-
Plugins de volatility 2
Instalada desde el repo de github:
# Windowsamcache # Print AmCache informationapihooks # Detect API hooks in process and kernel memoryatoms # Print session and window station atom tablesatomscan # Pool scanner for atom tablesauditpol # Prints out the Audit Policies from HKLM\SECURITY\Policy\PolAdtEvbigpools # Dump the big page pools using BigPagePoolScannerbioskbd # Reads the keyboard buffer from Real Mode memorycachedump # Dumps cached domain hashes from memorycallbacks # Print system-wide notification routinesclipboard # Extract the contents of the windows clipboardcmdline # Display process command-line argumentscmdscan # Extract command history by scanning for _COMMAND_HISTORYconnections # Print list of open connections [Windows XP and 2003 Only]connscan # Pool scanner for tcp connectionsconsoles # Extract command history by scanning for _CONSOLE_INFORMATIONcrashinfo # Dump crash-dump informationdeskscan # Poolscaner for tagDESKTOP (desktops)devicetree # Show device treedlldump # Dump DLLs from a process address spacedlllist # Print list of loaded dlls for each processdriverirp # Driver IRP hook detectiondrivermodule # Associate driver objects to kernel modulesdriverscan # Pool scanner for driver objectsdumpcerts # Dump RSA private and public SSL keysdumpfiles # Extract memory mapped and cached filesdumpregistry # Dumps registry files out to diskeditbox # Displays information about Edit controls. (Listbox experimental.)envars # Display process environment variableseventhooks # Print details on windows event hooksevtlogs # Extract Windows Event Logs (XP/2003 only)filescan # Pool scanner for file objectsgahti # Dump the USER handle type informationgditimers # Print installed GDI timers and callbacksgdt # Display Global Descriptor Tablegetservicesids # Get the names of services in the Registry and return Calculated SIDgetsids # Print the SIDs owning each processhandles # Print list of open handles for each processhashdump # Dumps passwords hashes (LM/NTLM) from memoryhibinfo # Dump hibernation file informationhivedump # Prints out a hivehivelist # Print list of registry hives.hivescan # Pool scanner for registry hiveshpakextract # Extract physical memory from an HPAK filehpakinfo # Info on an HPAK fileidt # Display Interrupt Descriptor Tableiehistory # Reconstruct Internet Explorer cache / historyimagecopy # Copies a physical address space out as a raw DD imageimageinfo # Identify information for the imageimpscan # Scan for calls to imported functionsjoblinks # Print process job link informationkdbgscan # Search for and dump potential KDBG valueskpcrscan # Search for and dump potential KPCR valuesldrmodules # Detect unlinked DLLslimeinfo # Dump Lime file format informationlsadump # Dump (decrypted) LSA secrets from the registrymachoinfo # Dump Mach-O file format informationmalfind # Find hidden and injected codembrparser # Scans for and parses potential Master Boot Records (MBRs)memdump # Dump the addressable memory for a processmemmap # Print the memory mapmessagehooks # List desktop and thread window message hooksmftparser # Scans for and parses potential MFT entriesmoddump # Dump a kernel driver to an executable file samplemodscan # Pool scanner for kernel modulesmodules # Print list of loaded modulesmultiscan # Scan for various objects at oncemutantscan # Pool scanner for mutex objectsnetscan # Scan a Vista (or later) image for connections and socketsnotepad # List currently displayed notepad textobjtypescan # Scan for Windows object type objectspatcher # Patches memory based on page scanspoolpeek # Configurable pool scanner pluginpooltracker # Show a summary of pool tag usageprintkey # Print a registry key, and its subkeys and valuesprivs # Display process privilegesprocdump # Dump a process to an executable file samplepslist # Print all running processes by following the EPROCESS listspsscan # Pool scanner for process objectspstree # Print process list as a treepsxview # Find hidden processes with various process listingsqemuinfo # Dump Qemu informationraw2dmp # Converts a physical memory sample to a windbg crash dumpscreenshot # Save a pseudo-screenshot based on GDI windowsservicediff # List Windows services (ala Plugx)sessions # List details on _MM_SESSION_SPACE (user logon sessions)shellbags # Prints ShellBags infoshimcache # Parses the Application Compatibility Shim Cache registry keyshutdowntime # Print ShutdownTime of machine from registrysockets # Print list of open socketssockscan # Pool scanner for tcp socket objectsssdt # Display SSDT entriesstrings # Match physical offsets to virtual addresses (may take a while, VERY verbose)svcscan # Scan for Windows servicessymlinkscan # Pool scanner for symlink objectsthrdscan # Pool scanner for thread objectsthreads # Investigate _ETHREAD and _KTHREADstimeliner # Creates a timeline from various artifacts in memorytimers # Print kernel timers and associated module DPCstruecryptmaster # Recover TrueCrypt 7.1a Master Keystruecryptpassphrase # TrueCrypt Cached Passphrase Findertruecryptsummary # TrueCrypt Summaryunloadedmodules # Print list of unloaded modulesuserassist # Print userassist registry keys and informationuserhandles # Dump the USER handle tablesvaddump # Dumps out the vad sections to a filevadinfo # Dump the VAD infovadtree # Walk the VAD tree and display in tree formatvadwalk # Walk the VAD treevboxinfo # Dump