Vol3xp
Volatility Explorer Suit
Install / Use
/learn @memoryforensics1/Vol3xpREADME
Vol3xp, Volatility 3 Explorer Plugins
WinObj -> Windows Kernel Objects Explorer an improve of https://github.com/kslgroup/WinObj for volatility 3 (winobj.py)
WinObj (very similar to WinObj [sysinternals]) Also supports Struct Analyzer and WinObjGui from VolExp.
RAMMap -> Physical Address Mapping (pfn.py)
RAMMap (very similar to Rammap [SysInternals]), but additonally it marks any suspicious pages (for more information read the pdf). This module contains 3 plugins:
- P2V - Converts physical address to virtual address using PfnDatabase and finds the owning process of a page (if any).
- PFNInfo - Gives information about a physical page from the PfnDatabase, the use of the page, file name, and much more.
- RAMMap - Uses both of the plugins above. Displays a RamMap-like UI for all the physical pages, and colors suspicious pages. [You can see far more detailed information about the plugins in the pdf]
And the main event -> Volatilty Explorer (volexp.py)
This program allows the user to upload a memory dump and navigate through it with ease using a graphical interface. It can also function as a plugin to the Volatility Framework (https://github.com/volatilityfoundation/volatility3). This program functions similarly to Process Explorer/Hacker, but allows the user to analyze a Memory Dump. This program can run from Windows, Linux and MacOS machines, but only accepts Windows memory images.
note: volatility explorer for volatility2 -> https://github.com/memoryforensics1/VolExp
Quick Start
-
Download the volexp.py file (download the ).
-
Run as a standalone program or as a plugin to Volatility:
- As a standalone program:
python3 volexp
- As a Volatility plugin:
python3 vol.py -f <memory file path> windows.volexp.volexp
Some Features:
python3 volexp.py
-
Some of the information display will not update in real time (except Processes info(update slowly), real time functions like struct analyzer, PE properties, run real time plugin, etc.).
-
The program also allows to view Loaded dll's, open handles and network connections of each process (Access to a dll's properties is also optional).

- To present more information of a process, Double-Click (or Left-Click and select Properties) to bring up an information window.

- Or present more information on any PE.

- The program allows the user to view the files in the Memory Dump as well as their information. Additionally it allows the user to extract those files (HexDump/strings view is also optional). <a name="22"></a>

- The program supports viewing of the Windows Objects and files's matadata (MFT).<a name="11"></a>

- The program also support viewing a regview of the memory dump

- Additionally, the program supports struct analysis. (writing on the memory's struct, running Volatility functions on a struct is available). Example of getting all the load modules inside _EPROCESS struct in another struct analyzer window:

- The Program is also capable of automatically marking suspicious processes found by another plugin. Example of a running threadmap plugin:
- View memory use of a process.

-
Manually marking a certain process and adding a sidenote on it.
-
User's actions can be saved on a seperate file for later usage.
get help: https://github.com/memoryforensics1/VolExp/wiki/VolExp-help:

Related Skills
node-connect
340.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
84.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
340.5kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
84.2kCommit, push, and open a PR
