The History of Memory Forensics & The Volatility Framework
Volatility 3 v2.11.0 is released. This release includes several new plugins and improvements.
- Kartik N. Iyer and Parag H. Rughani: Thread Local Storage (TLS) Callback Plugin
- Rosario Matteo Grammatico: The Windows Defender Tampering plugin
- Shusei Tomonaga: ETW Scanner for Volatility 3
- Sylvain Peyrefitte: ScringsScan and VadScringsScan Plugins
- Thomas Clarke: Image Extraction, NSRL Filtering, and Image Classifiers
- Valentin Obst: btf2json Project
The inaugural From The Source Conference (FTSCon) is held in Arlington, Virginia. FTSCon is a one-day summit offering a unique opportunity to connect in-person with an international cadre of pioneering researchers and practitioners who work on the most advanced digital investigations. Speakers include developers of your favorite open-source tools and the digital investigators who discovered some of the biggest intrusions of the past year. This event is followed by the first official offering of the Malware and Memory Forensics Training Course to focus on Volatility 3.
Volatility 3 v2.8.0 is released. This release includes several new plugins and improvements.
Volatility 3 v2.7.0 is released. This release includes new plugins for Linux, Windows, and macOS. It also includes support for configuration files for common CLI options.
Volatility 3 v2.5.2 is released. This release includes support for Amazon S3 and Google Cloud Storage, as well as new plugins for Linux and Windows. It also includes a new feature to the elfs plugin for dumping of ELF files and improvements to ELF support.
Volatility 3 v2.5.0 is released. This release includes new Linux plugins and Linux process dumping. It adds and improved core API, support for Xen ELF file format, improved Linux subsystem support, and includes tutorials for the documentation.
Volatility 3 v2.4.1 is released. Several new plugins for Linux and Windows are included in this release, as well as PID filtering for Windows pstree plugin, minor fixes for Windows callbacks plugin. The minimum Python version was increased to 3.7 and the Python-snappy dependency was replaced with ctypes to ease installation.
- Abyss Watcher: check_ftrace Plugin
- Abyss Watcher: check_unlinked_modules Plugin
- Abyss Watcher: check_tracepoints Plugin
- Asaf Eitani: eBPF Programs Plugin
- Aviel Zohar and Or Chechik: PackerList
- Aviel Zohar and Or Chechik: MasqueradeProcess
- Aviel Zohar and Or Chechik: DirectSyscalls
- Aviel Zohar and Or Chechik: ApiHash
- Felix Guyard: Alternate Data Stream Scanning Plugin
- Felix Guyard: Keepass Plugin
- Felix Guyard: Modern Windows Hibernation File Analysis
- Felix Guyard: Windows Import Address Table Plugin
- Felix Guyard: Remote Analysis on Cloud Object-Storage
- Hyeon Deok Jeong (DFV): hiddenprocess Plugin
- Nitzan Adut: EDRity
- Rifqi Ramadhan: notepad Plugin
- Rifqi Ramadhan: kusertime Plugin
- Rifqi Ramadhan: evtxlog Plugin
- Rifqi Ramadhan: sticky Plugin
- Thomas Clarke: saNSRL Utility
- Thomas Clarke: saNSFW Utility
- Thomas Clarke: dumpfilesNSRL Plugin
- Valentin Obst: bpf_graph Plugin
- Valentin Obst: bpf_listlinks Plugin
- Valentin Obst: bpf_listmaps Plugin
- Valentin Obst: bpf_listprocs Plugin
- Valentin Obst: bpf_listprogs Plugin
- Valentin Obst: bpf_lsm Plugin
- Valentin Obst: bpf_netdev Plugin
Volatility 3 v2.4.0 is released. This is a major version release and includes new plugins for Linux and Windows. It also introduces the concept of modules and module requirements. Other features in this release include unified symbol handling and ISF file caching between OS versions, better QEVM support (fixed the QEMU PCI hole), exposed an API for automatic PDB symbol table use, improved contributed documentation, as well asl various bug fixes and changes across the codebase.
Volatility 3 v2.0.0 is released. This release includes new plugins, such as Windows networking plugins, Windows crashinfo and skeleton_key_check, Linux kmsg plugin. It also includes new layers AVML and LeechCore, QEMU layer performance optimization, improved access to Windows library symbols, better offline and remote support, as well as improved documentation
and working with python requirements.