virtualbox informationverinfo # Prints out the version information from PE imagesvmwareinfo # Dump VMware VMSS/VMSN informationvolshell # Shell in the memory imagewin10cookie # Find the ObHeaderCookie value for Windows 10windows # Print Desktop Windows (verbose details)wintree # Print Z-Order Desktop Windows Treewndscan # Pool scanner for window stationsyarascan # Scan process or kernel memory with Yara signatures# Linuxlinux_apihooks # Checks for userland apihookslinux_arp # Print the ARP tablelinux_aslr_shift # Automatically detect the Linux ASLR shiftlinux_banner # Prints the Linux banner informationlinux_bash # Recover bash history from bash process memorylinux_bash_env # Recover a process' dynamic environment variableslinux_bash_hash # Recover bash hash table from bash process memorylinux_check_afinfo # Verifies the operation function pointers of network protocolslinux_check_creds # Checks if any processes are sharing credential structureslinux_check_evt_arm # Checks the Exception Vector Table to look for syscall table hookinglinux_check_fop # Check file operation structures for rootkit modificationslinux_check_idt # Checks if the IDT has been alteredlinux_check_inline_kernel # Check for inline kernel hookslinux_check_modules # Compares module list to sysfs info, if availablelinux_check_syscall # Checks if the system call table has been alteredlinux_check_syscall_arm # Checks if the system call table has been alteredlinux_check_tty # Checks tty devices for hookslinux_cpuinfo # Prints info about each active processorlinux_dentry_cache # Gather files from the dentry cachelinux_dmesg # Gather dmesg bufferlinux_dump_map # Writes selected memory mappings to disklinux_dynamic_env # Recover a process' dynamic environment variableslinux_elfs # Find ELF binaries in process mappingslinux_enumerate_files # Lists files referenced by the filesystem cachelinux_find_file # Lists and recovers files from memorylinux_getcwd # Lists current working directory of each processlinux_hidden_modules # Carves memory to find hidden kernel moduleslinux_ifconfig # Gathers active interfaceslinux_info_regs # It's like 'info registers' in GDB. It prints out all thelinux_iomem # Provides output similar to /proc/iomemlinux_kernel_opened_files # Lists files that are opened from within the kernellinux_keyboard_notifiers # Parses the keyboard notifier call chainlinux_ldrmodules # Compares the output of proc maps with the list of libraries from libdllinux_library_list # Lists libraries loaded into a processlinux_librarydump # Dumps shared libraries in process memory to disklinux_list_raw # List applications with promiscuous socketslinux_lsmod # Gather loaded kernel moduleslinux_lsof # Lists file descriptors and their pathlinux_malfind # Looks for suspicious process mappingslinux_memmap # Dumps the memory map for linux taskslinux_moddump # Extract loaded kernel moduleslinux_mount # Gather mounted fs/deviceslinux_mount_cache # Gather mounted fs/devices from kmem_cachelinux_netfilter # Lists Netfilter hookslinux_netscan # Carves for network connection structureslinux_netstat # Lists open socketslinux_pidhashtable # Enumerates processes through the PID hash tablelinux_pkt_queues # Writes per-process packet queues out to disklinux_plthook # Scan ELF binaries' PLT for hooks to non-NEEDED imageslinux_proc_maps # Gathers process memory mapslinux_proc_maps_rb # Gathers process maps for linux through the mappings red-black treelinux_procdump # Dumps a process's executable image to disklinux_process_hollow # Checks for signs of process hollowinglinux_psaux # Gathers processes along with full command line and start timelinux_psenv # Gathers processes along with their static environment variableslinux_pslist # Gather active tasks by walking the task_struct->task listlinux_pslist_cache # Gather tasks from the kmem_cachelinux_psscan # Scan physical memory for processeslinux_pstree # Shows the parent/child relationship between processeslinux_psxview # Find hidden processes with various process listingslinux_recover_filesystem # Recovers the entire cached file system from memorylinux_route_cache # Recovers the routing cache from memorylinux_sk_buff_cache # Recovers packets from the sk_buff kmem_cachelinux_slabinfo # Mimics /proc/slabinfo on a running machinelinux_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose)linux_threads # Prints threads of processeslinux_tmpfs # Recovers tmpfs filesystems from memorylinux_truecrypt_passphrase # Recovers cached Truecrypt passphraseslinux_vma_cache # Gather VMAs from the vm_area_struct cachelinux_volshell # Shell in the memory imagelinux_yarascan # A shell in the Linux memory image# MACmac_adium # Lists Adium messagesmac_apihooks # Checks for API hooks in processesmac_apihooks_kernel # Checks to see if system call and kernel functions are hookedmac_arp # Prints the arp tablemac_bash # Recover bash history from bash process memorymac_bash_env # Recover bash's environment variablesmac_bash_hash # Recover bash hash table from bash process memorymac_calendar # Gets calendar events from Calendar.appmac_check_fop # Validate File Operation Pointersmac_check_mig_table # Lists entires in the kernel's MIG tablemac_check_syscall_shadow # Looks for shadow system call tablesmac_check_syscalls # Checks to see if system call table entries are hookedmac_check_sysctl # Checks for unknown sysctl handlersmac_check_trap_table # Checks to see if mach trap table entries are hookedmac_compressed_swap # Prints Mac OS X VM compressor stats and dumps all compressed pagesmac_contacts # Gets contact names from Contacts.appmac_dead_procs # Prints terminated/de-allocated processesmac_dead_sockets # Prints terminated/de-allocated network socketsmac_dead_vnodes # Lists freed vnode structuresmac_devfs # Lists files in the file cachemac_dmesg # Prints the kernel debug buffermac_dump_file # Dumps a specified filemac_dump_maps # Dumps memory ranges of process(es)mac_dyld_maps # Gets memory maps of processes from dyld data structuresmac_find_aslr_shift # Find the ASLR shift value for 10.8+ imagesmac_get_profile # Automatically detect Mac profilesmac_ifconfig # Lists network interface information for all devicesmac_interest_handlers # Lists IOKit Interest Handlersmac_ip_filters # Reports any hooked IP filtersmac_kernel_classes # Lists loaded c++ classes in the kernelmac_kevents # Show parent/child relationship of processesmac_keychaindump # Recovers possbile keychain keys. Use chainbreaker to open related keychain filesmac_ldrmodules # Compares the output of proc maps with the list of libraries from libdlmac_librarydump # Dumps the executable of a processmac_list_files # Lists files in the file cachemac_list_kauth_listeners # Lists Kauth Scope listenersmac_list_kauth_scopes # Lists Kauth Scopes and their statusmac_list_raw # List applications with promiscuous socketsmac_list_sessions # Enumerates sessionsmac_list_zones # Prints active zonesmac_lsmod # Lists loaded kernel modulesmac_lsmod_iokit # Lists loaded kernel modules through IOkitmac_lsmod_kext_map # Lists loaded kernel modulesmac_lsof # Lists per-process opened filesmac_machine_info # Prints machine information about the samplemac_malfind # Looks for suspicious process mappingsmac_memdump # Dump addressable memory pages to a filemac_moddump # Writes the specified kernel extension to diskmac_mount # Prints mounted device informationmac_netstat # Lists active per-process network connectionsmac_network_conns # Lists network connections from kernel network structuresmac_notesapp # Finds contents of Notes messagesmac_notifiers # Detects rootkits that add hooks into I/O Kit (e.g. LogKext)mac_orphan_threads # Lists threads that don't map back to known modules/processesmac_pgrp_hash_table # Walks the process group hash tablemac_pid_hash_table # Walks the pid hash tablemac_print_boot_cmdline # Prints kernel boot argumentsmac_proc_maps # Gets memory maps of processesmac_procdump # Dumps the executable of a processmac_psaux # Prints processes with arguments in user land (**argv)mac_psenv # Prints processes with environment in user land (**envp)mac_pslist # List Running Processesmac_pstree # Show parent/child relationship of processesmac_psxview # Find hidden processes with various process listingsmac_recover_filesystem # Recover the cached filesystemmac_route # Prints the routing tablemac_socket_filters # Reports socket filtersmac_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose)mac_tasks # List Active Tasksmac_threads # List Process Threadsmac_threads_simple # Lists threads along with their start time and prioritymac_timers # Reports timers set by kernel driversmac_trustedbsd # Lists malicious trustedbsd policiesmac_version # Prints the Mac versionmac_vfsevents # Lists processes filtering file system eventsmac_volshell # Shell in the memory imagemac_yarascan # Scan memory for yara signatures# Windows amcache # Print AmCache information apihooks # Detect API hooks in process and kernel memory atoms # Print session and window station atom tables atomscan # Pool scanner for atom tables auditpol # Prints out the Audit Policies from HKLM\SECURITY\Policy\PolAdtEv bigpools # Dump the big page pools using BigPagePoolScanner bioskbd # Reads the keyboard buffer from Real Mode memory cachedump # Dumps cached domain hashes from memory callbacks # Print system-wide notification routines clipboard # Extract the contents of the windows clipboard cmdline # Display process command-line arguments cmdscan # Extract command history by scanning for _COMMAND_HISTORY connections # Print list of open connections [Windows XP and 2003 Only] connscan # Pool scanner for tcp connections consoles # Extract command history by scanning for _CONSOLE_INFORMATION crashinfo # Dump crash-dump information deskscan # Poolscaner for tagDESKTOP (desktops) devicetree # Show device tree dlldump # Dump DLLs from a process address space dlllist # Print list of loaded dlls for each process driverirp # Driver IRP hook detection drivermodule # Associate driver objects to kernel modules driverscan # Pool scanner for driver objects dumpcerts # Dump RSA private and public SSL keys dumpfiles # Extract memory mapped and cached files dumpregistry # Dumps registry files out to disk editbox # Displays information about Edit controls. (Listbox experimental.) envars # Display process environment variables eventhooks # Print details on windows event hooks evtlogs # Extract Windows Event Logs (XP/2003 only) filescan # Pool scanner for file objects gahti # Dump the USER handle type information gditimers # Print installed GDI timers and callbacks gdt # Display Global Descriptor Table getservicesids # Get the names of services in the Registry and return Calculated SID getsids # Print the SIDs owning each process handles # Print list of open