PROCSCAN
Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.
Installation
git clone https://github.com/bananabr/procscan.git
cd procscan
python3 -m pip install -r requirements.txt
Usage
usage: procscan.py [-h] [--log LOG] [--verbose] --pml PML --ac AC
optional arguments:
-h, --help show this help message and exit
--log LOG log file path
--verbose, -v increase verbosity
--pml PML procscan PML file
--ac AC accesschk output file
Todo
- (Registry symbolic link patterns)
- (Filesystem symbolic link patterns)
- (DLL hijack)
- (Writable DLL loaded by privileged process)
- (Writable PE loaded by privileged process)