diff --git a/thirdparty/Volatility/AUTHORS-2.5.txt b/thirdparty/Volatility/AUTHORS-2.5.txt
deleted file mode 100644
index d01f09405fcbfca870f7ee264e4636766173f944..0000000000000000000000000000000000000000
--- a/thirdparty/Volatility/AUTHORS-2.5.txt
+++ /dev/null
@@ -1,42 +0,0 @@
-===============================================
-This file identifies core Volatility authors. 
-
-All lists are alphabetical. 
-===============================================
-
-Volatility 2.4, 2.5:
-------------
-
-Mike Auty
-Andrew Case
-Michael Hale Ligh
-Jamie Levy
-AAron Walters
-
-Volatility 2.0, 2.1, 2.2, 2.3:
-------------
-
-Mike Auty
-Andrew Case
-Michael Cohen
-Brendan Dolan-Gavitt
-Michael Hale Ligh
-Jamie Levy
-AAron Walters
-
-Volatility 1.3:
-------------
-
-AAron Walters <awalters@4tphi.net>
-Volatile Systems LLC
-
-Brendan Dolan-Gavitt <bdolangavitt@wesleyan.edu>
-
-Volatools Basic authors:
-------------
-
-AAron Walters 
-Komoku, Inc.
-
-Nick L. Petroni, Jr.
-Komoku, Inc.
diff --git a/thirdparty/Volatility/CREDITS-2.5.txt b/thirdparty/Volatility/CREDITS-2.5.txt
deleted file mode 100644
index 26082de49db58b9144187d0497dd2e127d10fb1d..0000000000000000000000000000000000000000
--- a/thirdparty/Volatility/CREDITS-2.5.txt
+++ /dev/null
@@ -1,105 +0,0 @@
-===============================================
-We would like to acknowledge individuals that 
-have made significant contributions, code, or 
-ideas toward the respective volatility releases. 
-
-All lists are alphabetical. 
-
-These lists exclude the core Volatility authors, 
-who are identified in AUTHORS.txt. 
-
-If you believe you've been left off, it is not 
-intentional. Please bring it to our attention!
-===============================================
-
-Volatility 2.5: 
-
-Adam Bridge for adding a --count option (humanly readable byte stats) to imagecopy/raw2dmp
-Sebastien Bourdon-Richard for various patches and bug fixes
-Bruno Constanzo for various patches to enhance performance/optimization 
-Glenn P. Edwards, Jr for adding combined user/kernel scans, --case, and ascii/unicode options to yarascan
-@f-s-p for converting some plugins to unfied output format
-Cem Gurkok for submitting the mac_threads plugin
-Takahiro Haruyama for noticing and fixing a bug in impscan
-@masdif for contributing a fix for kernel 3.7+ in linux/module.c
-Wyatt Roersma for converting a large number of plugins to the unified output format
-Karl Vogel for pointing out an issue with IPv4 addresses on big endian systems
-
-Volatility 2.4:
-
-Steven Adair for assistance identifying a large memory PAE bug
-Sebastien Bourdon-Richard for his work on the VMware vmem/vmss split (with meta) AS 
-Justin Capella and Espen Olsen for their work on the Qemu ELF core dumps
-Cem Gurkok for help updating Mac OS X support for 10.9
-Matt McCormack for supplying a patch to rebase dumped PE files
-Stewart McIntyre for extending apihooks for detecting JMP FAR instructions
-Kevin Marker for contributing over 160 standard build Linux profiles 
-synack33 for creating various Mac OS X profiles, including initial ones for 10.10
-Raphaƫl Vinot for his patch to fix IPython within volshell
-
-Volatility 2.3:
-
-Cem Gurkok for his work on the privileges plugin for Windows
-Nir Izraeli for his work on the VMware snapshot address space (see also the vmsnparser project)
-@osxmem of the volafox project (Mac OS X & BSD Memory Analysis Toolkit)
-@osxreverser of reverse.put.as for his help with OSX memory analysis
-Carl Pulley for numerous bug reports, example patches, and plugin testing
-Andreas Schuster for his work on poison ivy plugins for Windows
-Joe Sylve for his work on the ARM address space and significant contributions to linux and mac capabilities
-Philippe Teuwen for his work on the virtual box address space
-Santiago Vicente for his work on the citadel plugins for Windows
-
-Volatility 2.2:
-------------
-
-Joe Sylve
-
-Volatility 2.1:
-------------
-
---- 
-
-Volatility 2.0:
-------------
-
-Frank Boldewin 
-Carl Pulley
-Andreas Schuster
-Bradley Schatz
-
-Volatility 1.3:
-------------
-
-Harlan Carvey
-Michael Cohen
-David Collett
-Brendan Dolan-Gavitt 
-Andreas Schuster
-Matthieu Suiche
-
-We would also like to acknowledge those who have provided valuable
-feedback, bug reports, and testing:
-
-Jide Abu
-Joseph Ayo Akinyele
-Tommaso Assandri
-Richard Austin
-Cameron C Caffee
-Eoghan Casey
-Angelo Cavallini
-Andre' DiMino
-Jon Evans
-Robert Guess
-Christian Herndler
-jeremie0
-Eugene Libster
-Erik Ligda
-Robert Lowe
-Tony Martin
-Timothy Morgan
-Bryan D. Payne
-Golden G. Richard III
-Wyatt Roersma
-RB
-Sam F. Stover
-Marko Thure
diff --git a/thirdparty/Volatility/LEGAL-2.5.txt b/thirdparty/Volatility/LEGAL-2.5.txt
deleted file mode 100644
index 69924bcab351af5fe57ffd078faa0a2a5b494937..0000000000000000000000000000000000000000
--- a/thirdparty/Volatility/LEGAL-2.5.txt
+++ /dev/null
@@ -1,20 +0,0 @@
-Volatility
-===============
-
-License
--------
-
-Copyright (C) 2007-2013 Volatility Foundation
-
-Volatility is free software; you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
-(at your option) any later version.
