667 Followers
6 Following
180 Posts
A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence
Websitehttps://www.volexity.com
Bloghttps://www.volexity.com/blog
Twitterhttps://twitter.com/Volexity
LinkedInhttps://www.linkedin.com/company/volexity

We have announced the winners of the 2025 @volatility #PluginContest! And the First Place is:

Daniel Baier for XFRM Inspector

Read the full Contest Results in our blog post:
https://volatilityfoundation.org/the-2025-volatility-plugin-contest-results-are-in/

Congrats to all winners & thank you to all participants!
#DFIR #memoryforensics

@volexity recently released GoResolver v1.4! This release brings significant updates to our #opensource tool for recovering symbol data from obfuscated Go binaries. This release is available on GitHub: https://github.com/volexity/GoResolver.

Go remains one of the most popular languages among #malware developers thanks to its cross-OS portability. GoResolver is designed to help analysts navigate obfuscated Go binaries by recovering lost symbol data using control-flow graph similarity analysis. You can read more about GoResolver in our blog posts last year (April 2025: https://www.volexity.com/blog/2025/04/01/goresolver-using-control-flow-graph-similarity-to-deobfuscate-golang-binaries-automatically/, August 2025: https://www.volexity.com/blog/2025/08/11/go-get-em-updates-to-volexity-golang-tooling/)

What’s New in GoResolver v1.4!

Go Version Management:
GoResolver now automatically detects the Go version a binary was compiled with and selects the most accurate version for analysis. A dedicated "manage" CLI command lets you list, install, and remove Go versions without interrupting your workflow.

Type Recovery:
The new "-y" flag extracts Go type information directly from obfuscated binaries, and includes new capabilities to extract type names, structures, and kinds from obfuscated binaries. Browsing the binary’s types is now much easier and works with your SRE’s cross-referencing feature.

In-SRE Analysis:
Both IDA Pro and Ghidra plugins now support full binary analysis without leaving your SRE. The IDA Pro plugin is available on Hex-Rays’s plugin repository (https://plugins.hex-rays.com/volexity/GoResolver/GoResolver), making GoResolver easier to install through the HCLI tool. Ghidra users gain a new ANALYZE mode that automatically imports recovered symbols and types on completion.

- - - -

Acknowledgements
Special thanks to Killian Raimbaud for his work on this & Ivan Maldenov for his work on type recovery during his Volexity internship.

GitHub - volexity/GoResolver: GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the function symbols of an obfuscated Go binary.

GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the function symbols of an obfuscated Go binary. - volexity/GoResolver

GitHub

The 2025 @volatility #PluginContest review is complete! This year we received 8 submissions from 7 different countries that included 20 plugins. It's exciting to see how #memoryforensics researchers continue to innovate & contribute to #Volatility3.

The First Place winner of the 2025 #Volatility #PluginContest is:

Daniel Baier for XRFM Inspector

Check out the full Contest Results, along with a detailed summary of all submissions, in our blog post: https://volatilityfoundation.org/the-2025-volatility-plugin-contest-results-are-in/

Congrats to all winners & thank you to all participants!

Special thanks to the core developers & previous winners who helped review this year's submissions.

#DFIR

@volexity Volcano Server & Volcano One v25.12.18 adds 300+ YARA rules, full parsing of Windows prefetch and Linux cron jobs, inline syscall hooking detection, and 5-level page table support. This release also adds cross-account s3 bucket monitoring, automated health check alerts, SAML role mappings, and increased auditing.

Contact us for more information: https://volexity.com/company/contact/.

RE: https://infosec.exchange/@volatility/115814731683234734

And that’s it! The 2025 @volatility #PluginContest is now closed. Stay tuned for winner announcements in the coming weeks! And good luck to all contenders!
#memoryforensics #opensource #dfir

RE: https://infosec.exchange/@volatility/114909750659687184

Today is the last day to submit entries to the #PluginContest! This is your chance to gain industry-wide visibility for your work, contribute to an important open-source project, and compete for cash prizes! More details below!👇

There are only 2 days left to submit your entries to the @volatility #PluginContest! The deadline is Wednesday! See our blog post for more details: https://volatilityfoundation.org/the-13th-annual-volatility-plugin-contest-is-open/
There are 5 days left to submit your entries to the @volatilty #PluginContest! See more details in our blog post: https://volatilityfoundation.org/the-13th-annual-volatility-plugin-contest-is-open/
There are 9 days left to submit entries to the @volatility #PluginContest! Make sure to get your submissions in by the deadline! More details can be found here: https://volatilityfoundation.org/the-13th-annual-volatility-plugin-contest-is-open/