handles for each process hashdump # Dumps passwords hashes (LM/NTLM) from memory hibinfo # Dump hibernation file information hivedump # Prints out a hive hivelist # Print list of registry hives. hivescan # Pool scanner for registry hives hpakextract # Extract physical memory from an HPAK file hpakinfo # Info on an HPAK file idt # Display Interrupt Descriptor Table iehistory # Reconstruct Internet Explorer cache / history imagecopy # Copies a physical address space out as a raw DD image imageinfo # Identify information for the image impscan # Scan for calls to imported functions joblinks # Print process job link information kdbgscan # Search for and dump potential KDBG values kpcrscan # Search for and dump potential KPCR values ldrmodules # Detect unlinked DLLs limeinfo # Dump Lime file format information lsadump # Dump (decrypted) LSA secrets from the registry machoinfo # Dump Mach-O file format information malfind # Find hidden and injected code mbrparser # Scans for and parses potential Master Boot Records (MBRs) memdump # Dump the addressable memory for a process memmap # Print the memory map messagehooks # List desktop and thread window message hooks mftparser # Scans for and parses potential MFT entries moddump # Dump a kernel driver to an executable file sample modscan # Pool scanner for kernel modules modules # Print list of loaded modules multiscan # Scan for various objects at once mutantscan # Pool scanner for mutex objects netscan # Scan a Vista (or later) image for connections and sockets notepad # List currently displayed notepad text objtypescan # Scan for Windows object type objects patcher # Patches memory based on page scans poolpeek # Configurable pool scanner plugin pooltracker # Show a summary of pool tag usage printkey # Print a registry key, and its subkeys and values privs # Display process privileges procdump # Dump a process to an executable file sample pslist # Print all running processes by following the EPROCESS lists psscan # Pool scanner for process objects pstree # Print process list as a tree psxview # Find hidden processes with various process listings qemuinfo # Dump Qemu information raw2dmp # Converts a physical memory sample to a windbg crash dump screenshot # Save a pseudo-screenshot based on GDI windows servicediff # List Windows services (ala Plugx) sessions # List details on _MM_SESSION_SPACE (user logon sessions) shellbags # Prints ShellBags info shimcache # Parses the Application Compatibility Shim Cache registry key shutdowntime # Print ShutdownTime of machine from registry sockets # Print list of open sockets sockscan # Pool scanner for tcp socket objects ssdt # Display SSDT entries strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) svcscan # Scan for Windows services symlinkscan # Pool scanner for symlink objects thrdscan # Pool scanner for thread objects threads # Investigate _ETHREAD and _KTHREADs timeliner # Creates a timeline from various artifacts in memory timers # Print kernel timers and associated module DPCs truecryptmaster # Recover TrueCrypt 7.1a Master Keys truecryptpassphrase # TrueCrypt Cached Passphrase Finder truecryptsummary # TrueCrypt Summary unloadedmodules # Print list of unloaded modules userassist # Print userassist registry keys and information userhandles # Dump the USER handle tables vaddump # Dumps out the vad sections to a file vadinfo # Dump the VAD info vadtree # Walk the VAD tree and display in tree format vadwalk # Walk the VAD tree vboxinfo # Dump virtualbox information verinfo # Prints out the version information from PE images vmwareinfo # Dump VMware VMSS/VMSN information volshell # Shell in the memory image win10cookie # Find the ObHeaderCookie value for Windows 10 windows # Print Desktop Windows (verbose details) wintree # Print Z-Order Desktop Windows Tree wndscan # Pool scanner for window stations yarascan # Scan process or kernel memory with Yara signatures # Linux linux_apihooks # Checks for userland apihooks linux_arp # Print the ARP table linux_aslr_shift # Automatically detect the Linux ASLR shift linux_banner # Prints the Linux banner information linux_bash # Recover bash history from bash process memory linux_bash_env # Recover a process' dynamic environment variables linux_bash_hash # Recover bash hash table from bash process memory linux_check_afinfo # Verifies the operation function pointers of network protocols linux_check_creds # Checks if any processes are sharing credential structures linux_check_evt_arm # Checks the Exception Vector Table to look for syscall table hooking linux_check_fop # Check file operation structures for rootkit modifications linux_check_idt # Checks if the IDT has been altered linux_check_inline_kernel # Check for inline kernel hooks linux_check_modules # Compares module list to sysfs info, if available linux_check_syscall # Checks if the system call table has been altered linux_check_syscall_arm # Checks if the system call table has been altered linux_check_tty # Checks tty devices for hooks linux_cpuinfo # Prints info about each active processor linux_dentry_cache # Gather files from the dentry cache linux_dmesg # Gather dmesg buffer linux_dump_map # Writes selected memory mappings to disk linux_dynamic_env # Recover a process' dynamic environment variables linux_elfs # Find ELF binaries in process mappings linux_enumerate_files # Lists files referenced by the filesystem