skip to navigation
skip to content

Not Logged In

rekall 1.0.2

Rekall Memory Forensic Framework

Latest Version: 1.3.2

The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

The Rekall distribution, as well as further information is available from: http://www.rekall-forensic.com/

Quick start

Rekall is available as a python package installable via the pip package manager. Simply type (for example on Linux):

  • sudo pip install rekall

To have all the dependencies installed. You still need to have python and pip installed first.

To be able to run the ipython notebook, the following are also required:

  • pip install Jinja2 MarkupSafe Pygments astroid pyzmq tornado wsgiref

If you want to use the yarascan plugin, install [yara and yara-python](http://plusvic.github.io/yara/).

For windows, Rekall is also available as a self contained installer package. Please check the download page for the most appropriate installer to use [Rekall-Forensic.com](http://www.rekall-forensic.com/)

Mailing Lists

Mailing lists to support the users and developers of Rekall can be found at the following address:

rekall-discuss@googlegroups.com

Bugs and Support

There is no support provided with Rekall. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

If you think you’ve found a bug, please report it at:

https://github.com/google/rekall/issues

In order to help us solve your issues as quickly as possible, please include the following information when filing a bug:

  • The version of rekall you’re using
  • The operating system used to run rekall
  • The version of python used to run rekall
  • The suspected operating system of the memory image
  • The complete command line you used to run rekall

Further documentation is available at http://www.rekall-forensic.com/

 
File Type Py Version Uploaded on Size
rekall-1.0.2.tar.gz (md5) Source 2014-07-29 4MB
  • Downloads (All Versions):
  • 156 downloads in the last day
  • 860 downloads in the last week
  • 3107 downloads in the last month