npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When investigating security incidents that require analyzing memory forensics with lime and volatility
Acquires Linux memory with LiME kernel module and analyzes dumps using Volatility 3 to extract processes, bash history, network connections, kernel modules, and injected code for incident response.
Extracts Linux memory using LiME kernel module and analyzes with Volatility 3 for processes, network connections, bash history, kernel modules, and injected code in incident response.
Analyzes RAM dumps using Volatility 3 to detect malware execution, process injection, network connections, and credential theft during incident response.
Share bugs, ideas, or general feedback.
Acquire Linux memory using LiME kernel module, then analyze with Volatility 3 to extract forensic artifacts from the memory image.
# LiME acquisition
insmod lime-$(uname -r).ko "path=/evidence/memory.lime format=lime"
# Volatility 3 analysis
vol3 -f /evidence/memory.lime linux.pslist
vol3 -f /evidence/memory.lime linux.bash
vol3 -f /evidence/memory.lime linux.sockstat
import volatility3
from volatility3.framework import contexts, automagic
from volatility3.plugins.linux import pslist, bash, sockstat
# Programmatic Volatility 3 usage
context = contexts.Context()
automagics = automagic.available(context)
Key analysis steps:
# Full forensic workflow
vol3 -f memory.lime linux.pslist | grep -v "\[kthread\]"
vol3 -f memory.lime linux.bash
vol3 -f memory.lime linux.malfind
vol3 -f memory.lime linux.lsmod