volatility
TLDR
List available plugins and profiles
SYNOPSIS
volatility -f memoryimage [--profile=PROFILE] plugin [options_]
vol.py -f memoryimage plugin_
DESCRIPTION
volatility is an open-source memory forensics framework for extracting digital artifacts from RAM dumps. It analyzes memory images to recover running processes, network connections, command history, and other volatile data not available on disk.
The framework supports Windows, Linux, and macOS memory analysis. Linux plugins are prefixed with linux_ and require a profile matching the exact distribution, kernel version, and architecture of the system that created the dump.
Volatility 3 simplifies profile management with automatic symbol detection, while Volatility 2 requires manually building or obtaining profiles. Memory dumps can be acquired using tools like LiME (Linux Memory Extractor) or VMware snapshots.
PARAMETERS
-f FILE, --file FILE
Memory image file to analyze--profile PROFILE
Operating system profile (required for Volatility 2)--info
List available plugins and profiles-d, --debug
Enable debug output-h, --help
Show help message-p PID
Filter by process ID-o OFFSET
Physical offset in memory--output FORMAT
Output format (text, json, html)--output-file FILE
Write output to file
LINUX PLUGINS
linux_pslist
List running processeslinux_pstree
Process tree viewlinux_bash
Recover bash command historylinux_netstat
Show network connectionslinux_lsof
List open file descriptorslinux_cmdline
Show process command-line argumentslinux_mount
List mounted filesystemslinux_find_file
Find files in memorylinux_yarascan
Scan memory with Yara ruleslinux_moddump
Dump loaded kernel moduleslinux_proc_maps
Show process memory maps
CAVEATS
Linux analysis requires a profile matching the exact kernel version and distribution. Building profiles requires kernel headers and debug symbols. Memory images are large and analysis can be resource-intensive. Anti-forensic techniques may interfere with some plugins. Not all plugins work on all memory formats.
HISTORY
The Volatility Framework was created by Aaron Walters and first released in 2007. It emerged from academic research into memory forensics at George Mason University. The project became the standard tool for memory analysis in digital forensics and incident response. Volatility 3, released in 2019, introduced Python 3 support and automatic symbol table generation, simplifying Linux and macOS analysis.


