MCP cover image
See in Github
2025-04-05

波动率3 MCP服务器用于自动化内存取证

1

Github Watches

0

Github Forks

2

Github Stars

Volatility3 MCP Server

Introduction

Volatility3 MCP Server is a powerful tool that connects MCP clients like Claude Desktop with Volatility3, the advanced memory forensics framework. This integration allows LLMs to analyze memory dumps, detect malware, and perform sophisticated memory forensics tasks through a simple, conversational interface.

What This Solves

Memory forensics is a complex field that typically requires specialized knowledge and command-line expertise. This project bridges that gap by:

  • Allowing non-experts to perform memory forensics through natural language
  • Enabling LLMs to directly analyze memory dumps and provide insights
  • Automating common forensic workflows that would normally require multiple manual steps
  • Making memory forensics more accessible and user-friendly

Features

  • Memory Dump Analysis: Analyze Windows and Linux memory dumps using various plugins
  • Process Inspection: List running processes, examine their details, and identify suspicious activity
  • Network Analysis: Examine network connections to detect command and control servers
  • Cross-Platform Support: Works with both Windows and Linux memory dumps (macOS support coming soon)
  • Malware Detection: Scan memory with YARA rules to identify known malware signatures

Demo

Demo Video

Configuration

  1. Clone this repository:
  2. Create a virtual environment:
    python -m venv environ
    source environ/bin/activate
    
  3. Install the required dependencies:
    pip install -r requirements.txt
    

You can use this project in two ways:

Option 1: With Claude Desktop

  1. Configure Claude Desktop:
    • Go to Claude -> Settings -> Developer -> Edit Config -> claude_desktop_config.json and add the following
         {
             "mcpServers": {
             "volatility3": {
                 "command": "absolute/path/to/virtual/environment/bin/python3",
                 "args": [
                 "absolute/path/to/bridge_mcp_volatility.py"
                 ]
             }
             }
         }
      
      Tools available in Claude Desktop
  2. Restart Claude Desktop and begin analyzing the memory dumps.

Option 2: With Cursor (SSE Server)

  1. Start the SSE server:
    python3 start_sse_server.py
    
  2. Configure Cursor to use the SSE server:
    • Open Cursor settings
    • Navigate to Features -> MCP Servers
    • Add a new MCP server with the URL http://127.0.0.1:8080/sse Cursor Composer
  3. Use the Cursor Composer in agent mode and begin analyzing memory dumps.

Available Tools

  • initialize_memory_file: Set up a memory dump file for analysis
  • detect_os: Identify the operating system of the memory dump
  • list_plugins: Display all available Volatility3 plugins
  • get_plugin_info: Get detailed information about a specific plugin
  • run_plugin: Execute any Volatility3 plugin with custom arguments
  • get_processes: List all running processes in the memory dump
  • get_network_connections: View all network connections from the system
  • list_process_open_handles: Examine files and resources accessed by a process
  • scan_with_yara: Scan memory for malicious patterns using YARA rules

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

相关推荐

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • Contraband Interactive
  • Emulating Dr. Jordan B. Peterson's style in providing life advice and insights.

  • rustassistant.com
  • Your go-to expert in the Rust ecosystem, specializing in precise code interpretation, up-to-date crate version checking, and in-depth source code analysis. I offer accurate, context-aware insights for all your Rust programming questions.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Alexandru Strujac
  • Efficient thumbnail creator for YouTube videos

  • lumpenspace
  • Take an adjectivised noun, and create images making it progressively more adjective!

  • apappascs
  • 发现市场上最全面,最新的MCP服务器集合。该存储库充当集中式枢纽,提供了广泛的开源和专有MCP服务器目录,并提供功能,文档链接和贡献者。

  • modelcontextprotocol
  • 模型上下文协议服务器

  • Mintplex-Labs
  • 带有内置抹布,AI代理,无代理构建器,MCP兼容性等的多合一桌面和Docker AI应用程序。

  • ShrimpingIt
  • MCP系列GPIO Expander的基于Micropython I2C的操作,源自ADAFRUIT_MCP230XX

  • n8n-io
  • 具有本机AI功能的公平代码工作流程自动化平台。将视觉构建与自定义代码,自宿主或云相结合,400+集成。

  • open-webui
  • 用户友好的AI接口(支持Ollama,OpenAi API,...)

  • WangRongsheng
  • 🧑‍🚀 llm 资料总结(数据处理、模型训练、模型部署、 o1 模型、mcp 、小语言模型、视觉语言模型)|摘要世界上最好的LLM资源。

  • metorial
  • 数百个MCP服务器的容器化版本📡📡

  • ravitemer
  • 一个功能强大的Neovim插件,用于管理MCP(模型上下文协议)服务器

    Reviews

    4 (1)
    Avatar
    user_BcMQff4a
    2025-04-17

    As an avid user of MCP applications, I must say that Volatility3-MCP by Kirandawadi is an exceptional tool. It offers robust functionality for memory forensics and has significantly streamlined my workflow. The interface is user-friendly and the support from the community is outstanding. Check it out here: https://github.com/Kirandawadi/volatility3-mcp.