You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
![]() |
5 months ago | |
---|---|---|
LICENSE | 4 years ago | |
Makefile | 8 years ago | |
README.md | 4 years ago | |
evomalware.filenames | 4 years ago | |
evomalware.filenames.md5 | 4 years ago | |
evomalware.patterns | 3 years ago | |
evomalware.patterns.md5 | 3 years ago | |
evomalware.sh | 5 months ago | |
evomalware.suspect | 8 years ago | |
evomalware.suspect.md5 | 8 years ago | |
evomalware.whitelist | 4 years ago | |
evomalware.whitelist.md5 | 4 years ago |
README.md
Description
EvoMalware is a bash(1) script that can detect various malware, viruses and backdoors in PHP and Javascript source code. It is meant to be used in a cron(8) job to generate reports, but can also be used interactively.
The script uses 3 flat text files as databases:
- evomalware.filenames, known filenames.
- evomalware.patterns, known patterns.
- evomalware.whitelist, files to ignore.
A fourth database named evomalware.suspect is used in "aggressive" mode to detect suspicious files
At each run, EvoMalware will download the latest databases.
Configuration/Tuning
TODO
Upstream
Upstream is at https://gitea.evolix.org/evolix/evomalware
GitHub is a mirror.
Other projects of interest
- WPScan, http://wpscan.org/
- Plecost, https://github.com/iniqua/plecost
- Linux Malware Detect (with ClamAV), https://www.rfxn.com/projects/linux-malware-detect/