- Asaf Eitani: check_fops Plugin
- Asaf Eitani: check_seqops Plugin
- Asaf Eitani: Fileless Plugin
- Aviel Zohar: HandleXView
- Felix Guyard: AnyDesk Plugin
- Felix Guyard: Inodes Plugin
- Felix Guyard: Prefetch Plugin
- Felix Guyard: VolWeb
Volatility 3 v1.0.0 (Python 3 Rewrite) is released. In 2020, the Volatility Foundation publicly released a complete rewrite of the framework, Volatility 3. The project was intended to address many of the technical and performance challenges associated with the original code base that became apparent since its original release in 2007. Another benefit of the rewrite is that Volatility 3 could be released under a custom license that was more aligned with the goals of the Volatility community, the Volatility Software License (VSL). Details about the rewrite of Volatility 3 can be found in this presentation: Volatility 3 Public Beta: Insider’s Preview.
- Amir Sheffer & Ofek Shaked: Linux Namespaces Support and Docker Plugin
- Felix Guyard: VolWeb
- Frank Block: PTE Analysis Plugins
- Gerhart: Hyper-V Volatility Introspection Layer
- Kevin Breen: Symbol Generator & Public ISF Server, Cobalt Strike Plugin, Rich Header Plugin, and LastPass Credential Recovery Plugin
- Leonardo Dias da Silva: MultiYara
- MoonGyu Lee, JeongToon Kang, HyeonDeok Jeongm JunSung Park, Mintaek Lim (BoB Tracer of Coin): CryptoScan
- Aviel Zohar: Volatility Explorer, StructAnalyzer, WinObjGUI, FileScanGUI, P2V, PFNInfo, RAMMap, Winobj
- Bjorn Stelte: EvtxLogs Plugin
- Bjorn Stelte: Syslog Renderer
- Gustavo Moreira: MountInfo Plugin
- Jelle Vergeer: SSHKeys Plugin
- Or Chechik and Inon Weber: check_parent_spoof Plugin
- Or Chechik and Inon Weber: check_peb_spoof Plugin
Volatility 3 Public Beta is announced at #OSDFCon. Since its initial public release in 2007, Volatility has attracted one of the largest and most active communities of users and developers in the digital forensics industry. As the industry has continued to evolve the way that operating systems are developed, deployed, and maintained, so to have the skillsets of memory analysts. Their preferred work flows have changed to meet a world with increasingly large volumes of complex data. To address these challenges, the Volatility development team has been actively architecting and developing an entirely new version of the framework, while simultaneously supporting users of the current stable version.
- Angelo Mirabella: Linux Coredump
- Antoine Brodin: FreeBSD Support
- Blaine Stancill (FireEye): Windows 10 Memory Compression
- Cesare Pizzi (Sorint.Lab): Powershell
- Elmar Nabigaev: VMware Tools
- Fabio Pagani: Linux Kallsyms
- Or Chechik and Inon Weber: Ropfind
- Rolf Govers and Max de Bruijn (Fox IT): Windows Toast Notifications
- Ryan D. Maggio, Raphaela Mettig, Sweta Ghimire (LSU): Shemu
- Shachaf Atun (KSL Group): Winobj and Tokenimp
- Shusei Tomonaga (JPCERT): MalConfScan
- Aleksander Østerud: MemoryDecompression
- Aliz Hammond: Gargoyle
- David Quesada: CSV and Splunk Dashboard
- Lorenz Liebler et al: Volatility Plugin for Approxis
- Peter Casey: Vivedump
- Adam Bridge: Linux (X) Windows & Atoms
- Alessandro De Vito: Chrome Ragamuffin
- Frank Block: Linux Glibc Heap Analysis
- Javier Vicente Vallejo: Symbolizemod
- Liam, Shachaf and Kyle (KSL Group): Threadmap
- Mark McKinnon: Volatility Autopsy Modules
- Michael Brown: SQLite Artifacts
- Peter Kalnai and Michal Poslusny (ESET): Browserhooks
- Xabier Ugarte-Pedrero (Cisco Talos): PyREBox
Volatility 2.6 (Windows 10 / Server 2016) is released. This release improves support for Windows 10 and adds support for Windows Server 2016, MacOS Sierra 10.12, and Linux with KASLR kernels. A lot of bug fixes went into this release as well as performance enhancements (especially related to page table parsing and virtual address space scanning). See below for a more detailed list of the changes in this version.