-
-Volatility is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with Volatility.  If not, see <http://www.gnu.org/licenses/>.
diff --git a/thirdparty/Volatility/LICENSE-2.5.txt b/thirdparty/Volatility/LICENSE-2.5.txt
deleted file mode 100644
index fa6a77d4a4564648ee9c360a9f8e2d7cb2fe1f7a..0000000000000000000000000000000000000000
--- a/thirdparty/Volatility/LICENSE-2.5.txt
+++ /dev/null
@@ -1,281 +0,0 @@
-		    GNU GENERAL PUBLIC LICENSE
-		       Version 2, June 1991
-
- Copyright (C) 1989, 1991 Free Software Foundation, Inc.
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-			    Preamble
-
-  The licenses for most software are designed to take away your
-freedom to share and change it.  By contrast, the GNU General Public
-License is intended to guarantee your freedom to share and change free
-software--to make sure the software is free for all its users.  This
-General Public License applies to most of the Free Software
-Foundation's software and to any other program whose authors commit to
-using it.  (Some other Free Software Foundation software is covered by
-the GNU Library General Public License instead.)  You can apply it to
-your programs, too.
-
-  When we speak of free software, we are referring to freedom, not
-price.  Our General Public Licenses are designed to make sure that you
-have the freedom to distribute copies of free software (and charge for
-this service if you wish), that you receive source code or can get it
-if you want it, that you can change the software or use pieces of it
-in new free programs; and that you know you can do these things.
-
-  To protect your rights, we need to make restrictions that forbid
-anyone to deny you these rights or to ask you to surrender the rights.
-These restrictions translate to certain responsibilities for you if you
-distribute copies of the software, or if you modify it.
-
-  For example, if you distribute copies of such a program, whether
-gratis or for a fee, you must give the recipients all the rights that
-you have.  You must make sure that they, too, receive or can get the
-source code.  And you must show them these terms so they know their
-rights.
-
-  We protect your rights with two steps: (1) copyright the software, and
-(2) offer you this license which gives you legal permission to copy,
-distribute and/or modify the software.
-
-  Also, for each author's protection and ours, we want to make certain
-that everyone understands that there is no warranty for this free
-software.  If the software is modified by someone else and passed on, we
-want its recipients to know that what they have is not the original, so
-that any problems introduced by others will not reflect on the original
-authors' reputations.
-
-  Finally, any free program is threatened constantly by software
-patents.  We wish to avoid the danger that redistributors of a free
-program will individually obtain patent licenses, in effect making the
-program proprietary.  To prevent this, we have made it clear that any
-patent must be licensed for everyone's free use or not licensed at all.
-
-  The precise terms and conditions for copying, distribution and
-modification follow.
-
-		    GNU GENERAL PUBLIC LICENSE
-   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
-
-  0. This License applies to any program or other work which contains
-a notice placed by the copyright holder saying it may be distributed
-under the terms of this General Public License.  The "Program", below,
-refers to any such program or work, and a "work based on the Program"
-means either the Program or any derivative work under copyright law:
-that is to say, a work containing the Program or a portion of it,
-either verbatim or with modifications and/or translated into another
-language.  (Hereinafter, translation is included without limitation in
-the term "modification".)  Each licensee is addressed as "you".
-
-Activities other than copying, distribution and modification are not
-covered by this License; they are outside its scope.  The act of
-running the Program is not restricted, and the output from the Program
-is covered only if its contents constitute a work based on the
-Program (independent of having been made by running the Program).
-Whether that is true depends on what the Program does.
-
-  1. You may copy and distribute verbatim copies of the Program's
-source code as you receive it, in any medium, provided that you
-conspicuously and appropriately publish on each copy an appropriate
-copyright notice and disclaimer of warranty; keep intact all the
-notices that refer to this License and to the absence of any warranty;
-and give any other recipients of the Program a copy of this License
-along with the Program.
-
-You may charge a fee for the physical act of transferring a copy, and
-you may at your option offer warranty protection in exchange for a fee.
-
-  2. You may modify your copy or copies of the Program or any portion
-of it, thus forming a work based on the Program, and copy and
-distribute such modifications or work under the terms of Section 1
-above, provided that you also meet all of these conditions:
-
-    a) You must cause the modified files to carry prominent notices
-    stating that you changed the files and the date of any change.
-
-    b) You must cause any work that you distribute or publish, that in
-    whole or in part contains or is derived from the Program or any
-    part thereof, to be licensed as a whole at no charge to all third
-    parties under the terms of this License.
-
-    c) If the modified program normally reads commands interactively
-    when run, you must cause it, when started running for such
-    interactive use in the most ordinary way, to print or display an
-    announcement including an appropriate copyright notice and a
-    notice that there is no warranty (or else, saying that you provide
-    a warranty) and that users may redistribute the program under
-    these conditions, and telling the user how to view a copy of this
-    License.  (Exception: if the Program itself is interactive but
-    does not normally print such an announcement, your work based on
-    the Program is not required to print an announcement.)
-
-These requirements apply to the modified work as a whole.  If
-identifiable sections of that work are not derived from the Program,
-and can be reasonably considered independent and separate works in
-themselves, then this License, and its terms, do not apply to those
-sections when you distribute them as separate works.  But when you
-distribute the same sections as part of a whole which is a work based
-on the Program, the distribution of the whole must be on the terms of
-this License, whose permissions for other licensees extend to the
-entire whole, and thus to each and every part regardless of who wrote it.