cache linux_find_file # Lists and recovers files from memory linux_getcwd # Lists current working directory of each process linux_hidden_modules # Carves memory to find hidden kernel modules linux_ifconfig # Gathers active interfaces linux_info_regs # It's like 'info registers' in GDB. It prints out all the linux_iomem # Provides output similar to /proc/iomem linux_kernel_opened_files # Lists files that are opened from within the kernel linux_keyboard_notifiers # Parses the keyboard notifier call chain linux_ldrmodules # Compares the output of proc maps with the list of libraries from libdl linux_library_list # Lists libraries loaded into a process linux_librarydump # Dumps shared libraries in process memory to disk linux_list_raw # List applications with promiscuous sockets linux_lsmod # Gather loaded kernel modules linux_lsof # Lists file descriptors and their path linux_malfind # Looks for suspicious process mappings linux_memmap # Dumps the memory map for linux tasks linux_moddump # Extract loaded kernel modules linux_mount # Gather mounted fs/devices linux_mount_cache # Gather mounted fs/devices from kmem_cache linux_netfilter # Lists Netfilter hooks linux_netscan # Carves for network connection structures linux_netstat # Lists open sockets linux_pidhashtable # Enumerates processes through the PID hash table linux_pkt_queues # Writes per-process packet queues out to disk linux_plthook # Scan ELF binaries' PLT for hooks to non-NEEDED images linux_proc_maps # Gathers process memory maps linux_proc_maps_rb # Gathers process maps for linux through the mappings red-black tree linux_procdump # Dumps a process's executable image to disk linux_process_hollow # Checks for signs of process hollowing linux_psaux # Gathers processes along with full command line and start time linux_psenv # Gathers processes along with their static environment variables linux_pslist # Gather active tasks by walking the task_struct->task list linux_pslist_cache # Gather tasks from the kmem_cache linux_psscan # Scan physical memory for processes linux_pstree # Shows the parent/child relationship between processes linux_psxview # Find hidden processes with various process listings linux_recover_filesystem # Recovers the entire cached file system from memory linux_route_cache # Recovers the routing cache from memory linux_sk_buff_cache # Recovers packets from the sk_buff kmem_cache linux_slabinfo # Mimics /proc/slabinfo on a running machine linux_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) linux_threads # Prints threads of processes linux_tmpfs # Recovers tmpfs filesystems from memory linux_truecrypt_passphrase # Recovers cached Truecrypt passphrases linux_vma_cache # Gather VMAs from the vm_area_struct cache linux_volshell # Shell in the memory image linux_yarascan # A shell in the Linux memory image # MAC mac_adium # Lists Adium messages mac_apihooks # Checks for API hooks in processes mac_apihooks_kernel # Checks to see if system call and kernel functions are hooked mac_arp # Prints the arp table mac_bash # Recover bash history from bash process memory mac_bash_env # Recover bash's environment variables mac_bash_hash # Recover bash hash table from bash process memory mac_calendar # Gets calendar events from Calendar.app mac_check_fop # Validate File Operation Pointers mac_check_mig_table # Lists entires in the kernel's MIG table mac_check_syscall_shadow # Looks for shadow system call tables mac_check_syscalls # Checks to see if system call table entries are hooked mac_check_sysctl # Checks for unknown sysctl handlers mac_check_trap_table # Checks to see if mach trap table entries are hooked mac_compressed_swap # Prints Mac OS X VM compressor stats and dumps all compressed pages mac_contacts # Gets contact names from Contacts.app mac_dead_procs # Prints terminated/de-allocated processes mac_dead_sockets # Prints terminated/de-allocated network sockets mac_dead_vnodes # Lists freed vnode structures mac_devfs # Lists files in the file cache mac_dmesg # Prints the kernel debug buffer mac_dump_file # Dumps a specified file mac_dump_maps # Dumps memory ranges of process(es) mac_dyld_maps # Gets memory maps of processes from dyld data structures mac_find_aslr_shift # Find the ASLR shift value for 10.8+ images mac_get_profile # Automatically detect Mac profiles mac_ifconfig # Lists network interface information for all devices mac_interest_handlers # Lists IOKit Interest Handlers mac_ip_filters # Reports any hooked IP filters mac_kernel_classes # Lists loaded c++ classes in the kernel mac_kevents # Show parent/child relationship of processes mac_keychaindump # Recovers possbile keychain keys. Use chainbreaker to open related keychain files mac_ldrmodules # Compares the output of proc maps with the list of libraries from libdl mac_librarydump # Dumps the executable of a process mac_list_files # Lists files in the file cache mac_list_kauth_listeners # Lists Kauth Scope listeners mac_list_kauth_scopes # Lists Kauth Scopes and their status mac_list_raw # List applications with promiscuous sockets mac_list_sessions # Enumerates sessions mac_list_zones # Prints active zones mac_lsmod # Lists loaded kernel modules mac_lsmod_iokit # Lists loaded kernel modules through IOkit mac_lsmod_kext_map # Lists loaded kernel modules mac_lsof # Lists per-process opened files mac_machine_info # Prints machine information about the sample