- Aim4r: VolDiff Memory Diffing and Malware Identification
- Bart Inglot: RDP Key Extraction and Replay
- Dima Pshoul: Advanced Malware Hunter’s Kit
- Hemant Kumar and Sajeev Nair: Windows MemDiff Forensic Tool (WMDF)
- James Hall and Kevin Breen: USBStor
- Kevin Breen: LastPass Credential Recovery
- Kevin Breen: VolUtility Web Interface
- Marcin Ulikowski: Bitlocker Key Recovery
- Mariano Graziano: Linux Kernel Symbol Finder
- Mariano Graziano: ROPEMU (ROP Payload Analysis)
- Martin Korman: VolatilityBot Malware Detonation Framework
- Monnappa: Hollow Process Detection and Analysis
- Nichlas Holm: Network Packets, IP/MAC, ARP
- Stanislas ‘P1kachu’ Lejay: Auto-Profile Detection
- Thomas White: FileVault2 & Bitlocker Key Recovery
- Tran Vien Ha: Open Source Intelligence & MISP Integration
- Tyler Halfpop: FindEvil Malware Analysis Automation
Volatility 2.5 (Unified Output / Community) is released. This is the first release since the publication of The Art of Memory Forensics. It adds support for Windows 10 (initial), Linux kernels 4.2.3+, and MacOS X Yosemite and El Capitan. Additionally, the unified output rendering gives users the flexibility of asking for results in various formats (html, sqlite, json, xlsx, dot, text, etc.) while simplifying things for plugin developers. In short, less code leads to more functionality. This is especially useful for framework designers (GUIs, web interfaces, library APIs), because you can interface with a plugin directly and ask for json, which you then store, process, or modify however you want.
- Adam Bridge: NDIS Packet Scan
- Alexander Tarasenko: Pykd/Windbg Address Space
- Bart Inglot: Scheduled Task and Job Scanners
- Fred House, Andrew Davis, and Claudiu Teodorescu: Shimcache Memory Scan
- James Habben: Evolve Web Interface
- Joe Greenwood: Hacking Team RCS Attribution
- Loïc Jaquemet: Haystack
- May Medhat (et. al.): GVol Tool
- Monnappa Ka: Linux Memory Diff
- Philip Huppert: VM Live Migration
- Ying Li: Python Strings and SSH Keys
Volatility 2.4 is released. The release of this version coincides with the publication of The Art of Memory Forensics. It adds support for Windows 8, 8.1, 2012, and 2012 R2 memory dumps and MacOS X Mavericks (up to 10.9.4). New plugins include the ability to extract cached Truecrypt passphrases and master keys from Windows and Linux memory dumps, investigate Mac user activity (such as pulling their contact database, calendar items, PGP encrypted mails, OTR Adium chat messages, etc), and analyze advanced Linux rootkits.
- Adam Bridge: Editbox
- Cem Gurkok: Mac Rootkit and Bitcoin
- Csaba Barta: Malware Analysis
- Curtis Carmony: Dmcrypt
- Dave Lasalle: Forensic Suite
- Jamaal Speights: MsDecompress
- Monnappa KA: Gh0stRat Decryption
- Philip Huppert: OpenVPN
- Takahiro Haruyama: OpenIOC Scan
- Thomas Chopitea: Autoruns
- Wyatt Roersma: Hyper-V Tools
Volatility 2.3.1 (Mac OSX and Android ARM) is released. This release introduced support for 32- and 64-bit Linux memory samples, an address space for LiME (the Linux Memory Extractor), and a suite of 14 new plugins to investigate Windows GUI space–including clipboard contents, desktop windows, and screenshots.
The 1st Annual Volatility Framework Plugin Contest is announced. This contest is inspired and modeled after the Hex-Rays Plugin Contest. As in the case of IDA, Volatility was designed with the belief that talented analysts should only be limited by their creativity not the tools they use. In this spirit, Volatility has a flexible architecture that can be extended in numerous ways: analysis plugins (operating system plugins, application plugins, etc), volshell commands, address spaces, profiles, or user interfaces. This contest is intended to inspire people to demonstrate their creativity, become a memory analysis pioneer, win the admiration of your peers, and give back to the community.
- Carl Pulley: A plugin to find the nearest function/method within a symbol table
- Cem Gurkok: OS X rootkit detection plugins
- Cem Gurkok: Window’s security permission plugin
- Edwin Smulders: Linux process information, stack analysis, and syscall register plugins
- Jamaal Speights: A plugin that extracts networking packets from memory samples.
- Jeff Bryner: Facebook and Twitter artifact extraction
- Jeremy Jones: A plugin to convert VMware suspended state to Illumos debug format
- Mariano Graziano: Actaeon, Intel VT-x introspection
Volatility 2.2 (Linux Support) is released. This release introduced support for 32- and 64-bit Linux memory samples, an address space for LiME (the Linux Memory Extractor), and a suite of 14 new plugins to investigate Windows GUI space–including clipboard contents, desktop windows, and screenshots.
