performing-memory-forensics-with-volatility3
mukul975/Anthropic-Cybersecurity-Skills
Use Volatility 3 to inspect volatile memory dumps, enumerate processes, network connections, loaded modules, and hidden artifacts, enabling incident responders to spot malware, credential theft, and injected code without relying on disk data.