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,877Feb 3, 2026Updated last week
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,038Dec 16, 2025Updated last month
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- Super timeline all the things☆2,010Updated this week
- Volatility 3.0 development☆3,889Feb 5, 2026Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,338Dec 23, 2025Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,229Aug 7, 2025Updated 6 months ago
- This is the development tree. Production downloads are at:☆1,329Jan 29, 2026Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,078Dec 9, 2025Updated 2 months ago
- The multi-platform memory acquisition tool.☆942Oct 14, 2025Updated 3 months ago
- Volatility profiles for Linux and Mac OS X☆327Oct 30, 2022Updated 3 years ago
- A curated list of tools for incident response☆8,808Jul 18, 2024Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,680Feb 14, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,280Jan 26, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,433Feb 5, 2026Updated last week
- Repository of yara rules☆4,697Apr 17, 2024Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,798Jan 19, 2020Updated 6 years ago
- The pattern matching swiss knife☆9,408Updated this week
- A Powershell incident response framework☆1,637Nov 22, 2022Updated 3 years ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,984Jan 24, 2026Updated 2 weeks ago
- Main Sigma Rule Repository☆10,109Updated this week
- CTF framework and exploit development library☆13,250Jan 23, 2026Updated 3 weeks ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Digging Deeper....☆3,747Feb 5, 2026Updated last week
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,049Oct 19, 2025Updated 3 months ago
- Collaborative forensic timeline analysis☆3,264Feb 6, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- Six Degrees of Domain Admin☆10,537Aug 1, 2025Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Jun 15, 2020Updated 5 years ago