Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/memoryforensics1/VolExp

volatility explorer
https://github.com/memoryforensics1/VolExp

analysis forensics memory plugin plugins process-explorer process-hacker procexp python python27 volatility volatility-explorer volatility-framework volatility-framework-plugin volatility-plugins volatilityexplorer volexp

Last synced: 2 days ago
JSON representation

volatility explorer

Awesome Lists containing this project

README

        

# VolExp
## Volatility Explorer

This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility Framework ().
This program functions similarly to Process Explorer/Hacker, but additionally it allows the user access to a Memory Dump (or access the real-time memory on the computer using Memtriage).
This program can run from Windows, Linux and MacOS machines, but can only use Windows memory images.

## note: volatility explorer for volatility3

### Quick Start
1. Download the volexp.py file (download the memtriage.py file as well and replace it with your memtriage.py file if you want to use memtriage ).

2. Run as a standalone program or as a plugin to Volatility:
- As a standalone program:
```shell
python2 volexp
```
- As a Volatility plugin:
```shell
python2 vol.py -f --profile= volexp
```

### Some Features:
```shell
python2 memtriage.py --plugins=volexp
```
- Some of the information display will not update in real time (except Processes info(update slowly), real time functions like struct analyzer, PE properties, run real time plugin, etc.).
![example memtriage, the colors used to identify special processes (serviceses, protected)](https://github.com/memoryforensics1/info/blob/master/Win10Example.GIF)

- The program also allows to view Loaded dll's, open handles and network connections of each process (Access to a dll's properties is
also optional).

![Lower Pane](https://github.com/memoryforensics1/info/blob/master/Win10Handles.png)

- To present more information of a process, Double-Click (or Left-Click and select Properties) to bring up an information window.

![Process properties](https://github.com/memoryforensics1/info/blob/master/ImageProperties.png)

- Or present more information on any PE.

![PE properties](https://github.com/memoryforensics1/info/blob/master/PeProeprties.png)

- The program allows the user to view the files in the Memory Dump as well as their information. Additionally it allows the user to extract those files (HexDump/strings view is also optional).

![File Explorer](https://github.com/memoryforensics1/info/blob/master/FilesExplorer.png)

- The program supports viewing of the Windows Objects and files's matadata (MFT).

![Other Explorers (Winobj and MFT explorer)](https://github.com/memoryforensics1/info/blob/master/Explorers.png)

- The program also support viewing a regview of the memory dump

![RegView](https://github.com/memoryforensics1/info/blob/master/RegView.png)

- Additionally, the program supports struct analysis. (writing on the memory's struct, running Volatility functions on a struct is available).
Example of getting all the load modules inside _EPROCESS struct in another struct analyzer window:

![Struct Analyzer](https://github.com/memoryforensics1/info/blob/master/StructAnalyzer.png)

- The Program is also capable of automatically marking suspicious processes found by another plugin.
Example of a running threadmap plugin:

![Cmd Plugin run threadmap](https://github.com/memoryforensics1/info/blob/master/threadmapExample.GIF)

- View memory use of a process.

![Vad Information](https://github.com/memoryforensics1/info/blob/master/VadInformation.png)

- Manually marking a certain process and adding a sidenote on it.

- User's actions can be saved on a seperate file for later usage.

### get help: https://github.com/memoryforensics1/VolExp/wiki/VolExp-help:
![volexp help](https://github.com/memoryforensics1/info/blob/master/help.gif)