Algorithm doesn't make a different, the size of the result does. We have the same chance of finding a collision in a 256-bit hash as we have in finding a collision in a 256-bit key derived from scrypt as we have in 256-bit encrypted result returned from AES256.
What if the result length is variable, such as Scrypt's length parameter that dictates the length of the result?
Scrypt takes (password, salt, N, p, r, outLength, digestLength, MixFunctionLength) as parameters. Only outLength matters here since it is the length of the resulting hash, and OP can only change the first two params (password and salt).
When we are talking about
chance of collision only the length of the
final result (which is the result of AES256) will determine the chance, it doesn't matter what one of the steps were like what the KDF produced. Besides your password length is already variable (user can select anything from empty string to a very long one).
If you change AES256 with a bigger version like AES512 then yes the chance rises.
The algorithm itself (such as using scrypt, cost factor of it,etc) determine the
cost of finding a collision although that's not their purpose but a byproduct of making brute forcing harder. (The cost of finding a collision is already high due to the size being 256 bit.)