-
-Thus, it is not the intent of this section to claim rights or contest
-your rights to work written entirely by you; rather, the intent is to
-exercise the right to control the distribution of derivative or
-collective works based on the Program.
-
-In addition, mere aggregation of another work not based on the Program
-with the Program (or with a work based on the Program) on a volume of
-a storage or distribution medium does not bring the other work under
-the scope of this License.
-
-  3. You may copy and distribute the Program (or a work based on it,
-under Section 2) in object code or executable form under the terms of
-Sections 1 and 2 above provided that you also do one of the following:
-
-    a) Accompany it with the complete corresponding machine-readable
-    source code, which must be distributed under the terms of Sections
-    1 and 2 above on a medium customarily used for software interchange; or,
-
-    b) Accompany it with a written offer, valid for at least three
-    years, to give any third party, for a charge no more than your
-    cost of physically performing source distribution, a complete
-    machine-readable copy of the corresponding source code, to be
-    distributed under the terms of Sections 1 and 2 above on a medium
-    customarily used for software interchange; or,
-
-    c) Accompany it with the information you received as to the offer
-    to distribute corresponding source code.  (This alternative is
-    allowed only for noncommercial distribution and only if you
-    received the program in object code or executable form with such
-    an offer, in accord with Subsection b above.)
-
-The source code for a work means the preferred form of the work for
-making modifications to it.  For an executable work, complete source
-code means all the source code for all modules it contains, plus any
-associated interface definition files, plus the scripts used to
-control compilation and installation of the executable.  However, as a
-special exception, the source code distributed need not include
-anything that is normally distributed (in either source or binary
-form) with the major components (compiler, kernel, and so on) of the
-operating system on which the executable runs, unless that component
-itself accompanies the executable.
-
-If distribution of executable or object code is made by offering
-access to copy from a designated place, then offering equivalent
-access to copy the source code from the same place counts as
-distribution of the source code, even though third parties are not
-compelled to copy the source along with the object code.
-
-  4. You may not copy, modify, sublicense, or distribute the Program
-except as expressly provided under this License.  Any attempt
-otherwise to copy, modify, sublicense or distribute the Program is
-void, and will automatically terminate your rights under this License.
-However, parties who have received copies, or rights, from you under
-this License will not have their licenses terminated so long as such
-parties remain in full compliance.
-
-  5. You are not required to accept this License, since you have not
-signed it.  However, nothing else grants you permission to modify or
-distribute the Program or its derivative works.  These actions are
-prohibited by law if you do not accept this License.  Therefore, by
-modifying or distributing the Program (or any work based on the
-Program), you indicate your acceptance of this License to do so, and
-all its terms and conditions for copying, distributing or modifying
-the Program or works based on it.
-
-  6. Each time you redistribute the Program (or any work based on the
-Program), the recipient automatically receives a license from the
-original licensor to copy, distribute or modify the Program subject to
-these terms and conditions.  You may not impose any further
-restrictions on the recipients' exercise of the rights granted herein.
-You are not responsible for enforcing compliance by third parties to
-this License.
-
-  7. If, as a consequence of a court judgment or allegation of patent
-infringement or for any other reason (not limited to patent issues),
-conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License.  If you cannot
-distribute so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you
-may not distribute the Program at all.  For example, if a patent
-license would not permit royalty-free redistribution of the Program by
-all those who receive copies directly or indirectly through you, then
-the only way you could satisfy both it and this License would be to
-refrain entirely from distribution of the Program.
-
-If any portion of this section is held invalid or unenforceable under
-any particular circumstance, the balance of the section is intended to
-apply and the section as a whole is intended to apply in other
-circumstances.
-
-It is not the purpose of this section to induce you to infringe any
-patents or other property right claims or to contest validity of any
-such claims; this section has the sole purpose of protecting the
-integrity of the free software distribution system, which is
-implemented by public license practices.  Many people have made
-generous contributions to the wide range of software distributed
-through that system in reliance on consistent application of that
-system; it is up to the author/donor to decide if he or she is willing
-to distribute software through any other system and a licensee cannot
-impose that choice.
-
-This section is intended to make thoroughly clear what is believed to
-be a consequence of the rest of this License.
-
-  8. If the distribution and/or use of the Program is restricted in
-certain countries either by patents or by copyrighted interfaces, the
-original copyright holder who places the Program under this License
-may add an explicit geographical distribution limitation excluding
-those countries, so that distribution is permitted only in or among
-countries not thus excluded.  In such case, this License incorporates
-the limitation as if written in the body of this License.
-
-  9. The Free Software Foundation may publish revised and/or new versions
-of the General Public License from time to time.  Such new versions will
-be similar in spirit to the present version, but may differ in detail to
-address new problems or concerns.
-
-Each version is given a distinguishing version number.  If the Program
-specifies a version number of this License which applies to it and "any
-later version", you have the option of following the terms and conditions
-either of that version or of any later version published by the Free
-Software Foundation.  If the Program does not specify a version number of
-this License, you may choose any version ever published by the Free Software
-Foundation.
-
-  10. If you wish to incorporate parts of the Program into other free
-programs whose distribution conditions are different, write to the author
-to ask for permission.  For software which is copyrighted by the Free
-Software Foundation, write to the Free Software Foundation; we sometimes
-make exceptions for this.  Our decision will be guided by the two goals
-of preserving the free status of all derivatives of our free software and
-of promoting the sharing and reuse of software generally.
-
-			    NO WARRANTY
-
-  11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
-OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
-PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
-OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
-TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
-PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
-REPAIR OR CORRECTION.
-
-  12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
-PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
-POSSIBILITY OF SUCH DAMAGES.
