Seguem alguns site de desafios:
https://www.hellboundhackers. org/articles/index.php (olhe o menu esquerdo em "Challenges")
Divirtam-se e aproveitem para estudar cada vez mais!
python damm.py -husage: damm.py [-h] [-d DIR] [-p PLUGIN [PLUGIN ...]] [-f FILE] [-k KDBG][--db DB] [--profile PROFILE] [--debug] [--info] [--tsv][--grepable] [--filter FILTER] [--filtertype FILTERTYPE][--diff BASELINE] [-u FIELD [FIELD ...]] [--warnings] [-q]DAMM v1.0 Betaoptional arguments:-h, --help show this help message and exit-d DIR Path to additional plugin directory-p PLUGIN [PLUGIN ...]Plugin(s) to run. For a list of options use --info-f FILE Memory image file to run plugin on-k KDBG KDBG address for the images (in hex)--db DB SQLite db file, for efficient input/output--profile PROFILE Volatility profile for the images (e.g. WinXPSP2x86)--debug Print debugging statements--info Print available volatility profiles, plugins--tsv Print screen formatted output.--grepable Print in grepable text format--filter FILTER Filter results on name:value pair, e.g., pid:42--filtertype FILTERTYPEFilter match type; either "exact" or "partial",defaults to partial--diff BASELINE Diff the imageFile|db with this db file as a baseline-u FIELD [FIELD ...] Use the specified fields to determine uniqueness ofmemobjs when diffing--warnings Look for suspicious objects.-q Query the supplied db (via --db).