You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
2 years ago | |
---|---|---|
LICENSE | 3 years ago | |
Makefile | 7 years ago | |
README.md | 3 years ago | |
evomalware.filenames | 3 years ago | |
evomalware.filenames.md5 | 3 years ago | |
evomalware.patterns | 2 years ago | |
evomalware.patterns.md5 | 2 years ago | |
evomalware.sh | 4 years ago | |
evomalware.suspect | 7 years ago | |
evomalware.suspect.md5 | 7 years ago | |
evomalware.whitelist | 3 years ago | |
evomalware.whitelist.md5 | 3 years ago |
README.md
Description
EvoMalware is a bash(1) script that can detect various malware, viruses and backdoors in PHP and Javascript source code. It is meant to be used in a cron(8) job to generate reports, but can also be used interactively.
The script uses 3 flat text files as databases:
- evomalware.filenames, known filenames.
- evomalware.patterns, known patterns.
- evomalware.whitelist, files to ignore.
A fourth database named evomalware.suspect is used in "aggressive" mode to detect suspicious files
At each run, EvoMalware will download the latest databases.
Configuration/Tuning
TODO
Upstream
Upstream is at https://gitea.evolix.org/evolix/evomalware
GitHub is a mirror.
Other projects of interest
- WPScan, http://wpscan.org/
- Plecost, https://github.com/iniqua/plecost
- Linux Malware Detect (with ClamAV), https://www.rfxn.com/projects/linux-malware-detect/