-
-		     END OF TERMS AND CONDITIONS
-
diff --git a/thirdparty/Volatility/README-2.5.txt b/thirdparty/Volatility/README-2.5.txt
deleted file mode 100644
index dc4e57db121412cbe187b5b4a1b8d944bcf0cc4c..0000000000000000000000000000000000000000
--- a/thirdparty/Volatility/README-2.5.txt
+++ /dev/null
@@ -1,553 +0,0 @@
-============================================================================
-Volatility Framework - Volatile memory extraction utility framework
-============================================================================
-
-The Volatility Framework is a completely open collection of tools,
-implemented in Python under the GNU General Public License, for the
-extraction of digital artifacts from volatile memory (RAM) samples.
-The extraction techniques are performed completely independent of the
-system being investigated but offer visibilty into the runtime state
-of the system. The framework is intended to introduce people to the
-techniques and complexities associated with extracting digital artifacts
-from volatile memory samples and provide a platform for further work into
-this exciting area of research.
-
-The Volatility distribution is available from: 
-http://www.volatilityfoundation.org/#!releases/component_71401
-
-Volatility should run on any platform that supports 
-Python (http://www.python.org)
-
-Volatility supports investigations of the following memory images:
-
-Windows:
-* 32-bit Windows XP Service Pack 2 and 3
-* 32-bit Windows 2003 Server Service Pack 0, 1, 2
-* 32-bit Windows Vista Service Pack 0, 1, 2
-* 32-bit Windows 2008 Server Service Pack 1, 2 (there is no SP0)
-* 32-bit Windows 7 Service Pack 0, 1
-* 32-bit Windows 8, 8.1, and 8.1 Update 1
-* 32-bit Windows 10 (initial support)
-* 64-bit Windows XP Service Pack 1 and 2 (there is no SP0)
-* 64-bit Windows 2003 Server Service Pack 1 and 2 (there is no SP0)
-* 64-bit Windows Vista Service Pack 0, 1, 2
-* 64-bit Windows 2008 Server Service Pack 1 and 2 (there is no SP0)
-* 64-bit Windows 2008 R2 Server Service Pack 0 and 1
-* 64-bit Windows 7 Service Pack 0 and 1
-* 64-bit Windows 8, 8.1, and 8.1 Update 1
-* 64-bit Windows Server 2012 and 2012 R2 
-* 64-bit Windows 10 (initial support)
-
-Linux: 
-* 32-bit Linux kernels 2.6.11 to 4.2.3
-* 64-bit Linux kernels 2.6.11 to 4.2.3
-* OpenSuSE, Ubuntu, Debian, CentOS, Fedora, Mandriva, etc
-
-Mac OSX:
-* 32-bit 10.5.x Leopard (the only 64-bit 10.5 is Server, which isn't supported)
-* 32-bit 10.6.x Snow Leopard
-* 64-bit 10.6.x Snow Leopard
-* 32-bit 10.7.x Lion
-* 64-bit 10.7.x Lion
-* 64-bit 10.8.x Mountain Lion (there is no 32-bit version)
-* 64-bit 10.9.x Mavericks (there is no 32-bit version)
-* 64-bit 10.10.x Yosemite (there is no 32-bit version)
-* 64-bit 10.11.x El Capitan (there is no 32-bit version)
-
-Volatility does not provide memory sample acquisition
-capabilities. For acquisition, there are both free and commercial
-solutions available. If you would like suggestions about suitable 
-acquisition solutions, please contact us at:
-
-volatility (at) volatilityfoundation (dot) org
-
-Volatility supports a variety of sample file formats and the
-ability to convert between these formats:
-
-  - Raw linear sample (dd)
-  - Hibernation file
-  - Crash dump file
-  - VirtualBox ELF64 core dump
-  - VMware saved state and snapshot files
-  - EWF format (E01) 
-  - LiME (Linux Memory Extractor) format
-  - Mach-o file format 
-  - QEMU virtual machine dumps
-  - Firewire 
-  - HPAK (FDPro)
-
-For a more detailed list of capabilities, see the following:
-
-    https://github.com/volatilityfoundation/volatility/wiki
-    
-Also see the community plugins repository:
-
-    https://github.com/volatilityfoundation/community
-
-Example Data
-============
-
-If you want to give Volatility a try, you can download exemplar
-memory images from the following url:
-
-    https://github.com/volatilityfoundation/volatility/wiki/Memory-Samples
-
-Mailing Lists
-=============
-
-Mailing lists to support the users and developers of Volatility
-can be found at the following address:
-
-    http://lists.volatilesystems.com/mailman/listinfo
-
-Contact
-=======
-For information or requests, contact:
-
-Volatility Foundation
-
-Web: http://www.volatilityfoundation.org
-     http://volatility-labs.blogspot.com
-     http://volatility.tumblr.com
-     
-Email: volatility (at) volatilityfoundation (dot) org
-
-IRC: #volatility on freenode
-
-Twitter: @volatility 
-
-Requirements
-============
-- Python 2.6 or later, but not 3.0. http://www.python.org
-
-Some plugins may have other requirements which can be found at: 
-    https://github.com/volatilityfoundation/volatility/wiki/Installation
-
-Quick Start
-===========
-1. Unpack the latest version of Volatility from
-    volatilityfoundation.org
-   
-2. To see available options, run "python vol.py -h" or "python vol.py --info"
-
-   Example:
-
-$ python vol.py --info
-Volatility Foundation Volatility Framework 2.5
-
-Profiles
---------
-VistaSP0x64                - A Profile for Windows Vista SP0 x64
-VistaSP0x86                - A Profile for Windows Vista SP0 x86
-VistaSP1x64                - A Profile for Windows Vista SP1 x64
-VistaSP1x86                - A Profile for Windows Vista SP1 x86
-VistaSP2x64                - A Profile for Windows Vista SP2 x64
-VistaSP2x86                - A Profile for Windows Vista SP2 x86
-Win10x64                   - A Profile for Windows 10 x64
-Win10x86                   - A Profile for Windows 10 x86
-Win2003SP0x86              - A Profile for Windows 2003 SP0 x86
-Win2003SP1x64              - A Profile for Windows 2003 SP1 x64
-Win2003SP1x86              - A Profile for Windows 2003 SP1 x86
