Volatility is an amazing tool with for memory analysis. If you don't have Sysmon, EDR or other related tools in your environment then you seriously need to get familiar with this tool. In this presentation I will go over getting the tool, OS Profiles/PDBs, supported formats, acquisition methods and capabilities. Then I will go over some of the techniques that I use, including Yara for identifying malware and anomalous behavior. Afterwards I will convey the beauty of the framework itself to show how to automate the processes of working with the memory images and enriching your data.