Semantic scanner base on tree-sitter
- Python ✅
- Javascript ✅
- Powershell ✅
- PHP ✅
- Bash ✅
- SQL ✅
- VBS ❌ (on going)
pyscrings
in the same python env of volatility
pip install pyscrings
ScringsScan
plugin will scan the kernel memory using semantic backend and only match semantic valid strings depending on the language choose.
git clone https://github.com/airbus-cert/scrings
vol -f [PATH_MEMORY_DUMP] -p scrings\volatility scrings.ScringsScan -l powershell
Offset Value
0x2f34f783c14 '$O7u9q=85;$bhRIHw=84;$m5Z=70;$GMxNlj=56;$CET0e4=71;$Bn8j=101;$Y8X...'
VadScringsScan
plugin will scan Windows VAD memory range using semantic scanner.
By default it will scan all processes, but it's possible to specify a PID through --pid
argument.
git clone https://github.com/airbus-cert/scrings
vol -f [PATH_MEMORY_DUMP] -p scrings\volatility scrings.VadScringsScan -l powershell
Offset PID Value
0x2f34f783c14 3632 '$O7u9q=85;$bhRIHw=84;$m5Z=70;$GMxNlj=56;$CET0e4=71;$Bn8j=101;$Y8X...'