-Win2003SP2x64              - A Profile for Windows 2003 SP2 x64
-Win2003SP2x86              - A Profile for Windows 2003 SP2 x86
-Win2008R2SP0x64            - A Profile for Windows 2008 R2 SP0 x64
-Win2008R2SP1x64            - A Profile for Windows 2008 R2 SP1 x64
-Win2008SP1x64              - A Profile for Windows 2008 SP1 x64
-Win2008SP1x86              - A Profile for Windows 2008 SP1 x86
-Win2008SP2x64              - A Profile for Windows 2008 SP2 x64
-Win2008SP2x86              - A Profile for Windows 2008 SP2 x86
-Win2012R2x64               - A Profile for Windows Server 2012 R2 x64
-Win2012x64                 - A Profile for Windows Server 2012 x64
-Win7SP0x64                 - A Profile for Windows 7 SP0 x64
-Win7SP0x86                 - A Profile for Windows 7 SP0 x86
-Win7SP1x64                 - A Profile for Windows 7 SP1 x64
-Win7SP1x86                 - A Profile for Windows 7 SP1 x86
-Win81U1x64                 - A Profile for Windows 8.1 Update 1 x64
-Win81U1x86                 - A Profile for Windows 8.1 Update 1 x86
-Win8SP0x64                 - A Profile for Windows 8 x64
-Win8SP0x86                 - A Profile for Windows 8 x86
-Win8SP1x64                 - A Profile for Windows 8.1 x64
-Win8SP1x86                 - A Profile for Windows 8.1 x86
-WinXPSP1x64                - A Profile for Windows XP SP1 x64
-WinXPSP2x64                - A Profile for Windows XP SP2 x64
-WinXPSP2x86                - A Profile for Windows XP SP2 x86
-WinXPSP3x86                - A Profile for Windows XP SP3 x86
-
-Address Spaces
---------------
-AMD64PagedMemory              - Standard AMD 64-bit address space.
-ArmAddressSpace               - Address space for ARM processors       
-FileAddressSpace              - This is a direct file AS.
-HPAKAddressSpace              - This AS supports the HPAK format
-IA32PagedMemory               - Standard IA-32 paging address space.
-IA32PagedMemoryPae            - This class implements the IA-32 PAE paging address space. It is responsible
-LimeAddressSpace              - Address space for Lime
-MachOAddressSpace             - Address space for mach-o files to support atc-ny memory reader
-OSXPmemELF                    - This AS supports VirtualBox ELF64 coredump format
-QemuCoreDumpElf               - This AS supports Qemu ELF32 and ELF64 coredump format
-VMWareAddressSpace            - This AS supports VMware snapshot (VMSS) and saved state (VMSS) files
-VMWareMetaAddressSpace        - This AS supports the VMEM format with VMSN/VMSS metadata
-VirtualBoxCoreDumpElf64       - This AS supports VirtualBox ELF64 coredump format
-WindowsCrashDumpSpace32       - This AS supports windows Crash Dump format
-WindowsCrashDumpSpace64       - This AS supports windows Crash Dump format
-WindowsCrashDumpSpace64BitMap - This AS supports Windows BitMap Crash Dump format
-WindowsHiberFileSpace32       - This is a hibernate address space for windows hibernation files.
-
-Plugins
--------
-amcache                    - Print AmCache information
-apihooks                   - Detect API hooks in process and kernel memory
-atoms                      - Print session and window station atom tables
-atomscan                   - Pool scanner for atom tables
-auditpol                   - Prints out the Audit Policies from HKLM\SECURITY\Policy\PolAdtEv
-bigpools                   - Dump the big page pools using BigPagePoolScanner
-bioskbd                    - Reads the keyboard buffer from Real Mode memory
-cachedump                  - Dumps cached domain hashes from memory
-callbacks                  - Print system-wide notification routines
-clipboard                  - Extract the contents of the windows clipboard
-cmdline                    - Display process command-line arguments
-cmdscan                    - Extract command history by scanning for _COMMAND_HISTORY
-connections                - Print list of open connections [Windows XP and 2003 Only]
-connscan                   - Pool scanner for tcp connections
-consoles                   - Extract command history by scanning for _CONSOLE_INFORMATION
-crashinfo                  - Dump crash-dump information
-deskscan                   - Poolscaner for tagDESKTOP (desktops)
-devicetree                 - Show device tree
-dlldump                    - Dump DLLs from a process address space
-dlllist                    - Print list of loaded dlls for each process
-driverirp                  - Driver IRP hook detection
-drivermodule               - Associate driver objects to kernel modules
-driverscan                 - Pool scanner for driver objects
-dumpcerts                  - Dump RSA private and public SSL keys
-dumpfiles                  - Extract memory mapped and cached files
-dumpregistry               - Dumps registry files out to disk
-envars                     - Display process environment variables
-eventhooks                 - Print details on windows event hooks
-evtlogs                    - Extract Windows Event Logs (XP/2003 only)
-filescan                   - Pool scanner for file objects
-gahti                      - Dump the USER handle type information
-gditimers                  - Print installed GDI timers and callbacks
-gdt                        - Display Global Descriptor Table
-getservicesids             - Get the names of services in the Registry and return Calculated SID
-getsids                    - Print the SIDs owning each process
-handles                    - Print list of open handles for each process
-hashdump                   - Dumps passwords hashes (LM/NTLM) from memory
-hibinfo                    - Dump hibernation file information
-hivedump                   - Prints out a hive
-hivelist                   - Print list of registry hives.
