![]() |
||
---|---|---|
LICENSE | ||
Makefile | ||
README.md | ||
evomalware.filenames | ||
evomalware.filenames.md5 | ||
evomalware.patterns | ||
evomalware.patterns.md5 | ||
evomalware.sh | ||
evomalware.suspect | ||
evomalware.suspect.md5 | ||
evomalware.whitelist | ||
evomalware.whitelist.md5 |
README.md
Description
EvoMalware is a bash(1) script that can detect various malware, viruses and backdoors in PHP and Javascript source code. It is meant to be used in a cron(8) job to generate reports, but can also be used interactively.
The script uses 3 flat text files as databases:
- evomalware.filenames, known filenames.
- evomalware.patterns, known patterns.
- evomalware.whitelist, files to ignore.
A fourth database named evomalware.suspect is used in "aggressive" mode to detect suspicious files
At each run, EvoMalware will download the latest databases.
Configuration/Tuning
TODO
Upstream
Upstream is at https://gitea.evolix.org/evolix/evomalware
GitHub is a mirror.
Other projects of interest
- WPScan, http://wpscan.org/
- Plecost, https://github.com/iniqua/plecost
- Linux Malware Detect (with ClamAV), https://www.rfxn.com/projects/linux-malware-detect/