Volatility 2.1 (Malware and 64-bits) is released. This is the first release to support all major 64-bit versions of Windows. It also included the ability to convert raw memory images to crash dumps, extract command history and console input/output buffers, and an API for accessing cached registry keys and values from memory. Ten new plugins were added with a specific focus on malware analysis.
AAron Walters posts a challenge to the memory forensics community: detect the “undetectable” by using Volatility to find artifacts in memory for a new Metasploit payload known to be leveraging a technique known as Reflective DLL Injection. Less than 24 hours later, Michael Hale Ligh is the first person to respond to the challenge and proves that Volatility can find hidden DLLs and other injected code blocks.
The inaugural Open Source Memory Forensics Workshop is held in Baltimore, Maryland. This is the first ever workshop focused on open source volatile memory analysis, bringing together digital investigation researchers and practitioners to discuss the latest advancements in volatile memory analysis.
AAron Walters presents Advanced Volatile Memory Analysis at the 2008 DoD Cyber Crime Conference. This talk focuses on advanced techniques being used in volatile memory analysis (VMA). It also discusses a number of open source tools and resources he has made available to the digital investigation community. The session also explores VMA is being used to perform automated malware analysis, and demonstrates how he is combining VMA with file system analysis to help reconstruct and visualize the digital crime scene.
The Volatility Framework 1.1.1 is first publicly released, having evolved from FATKit and VolaTools. The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The goal behind the open development of the Volatility Framework is to bring together systems researchers who believe in bettering the state of the digital forensics community. The framework is intended to introduce the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work in this exciting area of research. The Volatility Framework runs on any platform where Python is supported.
AAron Walters and Nick Petroni present their research on integrating volatile memory forensics into the digital investigative process revolutionizes the industry.
AAron Walters publishes FATKit: Detecting Malicious Library Injection and Upping the “Anti”, which discusses how the Forensic Analysis ToolKit (FATKit) can facilitate the process of enumerating suspicious artifacts manifested as a result of remote library injection. Previously published techniques focused on detecting attacks in real time, but this paper specifically focuses on the ability to extract memory-resident evidence from information systems under investigation. One significant differentiator from the majority of previous work is that the integrity of the potentially compromised operating system is not relied upon; instead, analysis is performed offline on a trusted capture of volatile memory (RAM).
AAron Walters, Nick Petroni, Timothy Fraser, and William Arbaugh publish FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. This paper introduces the modular, extensible Forensic Analysis ToolKit (FATKit) framework that increases the practical applicability of volatile memory forensic analysis by freeing human analysts from the prohibitively-tedious aspects of low-level data extraction.
COMPANY HISTORY
Volatility 3 v2.26.0 is released. This is announced as the Feature Parity release; Volatility 2 is now deprecated.
Volatility 3 v2.11.0 is released. This release includes several new plugins and improvements.
- Kartik N. Iyer and Parag H. Rughani: Thread Local Storage (TLS) Callback Plugin
- Rosario Matteo Grammatico: The Windows Defender Tampering plugin
- Shusei Tomonaga: ETW Scanner for Volatility 3
- Sylvain Peyrefitte: ScringsScan and VadScringsScan Plugins
- Thomas Clarke: Image Extraction, NSRL Filtering, and Image Classifiers
- Valentin Obst: btf2json Project
The inaugural From The Source Conference (FTSCon) is held in Arlington, Virginia. FTSCon is a one-day summit offering a unique opportunity to connect in-person with an international cadre of pioneering researchers and practitioners who work on the most advanced digital investigations. Speakers include developers of your favorite open-source tools and the digital investigators who discovered some of the biggest intrusions of the past year. This event is followed by the first official offering of the Malware and Memory Forensics Training Course to focus on Volatility 3.
July 5, 1994

Amazon is born
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Erat enim res aperta. Ne discipulum abducam, times. Primum quid tu dicis breve? An haec ab eo non dicuntur?
Feb 2, 2020

Amazon Prime debuts
Aliter homines, aliter philosophos loqui putas oportere? Sin aliud quid voles, postea. Mihi enim satis est, ipsis non satis. Negat enim summo bono afferre incrementum diem. Quod ea non occurrentia fingunt, vincunt Aristonem., you can change me anytime click here,
Jan 31, 2021

Amazon acquires Audible
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.