Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/memoryforensics1/vol3xp
Volatility Explorer Suit
https://github.com/memoryforensics1/vol3xp
analysis forensics memory memory-dump plugin process-explorer process-hacker procexp sysinternals sysinternals-volatility vol3xp volatility volatility-explorer volatility-framework volatility-master volatility-plugin volatility-plugins volatility-sysinternals volatilityexplorer volexp
Last synced: about 1 month ago
JSON representation
Volatility Explorer Suit
- Host: GitHub
- URL: https://github.com/memoryforensics1/vol3xp
- Owner: memoryforensics1
- Created: 2020-09-06T19:59:09.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-01-03T09:16:36.000Z (about 2 years ago)
- Last Synced: 2024-11-01T13:33:59.706Z (2 months ago)
- Topics: analysis, forensics, memory, memory-dump, plugin, process-explorer, process-hacker, procexp, sysinternals, sysinternals-volatility, vol3xp, volatility, volatility-explorer, volatility-framework, volatility-master, volatility-plugin, volatility-plugins, volatility-sysinternals, volatilityexplorer, volexp
- Language: Python
- Homepage:
- Size: 3.39 MB
- Stars: 61
- Watchers: 3
- Forks: 12
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Vol3xp, Volatility 3 Explorer Plugins
### WinObj -> Windows Kernel Objects Explorer an improve of for volatility 3 (winobj.py)
WinObj (very similar to WinObj [sysinternals]) Also supports Struct Analyzer and [WinObjGui](#11) from VolExp.### RAMMap -> Physical Address Mapping (pfn.py)
RAMMap (very similar to Rammap [SysInternals]), but additonally it marks any suspicious pages (for more information read the pdf).
This module contains 3 plugins:
1. P2V - Converts physical address to virtual address using PfnDatabase and finds the owning process of a page (if any).
2. PFNInfo - Gives information about a physical page from the PfnDatabase, the use of the page, file name, and much more.
3. RAMMap - Uses both of the plugins above. Displays a RamMap-like UI for all the physical pages, and colors suspicious pages.
[You can see far more detailed information about the plugins in the pdf]### And the main event -> Volatilty Explorer (volexp.py)
This program allows the user to upload a memory dump and navigate through it with ease using a graphical interface.
It can also function as a plugin to the Volatility Framework ().
This program functions similarly to Process Explorer/Hacker, but allows the user to analyze a Memory Dump.
This program can run from Windows, Linux and MacOS machines, but only accepts Windows memory images.## note: volatility explorer for volatility2 ->
### Quick Start
1. Download the volexp.py file (download the ).2. Run as a standalone program or as a plugin to Volatility:
- As a standalone program:
```shell
python3 volexp
```
- As a Volatility plugin:
```shell
python3 vol.py -f windows.volexp.volexp
```### Some Features:
```shell
python3 volexp.py
```
- Some of the information display will not update in real time (except Processes info(update slowly), real time functions like struct analyzer, PE properties, run real time plugin, etc.).
![example vol3xp, the colors used to identify special processes (serviceses, protected)](https://github.com/memoryforensics1/info/blob/master/Win10Example.GIF)- The program also allows to view Loaded dll's, open handles and network connections of each process (Access to a dll's properties is also optional).
![Lower Pane](https://github.com/memoryforensics1/info/blob/master/Win10Handles.png)
- To present more information of a process, Double-Click (or Left-Click and select Properties) to bring up an information window.
![Process properties](https://github.com/memoryforensics1/info/blob/master/ImageProperties.png)
- Or present more information on any PE.
![PE properties](https://github.com/memoryforensics1/info/blob/master/PeProeprties.png)
- The program allows the user to view the files in the Memory Dump as well as their information. Additionally it allows the user to extract those files (HexDump/strings view is also optional).
![File Explorer](https://github.com/memoryforensics1/info/blob/master/FilesExplorer.png)
- The program supports viewing of the Windows Objects and files's matadata (MFT).
![Other Explorers (Winobj and MFT explorer)](https://github.com/memoryforensics1/info/blob/master/Explorers.png)
- The program also support viewing a regview of the memory dump
![RegView](https://github.com/memoryforensics1/info/blob/master/RegView.png)
- Additionally, the program supports struct analysis. (writing on the memory's struct, running Volatility functions on a struct is available).
Example of getting all the load modules inside _EPROCESS struct in another struct analyzer window:![Struct Analyzer](https://github.com/memoryforensics1/info/blob/master/StructAnalyzer.png)
- The Program is also capable of automatically marking suspicious processes found by another plugin.
Example of a running threadmap plugin:![Cmd Plugin run threadmap](https://github.com/memoryforensics1/info/blob/master/threadmapExample.GIF)
- View memory use of a process.
![Vad Information](https://github.com/memoryforensics1/info/blob/master/VadInformation.png)
- Manually marking a certain process and adding a sidenote on it.
- User's actions can be saved on a seperate file for later usage.
### get help: https://github.com/memoryforensics1/VolExp/wiki/VolExp-help:
![volexp help](https://github.com/memoryforensics1/info/blob/master/help.gif)