Choose one of the two options below: Option 1: Find an opensource tool for system or memory analysis. Describe the tool and how it can be used for incident response. Include a link to the tool. Option 2: Run Redline on your own computer. Discuss what you found. Do not disclose sensitive information. Include a screenshot, obfuscate any sensitive data.