Malscan is a tool to scan process memory for YARA matches and execute Python scripts if a match is found. This is useful for extracting configurations from malware process memory. The tool allows users to define YARA rules to detect specific configurations in memory and run custom Python scripts upon detection.
Common questions about malscan including features, pricing, alternatives, and user reviews.
malscan is Malscan is a tool to scan process memory for YARA matches and execute Python scripts. It is a Security Operations solution designed to help security teams with YARA, Memory Forensics.
malscan is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/usualsuspect/malscan/ for download and installation instructions.
Popular alternatives to malscan include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
malscan is for security teams and organizations that need YARA, Memory Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.