mac_malfind # Looks for suspicious process mappings mac_memdump # Dump addressable memory pages to a file mac_moddump # Writes the specified kernel extension to disk mac_mount # Prints mounted device information mac_netstat # Lists active per-process network connections mac_network_conns # Lists network connections from kernel network structures mac_notesapp # Finds contents of Notes messages mac_notifiers # Detects rootkits that add hooks into I/O Kit (e.g. LogKext) mac_orphan_threads # Lists threads that don't map back to known modules/processes mac_pgrp_hash_table # Walks the process group hash table mac_pid_hash_table # Walks the pid hash table mac_print_boot_cmdline # Prints kernel boot arguments mac_proc_maps # Gets memory maps of processes mac_procdump # Dumps the executable of a process mac_psaux # Prints processes with arguments in user land (**argv) mac_psenv # Prints processes with environment in user land (**envp) mac_pslist # List Running Processes mac_pstree # Show parent/child relationship of processes mac_psxview # Find hidden processes with various process listings mac_recover_filesystem # Recover the cached filesystem mac_route # Prints the routing table mac_socket_filters # Reports socket filters mac_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) mac_tasks # List Active Tasks mac_threads # List Process Threads mac_threads_simple # Lists threads along with their start time and priority mac_timers # Reports timers set by kernel drivers mac_trustedbsd # Lists malicious trustedbsd policies mac_version # Prints the Mac version mac_vfsevents # Lists processes filtering file system events mac_volshell # Shell in the memory image mac_yarascan # Scan memory for yara signatures# Windows amcache # Print AmCache information apihooks # Detect API hooks in process and kernel memory atoms # Print session and window station atom tables atomscan # Pool scanner for atom tables auditpol # Prints out the Audit Policies from HKLM\SECURITY\Policy\PolAdtEv bigpools # Dump the big page pools using BigPagePoolScanner bioskbd # Reads the keyboard buffer from Real Mode memory cachedump # Dumps cached domain hashes from memory callbacks # Print system-wide notification routines clipboard # Extract the contents of the windows clipboard cmdline # Display process command-line arguments cmdscan # Extract command history by scanning for _COMMAND_HISTORY connections # Print list of open connections [Windows XP and 2003 Only] connscan # Pool scanner for tcp connections consoles # Extract command history by scanning for _CONSOLE_INFORMATION crashinfo # Dump crash-dump information deskscan # Poolscaner for tagDESKTOP (desktops) devicetree # Show device tree dlldump # Dump DLLs from a process address space dlllist # Print list of loaded dlls for each process driverirp # Driver IRP hook detection drivermodule # Associate driver objects to kernel modules driverscan # Pool scanner for driver objects dumpcerts # Dump RSA private and public SSL keys dumpfiles # Extract memory mapped and cached files dumpregistry # Dumps registry files out to disk editbox # Displays information about Edit controls. (Listbox experimental.) envars # Display process environment variables eventhooks # Print details on windows event hooks evtlogs # Extract Windows Event Logs (XP/2003 only) filescan # Pool scanner for file objects gahti # Dump the USER handle type information gditimers # Print installed GDI timers and callbacks gdt # Display Global Descriptor Table getservicesids # Get the names of services in the Registry and return Calculated SID getsids # Print the SIDs owning each process handles # Print list of open handles for each process hashdump # Dumps passwords hashes (LM/NTLM) from memory hibinfo # Dump hibernation file information hivedump # Prints out a hive hivelist # Print list of registry hives. hivescan # Pool scanner for registry hives hpakextract # Extract physical memory from an HPAK file hpakinfo # Info on an HPAK file idt # Display Interrupt Descriptor Table iehistory # Reconstruct Internet Explorer cache / history imagecopy # Copies a physical address space out as a raw DD image imageinfo # Identify information for the image impscan # Scan for calls to imported functions joblinks # Print process job link information kdbgscan # Search for and dump potential KDBG values kpcrscan # Search for and dump potential KPCR values ldrmodules # Detect unlinked DLLs limeinfo # Dump Lime file format information lsadump # Dump (decrypted) LSA secrets from the registry machoinfo # Dump Mach-O file format information malfind # Find hidden and injected code mbrparser # Scans for and parses potential Master Boot Records (MBRs) memdump # Dump the addressable memory for a process memmap # Print the memory map messagehooks # List desktop and thread window message hooks mftparser # Scans for and parses potential MFT entries moddump # Dump a kernel driver to an executable file sample modscan # Pool scanner for kernel modules modules # Print list of loaded modules multiscan # Scan for various objects at once mutantscan # Pool scanner for mutex objects netscan # Scan a Vista (or later) image for connections and sockets notepad # List currently displayed notepad text objtypescan # Scan for Windows object type objects patcher # Patches memory based on page scans poolpeek # Configurable pool scanner plugin pooltracker # Show a summary of pool