# Memory Forensics

### Exercises

* [Volatility Basics](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics/volatility2-basics-linux) (Linux dump)
* [Volatility Exercise 1](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics/volatility2-exercise-1) (Windows dump)
* [Volatility3 Exercise](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics/volatility3-exercise-1) 1 (Windows dump)
* [Volatility3 Exercise 2](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics/volatility3-exercise-2)
* [Volatility3 Exercise 3](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises/memory-forensics/volatility3-exercise-3)

### Similar Exercises

* [Memory dump analysis](https://cas-cyber.gitbook.io/cas-cybersecurity/malware-analysis/yara/memory-dump-analysis) (YARA)
* [Velociraptor Volatility analysis](https://cas-cyber.gitbook.io/cas-cybersecurity/live-response/windows-response-lab/volatility-analysis)
