Volatility 3 framework for memory forensics — process analysis, credential extraction, and malware investigation.
python3 vol.py -f memory.dmp windows.info
python3 vol.py -f memory.dmp linux.banner
python3 vol.py -f memory.dmp windows.pslist
python3 vol.py -f memory.dmp windows.pstree
python3 vol.py -f memory.dmp windows.psscan
python3 vol.py -f memory.dmp windows.cmdline
python3 vol.py -f memory.dmp windows.dlllist --pid 1234
python3 vol.py -f memory.dmp windows.handles --pid 1234
python3 vol.py -f memory.dmp windows.netstat
python3 vol.py -f memory.dmp windows.netscan
python3 vol.py -f memory.dmp windows.hashdump
python3 vol.py -f memory.dmp windows.lsadump
python3 vol.py -f memory.dmp windows.cachedump
python3 vol.py -f memory.dmp windows.registry.hivelist
python3 vol.py -f memory.dmp windows.registry.printkey --key "SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
python3 vol.py -f memory.dmp windows.filescan
python3 vol.py -f memory.dmp windows.dumpfiles --pid 1234 --virtaddr 0xaddr
python3 vol.py -f memory.dmp windows.malfind
python3 vol.py -f memory.dmp windows.malfind --dump
python3 vol.py -f memory.dmp windows.hollowprocesses
python3 vol.py -f memory.dmp windows.vadinfo --pid 1234
python3 vol.py -f memory.dmp windows.memmap --pid 1234 --dump
python3 vol.py -f memory.dmp windows.strings --pid 1234 -s strings.txt