tag usage printkey # Print a registry key, and its subkeys and values privs # Display process privileges procdump # Dump a process to an executable file sample pslist # Print all running processes by following the EPROCESS lists psscan # Pool scanner for process objects pstree # Print process list as a tree psxview # Find hidden processes with various process listings qemuinfo # Dump Qemu information raw2dmp # Converts a physical memory sample to a windbg crash dump screenshot # Save a pseudo-screenshot based on GDI windows servicediff # List Windows services (ala Plugx) sessions # List details on _MM_SESSION_SPACE (user logon sessions) shellbags # Prints ShellBags info shimcache # Parses the Application Compatibility Shim Cache registry key shutdowntime # Print ShutdownTime of machine from registry sockets # Print list of open sockets sockscan # Pool scanner for tcp socket objects ssdt # Display SSDT entries strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) svcscan # Scan for Windows services symlinkscan # Pool scanner for symlink objects thrdscan # Pool scanner for thread objects threads # Investigate _ETHREAD and _KTHREADs timeliner # Creates a timeline from various artifacts in memory timers # Print kernel timers and associated module DPCs truecryptmaster # Recover TrueCrypt 7.1a Master Keys truecryptpassphrase # TrueCrypt Cached Passphrase Finder truecryptsummary # TrueCrypt Summary unloadedmodules # Print list of unloaded modules userassist # Print userassist registry keys and information userhandles # Dump the USER handle tables vaddump # Dumps out the vad sections to a file vadinfo # Dump the VAD info vadtree # Walk the VAD tree and display in tree format vadwalk # Walk the VAD tree vboxinfo # Dump virtualbox information verinfo # Prints out the version information from PE images vmwareinfo # Dump VMware VMSS/VMSN information volshell # Shell in the memory image win10cookie # Find the ObHeaderCookie value for Windows 10 windows # Print Desktop Windows (verbose details) wintree # Print Z-Order Desktop Windows Tree wndscan # Pool scanner for window stations yarascan # Scan process or kernel memory with Yara signatures # Linux linux_apihooks # Checks for userland apihooks linux_arp # Print the ARP table linux_aslr_shift # Automatically detect the Linux ASLR shift linux_banner # Prints the Linux banner information linux_bash # Recover bash history from bash process memory linux_bash_env # Recover a process' dynamic environment variables linux_bash_hash # Recover bash hash table from bash process memory linux_check_afinfo # Verifies the operation function pointers of network protocols linux_check_creds # Checks if any processes are sharing credential structures linux_check_evt_arm # Checks the Exception Vector Table to look for syscall table hooking linux_check_fop # Check file operation structures for rootkit modifications linux_check_idt # Checks if the IDT has been altered linux_check_inline_kernel # Check for inline kernel hooks linux_check_modules # Compares module list to sysfs info, if available linux_check_syscall # Checks if the system call table has been altered linux_check_syscall_arm # Checks if the system call table has been altered linux_check_tty # Checks tty devices for hooks linux_cpuinfo # Prints info about each active processor linux_dentry_cache # Gather files from the dentry cache linux_dmesg # Gather dmesg buffer linux_dump_map # Writes selected memory mappings to disk linux_dynamic_env # Recover a process' dynamic environment variables linux_elfs # Find ELF binaries in process mappings linux_enumerate_files # Lists files referenced by the filesystem cache linux_find_file # Lists and recovers files from memory linux_getcwd # Lists current working directory of each process linux_hidden_modules # Carves memory to find hidden kernel modules linux_ifconfig # Gathers active interfaces linux_info_regs # It's like 'info registers' in GDB. It prints out all the linux_iomem # Provides output similar to /proc/iomem linux_kernel_opened_files # Lists files that are opened from within the kernel linux_keyboard_notifiers # Parses the keyboard notifier call chain linux_ldrmodules # Compares the output of proc maps with the list of libraries from libdl linux_library_list # Lists libraries loaded into a process linux_librarydump # Dumps shared libraries in process memory to disk linux_list_raw # List applications with promiscuous sockets linux_lsmod # Gather loaded kernel modules linux_lsof # Lists file descriptors and their path linux_malfind # Looks for suspicious process mappings linux_memmap # Dumps the memory map for linux tasks linux_moddump # Extract loaded kernel modules linux_mount # Gather mounted fs/devices linux_mount_cache # Gather mounted fs/devices from kmem_cache linux_netfilter # Lists Netfilter hooks linux_netscan # Carves for network connection structures linux_netstat # Lists open sockets linux_pidhashtable # Enumerates processes through the PID hash table linux_pkt_queues # Writes per-process packet queues out to disk linux_plthook # Scan ELF binaries' PLT for hooks to non-NEEDED images linux_proc_maps # Gathers process memory maps linux_proc_maps_rb # Gathers process maps for linux through the mappings red-black tree linux_procdump # Dumps a process's executable image to disk linux_process_hollow # Checks for signs of process hollowing linux_psaux # Gathers processes