LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f…
☆1,941Nov 9, 2025Updated 3 months ago
Alternatives and similar repositories for LiME
Users that are interested in LiME are comparing it to the libraries listed below
Sorting:
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- AVML - Acquire Volatile Memory for Linux☆1,056Updated this week
- Rekall Memory Forensic Framework☆1,999Oct 18, 2020Updated 5 years ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Loki - Simple IOC and YARA Scanner☆3,729Jan 12, 2026Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,909Feb 23, 2026Updated last week
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,041Feb 16, 2026Updated 2 weeks ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- Super timeline all the things☆2,024Feb 10, 2026Updated 3 weeks ago
- Volatility 3.0 development☆3,952Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,396Dec 23, 2025Updated 2 months ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,233Aug 7, 2025Updated 6 months ago
- This is the development tree. Production downloads are at:☆1,336Jan 29, 2026Updated last month
- The multi-platform memory acquisition tool.☆950Oct 14, 2025Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,089Dec 9, 2025Updated 2 months ago
- Volatility profiles for Linux and Mac OS X☆327Oct 30, 2022Updated 3 years ago
- A curated list of tools for incident response☆8,842Jul 18, 2024Updated last year
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,682Feb 14, 2024Updated 2 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,296Feb 14, 2026Updated 2 weeks ago
- Repository of yara rules☆4,727Apr 17, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- The pattern matching swiss knife☆9,459Feb 10, 2026Updated 3 weeks ago
- A Powershell incident response framework☆1,639Nov 22, 2022Updated 3 years ago
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,998Updated this week
- Main Sigma Rule Repository☆10,156Updated this week
- CTF framework and exploit development library☆13,293Updated this week
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Digging Deeper....☆3,784Feb 28, 2026Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,136Oct 19, 2025Updated 4 months ago
- Collaborative forensic timeline analysis☆3,277Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Updated this week
- Six Degrees of Domain Admin☆10,540Aug 1, 2025Updated 7 months ago