-hivescan                   - Pool scanner for registry hives
-hpakextract                - Extract physical memory from an HPAK file
-hpakinfo                   - Info on an HPAK file
-idt                        - Display Interrupt Descriptor Table
-iehistory                  - Reconstruct Internet Explorer cache / history
-imagecopy                  - Copies a physical address space out as a raw DD image
-imageinfo                  - Identify information for the image
-impscan                    - Scan for calls to imported functions
-joblinks                   - Print process job link information
-kdbgscan                   - Search for and dump potential KDBG values
-kpcrscan                   - Search for and dump potential KPCR values
-ldrmodules                 - Detect unlinked DLLs
-limeinfo                   - Dump Lime file format information
-linux_apihooks             - Checks for userland apihooks
-linux_arp                  - Print the ARP table
-linux_banner               - Prints the Linux banner information
-linux_bash                 - Recover bash history from bash process memory
-linux_bash_env             - Recover a process' dynamic environment variables
-linux_bash_hash            - Recover bash hash table from bash process memory
-linux_check_afinfo         - Verifies the operation function pointers of network protocols
-linux_check_creds          - Checks if any processes are sharing credential structures
-linux_check_evt_arm        - Checks the Exception Vector Table to look for syscall table hooking
-linux_check_fop            - Check file operation structures for rootkit modifications
-linux_check_idt            - Checks if the IDT has been altered
-linux_check_inline_kernel  - Check for inline kernel hooks
-linux_check_modules        - Compares module list to sysfs info, if available
-linux_check_syscall        - Checks if the system call table has been altered
-linux_check_syscall_arm    - Checks if the system call table has been altered
-linux_check_tty            - Checks tty devices for hooks
-linux_cpuinfo              - Prints info about each active processor
-linux_dentry_cache         - Gather files from the dentry cache
-linux_dmesg                - Gather dmesg buffer
-linux_dump_map             - Writes selected memory mappings to disk
-linux_dynamic_env          - Recover a process' dynamic environment variables
-linux_elfs                 - Find ELF binaries in process mappings
-linux_enumerate_files      - Lists files referenced by the filesystem cache
-linux_find_file            - Lists and recovers files from memory
-linux_getcwd               - Lists current working directory of each process
-linux_hidden_modules       - Carves memory to find hidden kernel modules
-linux_ifconfig             - Gathers active interfaces
-linux_info_regs            - It's like 'info registers' in GDB. It prints out all the
-linux_iomem                - Provides output similar to /proc/iomem
-linux_kernel_opened_files  - Lists files that are opened from within the kernel
-linux_keyboard_notifiers   - Parses the keyboard notifier call chain
-linux_ldrmodules           - Compares the output of proc maps with the list of libraries from libdl
-linux_library_list         - Lists libraries loaded into a process
-linux_librarydump          - Dumps shared libraries in process memory to disk
-linux_list_raw             - List applications with promiscuous sockets
-linux_lsmod                - Gather loaded kernel modules
-linux_lsof                 - Lists file descriptors and their path
-linux_malfind              - Looks for suspicious process mappings
-linux_memmap               - Dumps the memory map for linux tasks
-linux_moddump              - Extract loaded kernel modules
-linux_mount                - Gather mounted fs/devices
-linux_mount_cache          - Gather mounted fs/devices from kmem_cache
-linux_netfilter            - Lists Netfilter hooks
-linux_netscan              - Carves for network connection structures
-linux_netstat              - Lists open sockets
-linux_pidhashtable         - Enumerates processes through the PID hash table
-linux_pkt_queues           - Writes per-process packet queues out to disk
-linux_plthook              - Scan ELF binaries' PLT for hooks to non-NEEDED images
-linux_proc_maps            - Gathers process memory maps
-linux_proc_maps_rb         - Gathers process maps for linux through the mappings red-black tree
-linux_procdump             - Dumps a process's executable image to disk
-linux_process_hollow       - Checks for signs of process hollowing
-linux_psaux                - Gathers processes along with full command line and start time
-linux_psenv                - Gathers processes along with their static environment variables
-linux_pslist               - Gather active tasks by walking the task_struct->task list
-linux_pslist_cache         - Gather tasks from the kmem_cache
-linux_pstree               - Shows the parent/child relationship between processes
-linux_psxview              - Find hidden processes with various process listings
-linux_recover_filesystem   - Recovers the entire cached file system from memory
-linux_route_cache          - Recovers the routing cache from memory
-linux_sk_buff_cache        - Recovers packets from the sk_buff kmem_cache
-linux_slabinfo             - Mimics /proc/slabinfo on a running machine
-linux_strings              - Match physical offsets to virtual addresses (may take a while, VERY verbose)
-linux_threads              - Prints threads of processes
-linux_tmpfs                - Recovers tmpfs filesystems from memory
-linux_truecrypt_passphrase - Recovers cached Truecrypt passphrases
-linux_vma_cache            - Gather VMAs from the vm_area_struct cache
-linux_volshell             - Shell in the memory image
-linux_yarascan             - A shell in the Linux memory image
-lsadump                    - Dump (decrypted) LSA secrets from the registry
-mac_adium                  - Lists Adium messages
-mac_apihooks               - Checks for API hooks in processes
-mac_apihooks_kernel        - Checks to see if system call and kernel functions are hooked
-mac_arp                    - Prints the arp table
-mac_bash                   - Recover bash history from bash process memory
-mac_bash_env               - Recover bash's environment variables