along with full command line and start time linux_psenv # Gathers processes along with their static environment variables linux_pslist # Gather active tasks by walking the task_struct->task list linux_pslist_cache # Gather tasks from the kmem_cache linux_psscan # Scan physical memory for processes linux_pstree # Shows the parent/child relationship between processes linux_psxview # Find hidden processes with various process listings linux_recover_filesystem # Recovers the entire cached file system from memory linux_route_cache # Recovers the routing cache from memory linux_sk_buff_cache # Recovers packets from the sk_buff kmem_cache linux_slabinfo # Mimics /proc/slabinfo on a running machine linux_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) linux_threads # Prints threads of processes linux_tmpfs # Recovers tmpfs filesystems from memory linux_truecrypt_passphrase # Recovers cached Truecrypt passphrases linux_vma_cache # Gather VMAs from the vm_area_struct cache linux_volshell # Shell in the memory image linux_yarascan # A shell in the Linux memory image # MAC mac_adium # Lists Adium messages mac_apihooks # Checks for API hooks in processes mac_apihooks_kernel # Checks to see if system call and kernel functions are hooked mac_arp # Prints the arp table mac_bash # Recover bash history from bash process memory mac_bash_env # Recover bash's environment variables mac_bash_hash # Recover bash hash table from bash process memory mac_calendar # Gets calendar events from Calendar.app mac_check_fop # Validate File Operation Pointers mac_check_mig_table # Lists entires in the kernel's MIG table mac_check_syscall_shadow # Looks for shadow system call tables mac_check_syscalls # Checks to see if system call table entries are hooked mac_check_sysctl # Checks for unknown sysctl handlers mac_check_trap_table # Checks to see if mach trap table entries are hooked mac_compressed_swap # Prints Mac OS X VM compressor stats and dumps all compressed pages mac_contacts # Gets contact names from Contacts.app mac_dead_procs # Prints terminated/de-allocated processes mac_dead_sockets # Prints terminated/de-allocated network sockets mac_dead_vnodes # Lists freed vnode structures mac_devfs # Lists files in the file cache mac_dmesg # Prints the kernel debug buffer mac_dump_file # Dumps a specified file mac_dump_maps # Dumps memory ranges of process(es) mac_dyld_maps # Gets memory maps of processes from dyld data structures mac_find_aslr_shift # Find the ASLR shift value for 10.8+ images mac_get_profile # Automatically detect Mac profiles mac_ifconfig # Lists network interface information for all devices mac_interest_handlers # Lists IOKit Interest Handlers mac_ip_filters # Reports any hooked IP filters mac_kernel_classes # Lists loaded c++ classes in the kernel mac_kevents # Show parent/child relationship of processes mac_keychaindump # Recovers possbile keychain keys. Use chainbreaker to open related keychain files mac_ldrmodules # Compares the output of proc maps with the list of libraries from libdl mac_librarydump # Dumps the executable of a process mac_list_files # Lists files in the file cache mac_list_kauth_listeners # Lists Kauth Scope listeners mac_list_kauth_scopes # Lists Kauth Scopes and their status mac_list_raw # List applications with promiscuous sockets mac_list_sessions # Enumerates sessions mac_list_zones # Prints active zones mac_lsmod # Lists loaded kernel modules mac_lsmod_iokit # Lists loaded kernel modules through IOkit mac_lsmod_kext_map # Lists loaded kernel modules mac_lsof # Lists per-process opened files mac_machine_info # Prints machine information about the sample mac_malfind # Looks for suspicious process mappings mac_memdump # Dump addressable memory pages to a file mac_moddump # Writes the specified kernel extension to disk mac_mount # Prints mounted device information mac_netstat # Lists active per-process network connections mac_network_conns # Lists network connections from kernel network structures mac_notesapp # Finds contents of Notes messages mac_notifiers # Detects rootkits that add hooks into I/O Kit (e.g. LogKext) mac_orphan_threads # Lists threads that don't map back to known modules/processes mac_pgrp_hash_table # Walks the process group hash table mac_pid_hash_table # Walks the pid hash table mac_print_boot_cmdline # Prints kernel boot arguments mac_proc_maps # Gets memory maps of processes mac_procdump # Dumps the executable of a process mac_psaux # Prints processes with arguments in user land (**argv) mac_psenv # Prints processes with environment in user land (**envp) mac_pslist # List Running Processes mac_pstree # Show parent/child relationship of processes mac_psxview # Find hidden processes with various process listings mac_recover_filesystem # Recover the cached filesystem mac_route # Prints the routing table mac_socket_filters # Reports socket filters mac_strings # Match physical offsets to virtual addresses (may take a while, VERY verbose) mac_tasks # List Active Tasks mac_threads # List Process Threads mac_threads_simple # Lists threads along with their start time and priority mac_timers # Reports timers set by kernel drivers mac_trustedbsd # Lists malicious trustedbsd policies mac_version # Prints the Mac version mac_vfsevents # Lists processes filtering file system events mac_volshell # Shell in the memory image mac_yarascan # Scan memory for yara signatures