This script is for Slackware 14.2 only and may be outdated.

SlackBuilds Repository

14.2 > System > volatility (2.6.1)

Volatility Framework - Volatile memory extraction utility framework.

The Volatility Framework is a completely open collection of tools,
implemented in Python under the GNU General Public License, for the
extraction of digital artifacts from volatile memory (RAM) samples.
The extraction techniques are performed completely independent of the
system being investigated but offer visibilty into the runtime state
of the system. The framework is intended to introduce people to the
techniques and complexities associated with extracting digital artifacts
from volatile memory samples and provide a platform for further work into
this exciting area of research.

This requires: pycrypto, yara-python, distorm

Maintained by: Barry J. Grundy
Keywords: memory,forensics,ram
ChangeLog: volatility

Homepage:
https://github.com/volatilityfoundation/volatility

Source Downloads:
volatility-2.6.1.tar.gz (53319b202ac6fb6c3a5422bdf0a9f7a0)

Download SlackBuild:
volatility.tar.gz
volatility.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
slack-desc
volatility.SlackBuild
volatility.info

Validated for Slackware 14.2

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds