analyzing-memory-dumps-with-volatility
mukul975/Anthropic-Cybersecurity-Skills
Helps investigators run Volatility commands on RAM dumps to uncover malware processes, injected code, suspicious network connections, loaded modules, and leaked credentials across Windows, Linux, and macOS targets in incident response scenarios.