01Analyze Windows and Linux memory dumps using various plugins
02Execute Volatility3 plugins with custom arguments
03Scan memory with YARA rules to identify known malware signatures
04List running processes, examine their details, and identify suspicious activity
05Examine network connections to detect command and control servers
069 GitHub stars