Skip to main content

Rekall Memory Forensic Framework

Project description

The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

The Rekall distribution, as well as further information is available from: http://www.rekall-forensic.com/

Quick start

Rekall is available as a python package installable via the pip package manager. Simply type (for example on Linux):

  • sudo pip install rekall

To have all the dependencies installed. You still need to have python and pip installed first.

To be able to run the ipython notebook, the following are also required:

  • pip install Jinja2 MarkupSafe Pygments astroid pyzmq tornado wsgiref

If you want to use the yarascan plugin, install [yara and yara-python](http://plusvic.github.io/yara/).

For windows, Rekall is also available as a self contained installer package. Please check the download page for the most appropriate installer to use [Rekall-Forensic.com](http://www.rekall-forensic.com/)

Mailing Lists

Mailing lists to support the users and developers of Rekall can be found at the following address:

rekall-discuss@googlegroups.com

Bugs and Support

There is no support provided with Rekall. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

If you think you’ve found a bug, please report it at:

https://github.com/google/rekall/issues

In order to help us solve your issues as quickly as possible, please include the following information when filing a bug:

  • The version of rekall you’re using

  • The operating system used to run rekall

  • The version of python used to run rekall

  • The suspected operating system of the memory image

  • The complete command line you used to run rekall

Further documentation is available at http://www.rekall-forensic.com/

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rekall-core-1.7.1.zip (1.3 MB view details)

Uploaded Source

File details

Details for the file rekall-core-1.7.1.zip.

File metadata

  • Download URL: rekall-core-1.7.1.zip
  • Upload date:
  • Size: 1.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for rekall-core-1.7.1.zip
Algorithm Hash digest
SHA256 a40d117a37870283177d9791ec474745a92bde3066bb150063f24bdd3a32b936
MD5 ed22a1e4ae44a8f6b6deae30d5a63a6b
BLAKE2b-256 dbd4ed4376620dcb8f43829500014dfc0690c87d6cb25bd6cade4af05787bcfe

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page