These are plugins for the memory forensics framework Volatility 3.
A Volatility 3 plugin that extracts and parses Chrome browser history from memory dumps. This plugin locates Chrome's History database files in memory, dumps them, and extracts the URLs visited by the user.
This is currently the only plugin I have availble, though I hope to publish another one soon.
Generally, you will have to copy the plugin file to the correct plugins directory in your Volatility installation directory. It will look something like this:
<VOLATILITY3_INSTALLATION_PATH>/volatility3/plugins/windows/
- Volatility 3
- Python 3.6+
- Potentially other Python libraries depending on the needs of the plugin