malscan Logo

malscan

0
Free
Visit Website

Malscan is a tool to scan process memory for YARA matches and execute Python scripts if a match is found. This is useful for extracting configurations from malware process memory. The tool allows users to define YARA rules to detect specific configurations in memory and run custom Python scripts upon detection.

FEATURES

ALTERNATIVES

MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.

Web interface for the Volatility Memory Forensics Framework

A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

An anti-forensic Linux Kernel Module kill-switch for USB ports.

Python script to parse macOS MRU plist files into human-friendly format

A library to access and manipulate RAW image files.

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.