LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures f…
☆1,964Apr 5, 2026Updated this week
Alternatives and similar repositories for LiME
Users that are interested in LiME are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AVML - Acquire Volatile Memory for Linux☆1,067Updated this week
- An advanced memory forensics framework☆7,989May 16, 2025Updated 10 months ago
- Rekall Memory Forensic Framework☆2,001Oct 18, 2020Updated 5 years ago
- Script for automating Linux memory capture and analysis☆275Feb 1, 2020Updated 6 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Volatility 3.0 development☆4,034Updated this week
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- Super timeline all the things☆2,048Feb 10, 2026Updated last month
- GRR Rapid Response: remote live forensics for incident response☆5,047Feb 16, 2026Updated last month
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 2 months ago
- The multi-platform memory acquisition tool.☆967Oct 14, 2025Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,429Nov 16, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,517Mar 20, 2026Updated 2 weeks ago
- This is the development tree. Production downloads are at:☆1,351Jan 29, 2026Updated 2 months ago
- Volatility profiles for Linux and Mac OS X☆327Oct 30, 2022Updated 3 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,256Mar 26, 2026Updated 2 weeks ago
- The pattern matching swiss knife☆9,526Feb 10, 2026Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,106Apr 2, 2026Updated last week
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆3,035Updated this week
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- A Powershell incident response framework☆1,643Nov 22, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A curated list of tools for incident response☆8,931Jul 18, 2024Updated last year
- Repository of yara rules☆4,748Apr 17, 2024Updated last year
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,309Feb 14, 2026Updated last month
- Digging Deeper....☆3,869Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,683Feb 14, 2024Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,834Jan 19, 2020Updated 6 years ago
- Collaborative forensic timeline analysis☆3,304Apr 2, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CTF framework and exploit development library☆13,353Updated this week
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆3,075Mar 23, 2026Updated 2 weeks ago
- Remote Memory Acquisition Tool☆253Sep 22, 2020Updated 5 years ago
- macOS (& ios) Artifact Parsing Tool☆1,024Mar 27, 2026Updated last week
- Configuration files for the SOF-ELK VM☆1,728Jan 21, 2026Updated 2 months ago
- Your Everyday Threat Intelligence☆1,967Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week