EN
ENNA

bulk_extractor vs Volatility 3

GitHub Stats

1.4k
Stars
4.0k
216
Forks
642
133
Issues
125
2mo ago
Updated
5d ago
-
License
-
C++
Language
Python

About bulk_extractor

bulk_extractor is a high-performance digital forensics tool that scans disk images, files, or directories and extracts useful information without parsing the file system or file system structures. It finds email addresses, URLs, credit card numbers, JPEG images, JSON fragments, GPS coordinates, Windows registry fragments, AES keys, and other artifacts by scanning raw data. This approach means it can recover data from unallocated space, slack space, compressed archives, and even encrypted volumes where the key is present in memory. bulk_extractor operates on the raw bytes of the input, dividing it into pages that are processed in parallel across all available CPU cores, making it extremely fast - often 10x faster than other carving tools. Its output consists of feature files that can be analyzed with tools like the included bulk_diff utility or imported into other analysis platforms.

About Volatility 3

Volatility 3 is the next-generation memory forensics framework. It is a completely rewritten version of the Volatility Framework, designed for speed and reliability. It extracts digital artifacts from volatile memory (RAM) samples, enabling investigators to analyze running processes, network connections, registry keys, loaded modules, and more. It supports Windows, Linux, and macOS memory dumps and is the standard tool for memory forensics in digital investigations and incident response.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

bulk_extractor only

data-carvingdisk-forensicsemail-extractionparallelunallocated-space

Volatility 3 only

memoryram-dumpartifact-extractionincident-response