{"skill":{"slug":"s3-memory-forensics","displayName":"S³ Memory Forensics","summary":"Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analy...","tags":{"forensics":"1.0.0","incident-response":"1.0.0","latest":"1.0.0","memory-analysis":"1.0.0","volatility":"1.0.0"},"stats":{"comments":0,"downloads":164,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1773942309703,"updatedAt":1773942713982},"latestVersion":{"version":"1.0.0","createdAt":1773942309703,"changelog":"Initial release of the memory-forensics skill, providing practical guidance on RAM acquisition and forensics analysis.\n\n- Covers memory acquisition techniques across Windows, Linux, macOS, and virtual environments.\n- Documents essential Volatility 3 plugins and usage for process, network, DLL, registry, and file system analysis on all major OSes.\n- Includes structured workflows for both malware analysis and incident response scenarios.\n- Offers references for Windows memory data structures and common detection patterns for code injection and rootkits.\n- Provides actionable steps, commands, and best practices for performing memory forensics investigations.","license":"MIT-0"},"metadata":null,"owner":{"handle":"solomonneas","userId":"s175vcq9b774xbehtq2py4r5vn83f1k2","displayName":"Solomon Neas","image":"https://avatars.githubusercontent.com/u/41877493?v=4"},"moderation":null}