malscan

Memory analyzer

A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches

Run YARA rules on process memory and execute Python scripts on matches

GitHub

12 stars
4 watching
4 forks
Language: C
last commit: over 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
karttoon/binsequencer Automates pattern detection and YARA rule generation for malware analysis 74
accidentalrebel/mbcscan Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding 20
imp0rtp3/yobi A web browser extension that intercepts and analyzes script requests to detect malware using YARA rules 47
crowdstrike/supermem A tool for processing Windows memory images to extract relevant information 258
mitrecnd/malchive A collection of reusable scripts and tools for analyzing malicious software 75
virustotal/yara-python A Python interface to a popular malware analysis tool 660
uppusaikiran/generic-parser Analyzes malware files to detect suspicious behavior by extracting meta information and features. 1
dissectmalware/yaradbg-backend An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. 24
halpomeranz/lmg A tool for capturing and analyzing Linux memory 264
rjzak/decompressingyara A tool for decompressing malware samples and running Yara rules against them. 7
huoji120/duckmemoryscan A tool to detect memory-based evasion techniques used in malware and rootkits 702
lprat/static_file_analysis Analyzes files to detect malware and extract embedded content 49
sh3llyr/yarascanparser A tool to parse JSON output from Yara Scan Service's malware analysis and extract relevant information for rule optimization. 11
justicerage/manalyze Analyzes PE files for security vulnerabilities and suspicious behavior 1,018
rek7/mxtract Analyzes and dumps memory to extract sensitive information from running processes 582