VolExp - Volatility Explorer
This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility Framework (https://github.com/volatilityfoundation/volatility). This program functions similarly to Process Explorer/Hacker, but additionally it allows the user access to a Memory Dump (or access the real-time memory on the computer using Memtriage). This program can run from Windows, Linux and MacOS machines, but can only use Windows memory images.
Quick Start
- Download the volexp.py file (download the memtriage.py file as well and replace it with your memtriage.py file if you want to use memtriage https://github.com/gleeda/memtriage).
- Run as a standalone program or as a plugin to Volatility:
- As a standalone program:
python2 volexp
- As a Volatility plugin:
python2 vol.py -f <memory file path> --profile=<memory profile> volexp
Some Features:
python2 memtriage.py --plugins=volexp
- Some of the information display will not update in real time (except Processes info(update slowly), real time functions like struct analyzer, PE properties, run real time plugin, etc.).
- The program also allows to view Loaded dll's, open handles and network connections of each process (Access to a dll's properties is also optional).
- To present more information of a process, Double-Click (or Left-Click and select Properties) to bring up an information window.
- Or present more information on any PE.
- The program allows the user to view the files in the Memory Dump as well as their information. Additionally, it allows the user to extract those files (HexDump/strings view is also optional).
- The program supports viewing of the Windows Objects and files's matadata (MFT).
- The program also support viewing a regview of the memory dump
- Additionally, the program supports struct analysis. (writing on the memory's struct, running Volatility functions on a struct is available). Example of getting all the load modules inside _EPROCESS struct in another struct analyzer window:
- The Program is also capable of automatically marking suspicious processes found by another plugin. Example of a running threadmap plugin:
- View memory use of a process.
- Manually marking a certain process and adding a sidenote on it.
- User's actions can be saved on a seperate file for later usage.
get help: https://github.com/memoryforensics1/VolExp/wiki/VolExp-help:
via KitPloit
More articles
- Hackrf Tools
- Hacking Tools Name
- Hacking Tools Download
- Black Hat Hacker Tools
- Hacker Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Windows
- Hackers Toolbox
- Hackrf Tools
- Hack Tools For Pc
- Pentest Tools
- Pentest Tools Windows
- Tools 4 Hack
- Pentest Tools Kali Linux
- Pentest Tools List
- Hacking Tools For Windows 7
- Pentest Tools Review
- Hacker Tools For Ios
- Hacking Tools Github
- Hack Tools For Ubuntu
- Hacker Tools Linux
- Nsa Hack Tools Download
- Hacking Tools 2020
- Hacking Tools Pc
- Hacking Tools For Kali Linux
- Hacking Tools Windows
- Kik Hack Tools
- Hack Tools For Games
- Pentest Tools Tcp Port Scanner
- Hacker Tools Windows
- Hacker Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools Usb
- Physical Pentest Tools
- Hack Tools For Windows
- Pentest Tools Free
- Hacker Tools Github
- Hacker Security Tools
- Best Hacking Tools 2019
- Hack Tools Online
- Pentest Tools Url Fuzzer
- Hacking Tools Kit
- Pentest Tools Url Fuzzer
- Pentest Tools For Android
- Hacking Tools Mac
- Hack Tool Apk No Root
- Hacking Tools Download
- Hacker Tools For Windows
- Hacker Tools For Pc
- Hacking Tools For Beginners
- Pentest Recon Tools
- Pentest Tools Windows
- Hacker Tools For Windows
- Hacker Tools Windows
- Pentest Tools Download
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Hacking Tools 2019
- Hack And Tools
- Pentest Tools Website
- Hacking Tools For Windows Free Download
- Hacking Tools For Mac
- Pentest Tools For Mac
- Hack Tools Mac
- Pentest Tools Bluekeep
- Hack Tools For Games
- Hack Tools For Games
- Tools For Hacker
- Hacking Tools Hardware
- Nsa Hacker Tools
- Hacking App
- Hacking Tools Kit
- Blackhat Hacker Tools
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home