malscan

Memory analyzer

A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches

Run YARA rules on process memory and execute Python scripts on matches

GitHub

12 stars
4 watching
4 forks
Language: C
last commit: over 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
karttoon/binsequencer Automates pattern detection and YARA rule generation for malware analysis 74
accidentalrebel/mbcscan Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding 20
imp0rtp3/yobi A web browser extension that intercepts and analyzes script requests to detect malware using YARA rules 48
crowdstrike/supermem A tool for processing Windows memory images to extract relevant information 260
mitrecnd/malchive A collection of reusable scripts and tools for analyzing malicious software 75
virustotal/yara-python A Python interface to use YARA's features from Python programs 665
uppusaikiran/generic-parser Analyzes malware files to detect suspicious behavior by extracting meta information and features. 1
dissectmalware/yaradbg-backend An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. 24
halpomeranz/lmg Tools and scripts for capturing and analyzing Linux memory 266
rjzak/decompressingyara A tool for decompressing malware samples and running Yara rules against them. 7
huoji120/duckmemoryscan A tool to detect memory-based evasion techniques used in malware and rootkits 711
lprat/static_file_analysis Analyzes files to detect malware and extract embedded content 49
sh3llyr/yarascanparser A tool to parse JSON output from Yara Scan Service's malware analysis and extract relevant information for rule optimization. 11
justicerage/manalyze Analyzes PE files for security vulnerabilities and suspicious behavior 1,024
rek7/mxtract Analyzes and dumps memory to extract sensitive information from running processes 582