<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Forensics on nix4cyber</title><link>/cheatsheets/forensics/</link><description>Recent content in Forensics on nix4cyber</description><generator>Hugo</generator><language>en</language><copyright>Copyright (c) 2025 nix4cyber</copyright><atom:link href="/cheatsheets/forensics/index.xml" rel="self" type="application/rss+xml"/><item><title>Memory</title><link>/cheatsheets/forensics/memory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/forensics/memory/</guid><description>&lt;h2 id="volatility-2">Volatility 2&lt;/h2>
&lt;p>&lt;a href="https://github.com/volatilityfoundation/volatility3">Volatility 2&lt;/a> is a framework for extracting digital artifacts from volatile memory (RAM) samples.
Note that this is the older version of Volatility, and it may not support the latest memory dump formats or operating systems.
Below are some of the most common commands you can use with Volatility 2.&lt;/p></description></item><item><title>Recovery</title><link>/cheatsheets/forensics/recovery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/forensics/recovery/</guid><description>&lt;h2 id="file-carving">File Carving&lt;/h2>
&lt;p>File carving is a technique used to recover files from a disk image or raw data by searching for file signatures and extracting the data without relying on the filesystem structure. This is particularly useful when the filesystem is damaged or missing.&lt;/p></description></item></channel></rss>