-mac_bash_hash              - Recover bash hash table from bash process memory
-mac_calendar               - Gets calendar events from Calendar.app
-mac_check_mig_table        - Lists entires in the kernel's MIG table
-mac_check_syscall_shadow   - Looks for shadow system call tables
-mac_check_syscalls         - Checks to see if system call table entries are hooked
-mac_check_sysctl           - Checks for unknown sysctl handlers
-mac_check_trap_table       - Checks to see if mach trap table entries are hooked
-mac_compressed_swap        - Prints Mac OS X VM compressor stats and dumps all compressed pages
-mac_contacts               - Gets contact names from Contacts.app
-mac_dead_procs             - Prints terminated/de-allocated processes
-mac_dead_sockets           - Prints terminated/de-allocated network sockets
-mac_dead_vnodes            - Lists freed vnode structures
-mac_dmesg                  - Prints the kernel debug buffer
-mac_dump_file              - Dumps a specified file
-mac_dump_maps              - Dumps memory ranges of process(es), optionally including pages in compressed swap
-mac_dyld_maps              - Gets memory maps of processes from dyld data structures
-mac_find_aslr_shift        - Find the ASLR shift value for 10.8+ images
-mac_get_profile            - Automatically detect Mac profiles       
-mac_ifconfig               - Lists network interface information for all devices
-mac_ip_filters             - Reports any hooked IP filters
-mac_keychaindump           - Recovers possbile keychain keys. Use chainbreaker to open related keychain files
-mac_ldrmodules             - Compares the output of proc maps with the list of libraries from libdl
-mac_librarydump            - Dumps the executable of a process
-mac_list_files             - Lists files in the file cache
-mac_list_kauth_listeners   - Lists Kauth Scope listeners
-mac_list_kauth_scopes      - Lists Kauth Scopes and their status
-mac_list_raw               - List applications with promiscuous sockets
-mac_list_sessions          - Enumerates sessions
-mac_list_zones             - Prints active zones
-mac_lsmod                  - Lists loaded kernel modules
-mac_lsmod_iokit            - Lists loaded kernel modules through IOkit
-mac_lsmod_kext_map         - Lists loaded kernel modules
-mac_lsof                   - Lists per-process opened files
-mac_machine_info           - Prints machine information about the sample
-mac_malfind                - Looks for suspicious process mappings
-mac_memdump                - Dump addressable memory pages to a file
-mac_moddump                - Writes the specified kernel extension to disk
-mac_mount                  - Prints mounted device information
-mac_netstat                - Lists active per-process network connections
-mac_network_conns          - Lists network connections from kernel network structures
-mac_notesapp               - Finds contents of Notes messages
-mac_notifiers              - Detects rootkits that add hooks into I/O Kit (e.g. LogKext)
-mac_orphan_threads         - Lists threads that don't map back to known modules/processes
-mac_pgrp_hash_table        - Walks the process group hash table
-mac_pid_hash_table         - Walks the pid hash table
-mac_print_boot_cmdline     - Prints kernel boot arguments
-mac_proc_maps              - Gets memory maps of processes
-mac_procdump               - Dumps the executable of a process
-mac_psaux                  - Prints processes with arguments in user land (**argv)
-mac_psenv                  - Prints processes with environment in user land (**envp)
-mac_pslist                 - List Running Processes
-mac_pstree                 - Show parent/child relationship of processes
-mac_psxview                - Find hidden processes with various process listings
-mac_recover_filesystem     - Recover the cached filesystem
-mac_route                  - Prints the routing table
-mac_socket_filters         - Reports socket filters
-mac_strings                - Match physical offsets to virtual addresses (may take a while, VERY verbose)
-mac_tasks                  - List Active Tasks
-mac_threads                - List Process Threads
-mac_threads_simple         - Lists threads along with their start time and priority
-mac_trustedbsd             - Lists malicious trustedbsd policies
-mac_version                - Prints the Mac version
-mac_volshell               - Shell in the memory image
-mac_yarascan               - Scan memory for yara signatures
-machoinfo                  - Dump Mach-O file format information
-malfind                    - Find hidden and injected code
-mbrparser                  - Scans for and parses potential Master Boot Records (MBRs)
-memdump                    - Dump the addressable memory for a process
-memmap                     - Print the memory map
-messagehooks               - List desktop and thread window message hooks
-mftparser                  - Scans for and parses potential MFT entries
-moddump                    - Dump a kernel driver to an executable file sample
-modscan                    - Pool scanner for kernel modules
-modules                    - Print list of loaded modules
-multiscan                  - Scan for various objects at once
-mutantscan                 - Pool scanner for mutex objects
-netscan                    - Scan a Vista (or later) image for connections and sockets
-notepad                    - List currently displayed notepad text
-objtypescan                - Scan for Windows object type objects
-patcher                    - Patches memory based on page scans
-poolpeek                   - Configurable pool scanner plugin
-pooltracker                - Show a summary of pool tag usage
-printkey                   - Print a registry key, and its subkeys and values
-privs                      - Display process privileges
-procdump                   - Dump a process to an executable file sample
-pslist                     - Print all running processes by following the EPROCESS lists
-psscan                     - Pool scanner for process objects
-pstree                     - Print process list as a tree
-psxview                    - Find hidden processes with various process listings
-qemuinfo                   - Dump Qemu information
-raw2dmp                    - Converts a physical memory sample to a windbg crash dump
-screenshot                 - Save a pseudo-screenshot based on GDI windows
