An advanced Android RAM parser designed for digital forensics professionals.
PrimeRAM is a powerful tool that allows forensic analysts to parse and analyze RAM dumps from Android devices. It helps uncover crucial information stored in volatile memory, assisting in comprehensive digital investigations.
- Efficient Parsing: Quickly process large RAM dumps with optimized performance.
- Data Extraction: Retrieve sensitive information such as credentials, messages, and cached data.
- File Recovery: Recover deleted files and artifacts from memory.
- User-Friendly Interface: Intuitive command-line interface for seamless operation.
- Cross-Platform Support: Compatible with Windows, macOS, and Linux systems.
-
Clone the Repository
git clone https://github.com/0x06060606/PrimeRAM.git
-
Navigate to the Project Directory
cd PrimeRAM
-
Install Dependencies
Ensure you have Python 3.x installed.
pip install -r requirements.txt
-
Obtain a RAM Dump
Extract a RAM dump from the target Android device using your preferred method.
-
Run PrimeRAM
python primeram.py -f /path/to/ram_dump.bin
-
Specify Output Directory (Optional)
python primeram.py -f /path/to/ram_dump.bin -o /path/to/output_directory
-
View Results
Analyze the extracted data located in the specified output directory.
Contributions are welcome! Please open an issue or submit a pull request for any enhancements or bug fixes.
This project is licensed under the MIT License. See the LICENSE file for details.
For inquiries or support, please contact 0x06060606.