MemScout automates memory image analysis by wrapping Volatility 3, running plugins, detecting suspicious activity, and generating professional reports all from a single command.
- Auto OS detection — detects Windows, Linux, or macOS from the image
- Three scan modes — full, triage, or custom plugin list
- Threat analysis — flags suspicious processes, network connections, code injection, and malicious command lines
- Report generation — HTML and JSON reports (PDF with WeasyPrint)
- CLI interface — clean, intuitive command-line tool
git clone https://github.com/Fad-X/memscout.git
cd memscout
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements.txtDownload and install GTK from here: 👉 https://github.com/tschoonj/GTK-for-Windows-Runtime-Environment-Installer/releases Download the latest .exe, install it, then restart your terminal and try again.
pip install volatility3Verify: vol --help
python cli/main.py scan /path/to/memory.dmppython cli/main.py scan /path/to/memory.dmp --mode fullpython cli/main.py scan /path/to/memory.dmp --mode custom \
--plugins windows.pslist.PsList \
--plugins windows.netscan.NetScan \
--plugins windows.malfind.Malfindpython cli/main.py scan memory.dmp --os windowspython cli/main.py scan memory.dmp --output ./case_001/resultspython cli/main.py pluginspython cli/main.py summary output/memscout_report_*.jsonEach scan creates a timestamped directory inside output/:
output/
└── memory_20240315_143022/
├── raw_results.json # All plugin output
├── memscout_report_*.html # Visual HTML report
├── memscout_report_*.json # Structured JSON report
└── memscout_report_*.pdf # PDF (if WeasyPrint installed)
| Category | Examples |
|---|---|
| Suspicious Processes | Typosquatting, unexpected paths, too many instances |
| Code Injection | Malfind hits, process hollowing indicators |
| Network Anomalies | C2 ports, backdoor listeners |
| Malicious Commands | Encoded PowerShell, persistence, lateral movement |
| Privilege Escalation | Shells/interpreters running as root (Linux) |
memscout/
├── core/
│ ├── runner.py # Volatility 3 execution engine
│ └── analyzer.py # Threat detection logic
├── cli/
│ └── main.py # CLI (Click)
├── reports/
│ └── generator.py # HTML/JSON/PDF report builder
├── output/ # Scan results saved here
├── requirements.txt
└── README.md
- PyQt6 GUI dashboard
- Timeline view of process creation
- YARA rule scanning integration
- VirusTotal hash lookups
- Multi-image batch scanning
- Sigma rule support
⚠️ For authorized forensic analysis only. Always work on legal copies of memory images.