Rekall v-1.1.0 released : Memory Forensic Framework.

Rekall v-1.1.0 released : Memory Forensic Framework.

Changelog v-1.1.0:
+ This is the first RC from the Buchenegg series. It should be considered experimental still.
+ This release introduces a cool new GUI for Rekall. This GUI superceeds the Ipython notebook interface which has been deprecated.
+ Rekall can now work on guest VMs through analyzing the Host’s memory – either live, or using a memory image!rekall2

The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

Rekall Memory Forensic Framework

Rekall Memory Forensic Framework

Rekall supports investigations of the following 32bit and 64bit memory images:
– Microsoft Windows XP Service Pack 2 and 3
– Microsoft Windows 7 Service Pack 0 and 1
– Microsoft Windows 8 and 8.1
– Linux Kernels 2.6.24 to 3.10.
– OSX 10.6-10.9.x.

Download version :
Windows Binary 64bit : Rekall_1.1.0_Buchenegg_x64.exe 
Tarball : v1.1.0.tar.gz
Source : http://www.rekall-forensic.com/