Skip to content

Plugin for use with the Volatility3 framework. It allows forensic analysts to extract heap fragments from process memory dumps in Windows systems.

License

Notifications You must be signed in to change notification settings

abeDCP/HeapList

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Heap Extraction Plugin for Volatility3

Overview

This plugin is designed for use with the Volatility3 framework. It allows forensic analysts to extract heap fragments from process memory dumps in Windows systems. The plugin is particularly useful for identifying and extracting information that may be critical in forensic investigations, such as injected code, sensitive data, and other relevant process behaviors.

Features

  • Lists all heaps of a specific process in a Windows memory dump.
  • Extracts specific heap fragments based on the analyst's interest.
  • Handles encoded heap fragments by decoding them for analysis.
  • Outputs extracted heap data into files for further examination.

Installation

To install the plugin, follow these steps:

  1. Clone or download this repository to your local machine.

  2. Ensure that you have Volatility3 installed and properly configured. You can follow the official installation guide here. NOTE: For this plugin to function correctly, the minimum required version of the Volatility3 framework is 2.0.0.

  3. Copy the plugin file into the appropriate Volatility3 plugin directory:

    cp heaplist.py /path/to/volatility3/volatility3/plugins/windows/
  4. The plugin is now ready to use with Volatility3.

Usage

To use the plugin, run Volatility3 with the following command:

vol.py -f <memory_dump> windows.heaplist.HeapList [options]

Options

  • --pid: Specify the process ID (PID) to analyze. If not specified, the plugin will analyze all processes.
  • --dump-all: Dump all heap fragments from the specified process or processes.
  • --dump: Specify the address of the heap fragment to download.

Example

To analyze the heaps of a specific process with PID 1234 and dump all heap fragments:

vol.py -f memory.dmp windows.heaplist.HeapList -p 1234 --dump-all

About

Plugin for use with the Volatility3 framework. It allows forensic analysts to extract heap fragments from process memory dumps in Windows systems.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published