-servicediff                - List Windows services (ala Plugx)
-sessions                   - List details on _MM_SESSION_SPACE (user logon sessions)
-shellbags                  - Prints ShellBags info
-shimcache                  - Parses the Application Compatibility Shim Cache registry key
-shutdowntime               - Print ShutdownTime of machine from registry
-sockets                    - Print list of open sockets
-sockscan                   - Pool scanner for tcp socket objects
-ssdt                       - Display SSDT entries
-strings                    - Match physical offsets to virtual addresses (may take a while, VERY verbose)
-svcscan                    - Scan for Windows services
-symlinkscan                - Pool scanner for symlink objects
-thrdscan                   - Pool scanner for thread objects
-threads                    - Investigate _ETHREAD and _KTHREADs
-timeliner                  - Creates a timeline from various artifacts in memory
-timers                     - Print kernel timers and associated module DPCs
-truecryptmaster            - Recover TrueCrypt 7.1a Master Keys
-truecryptpassphrase        - TrueCrypt Cached Passphrase Finder
-truecryptsummary           - TrueCrypt Summary
-unloadedmodules            - Print list of unloaded modules
-userassist                 - Print userassist registry keys and information
-userhandles                - Dump the USER handle tables
-vaddump                    - Dumps out the vad sections to a file
-vadinfo                    - Dump the VAD info
-vadtree                    - Walk the VAD tree and display in tree format
-vadwalk                    - Walk the VAD tree
-vboxinfo                   - Dump virtualbox information
-verinfo                    - Prints out the version information from PE images
-vmwareinfo                 - Dump VMware VMSS/VMSN information
-volshell                   - Shell in the memory image
-win10cookie                - Find the ObHeaderCookie value for Windows 10
-windows                    - Print Desktop Windows (verbose details)
-wintree                    - Print Z-Order Desktop Windows Tree
-wndscan                    - Pool scanner for window stations
-yarascan                   - Scan process or kernel memory with Yara signatures
-
-3. To get more information on a Windows memory sample and to make sure Volatility
-   supports that sample type, run 'python vol.py imageinfo -f <imagename>' or 'python vol.py kdbgscan -f <imagename>'
-
-   Example:
-   
-    $ python vol.py imageinfo -f WIN-II7VOJTUNGL-20120324-193051.raw 
-    Volatility Foundation Volatility Framework 2.5
-    Determining profile based on KDBG search...
-    
-              Suggested Profile(s) : Win2008R2SP0x64, Win7SP1x64, Win7SP0x64, Win2008R2SP1x64 (Instantiated with Win7SP0x64)
-                         AS Layer1 : AMD64PagedMemory (Kernel AS)
-                         AS Layer2 : FileAddressSpace (/Path/to/WIN-II7VOJTUNGL-20120324-193051.raw)
-                          PAE type : PAE
-                               DTB : 0x187000L
-                              KDBG : 0xf800016460a0
-              Number of Processors : 1
-         Image Type (Service Pack) : 1
-                    KPCR for CPU 0 : 0xfffff80001647d00L
-                 KUSER_SHARED_DATA : 0xfffff78000000000L
-               Image date and time : 2012-03-24 19:30:53 UTC+0000
-         Image local date and time : 2012-03-25 03:30:53 +0800
-
-4. Run some other plugins. -f is a required option for all plugins. Some
-   also require/accept other options. Run "python vol.py <plugin> -h" for
-   more information on a particular command.  A Command Reference wiki
-   is also available on the Google Code site:
-
-        https://github.com/volatilityfoundation/volatility/wiki
-
-   as well as Basic Usage:
-
-        https://github.com/volatilityfoundation/volatility/wiki/Volatility-Usage
-
-Licensing and Copyright
-=======================
-
-Copyright (C) 2007-2015 Volatility Foundation
-
-All Rights Reserved
-
-Volatility is free software; you can redistribute it and/or modify
-it under the terms of the GNU General Public License as published by
-the Free Software Foundation; either version 2 of the License, or
-(at your option) any later version.
-
-Volatility is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with Volatility.  If not, see <http://www.gnu.org/licenses/>.
-
-Bugs and Support
-================
-There is no support provided with Volatility. There is NO
-warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR
-PURPOSE. 
-
-If you think you've found a bug, please report it at:
-
-    https://github.com/volatilityfoundation/volatility/issues
-
-In order to help us solve your issues as quickly as possible,
-please include the following information when filing a bug:
-
-* The version of volatility you're using
-* The operating system used to run volatility
-* The version of python used to run volatility
-* The suspected operating system of the memory image
-* The complete command line you used to run volatility
-
-Depending on the operating system of the memory image, you may need to provide
-additional information, such as:
-
-For Windows:
-* The suspected Service Pack of the memory image
-
-For Linux:
-* The suspected kernel version of the memory image
-
-Other options for communicaton can be found at:
-    https://github.com/volatilityfoundation/volatility/wiki
-
-Missing or Truncated Information
-================================
-Volatility Foundation makes no claims about the validity or correctness of the
-output of Volatility. Many factors may contribute to the
-incorrectness of output from Volatility including, but not
-limited to, malicious modifications to the operating system,
-incomplete information due to swapping, and information corruption on
-image acquisition. 
-
-Command Reference 
-====================
-The following url contains a reference of all commands supported by 
-Volatility.
-
-    https://github.com/volatilityfoundation/volatility/wiki
-
diff --git a/thirdparty/Volatility/volatility-2.5.standalone.exe b/thirdparty/Volatility/volatility-2.5.standalone.exe
deleted file mode 100644
index a9d700bd57fbffa075cf24f887362ea9ce447b07..0000000000000000000000000000000000000000
Binary files a/thirdparty/Volatility/volatility-2.5.standalone.exe and /dev/null differ