analyzing-memory-forensics-with-lime-and-volatility
mukul975/Anthropic-Cybersecurity-Skills
This skill details a comprehensive workflow for performing Linux memory forensics. It involves acquiring the volatile memory using the LiME kernel module, and subsequently analyzing the resulting image with Volatility 3. Key analyses cover critical artifacts such as process listings, network connections, loaded kernel modules, and bash history, making it an essential technique for incident response, digital forensics, and threat hunting on compromised Linux systems.