evomalware/README.md

32 lines
885 B
Markdown
Raw Normal View History

2018-11-02 10:29:58 +01:00
# Description
2015-06-29 18:21:27 +02:00
2018-11-02 10:29:58 +01:00
EvoMalware is a BASH script which permits to identify files (PHP/JS only ATM)
2015-06-29 18:25:36 +02:00
infected by malwares/virus/backdoor.
The main goal is to be used in a cron job to generate reports, but it can be
used in "one shot" mode.
2015-06-29 18:21:27 +02:00
The script uses 3 flat text files as databases:
2015-06-29 18:25:36 +02:00
* evomalware.filenames, known filenames.
* evomalware.patterns, known patterns.
* evomalware.whitelist, files to ignore.
2015-06-29 18:21:27 +02:00
There is also an "aggressive" mode which permits to find suspect files using
2015-06-29 18:25:36 +02:00
evomalware.suspect DB.
2015-06-29 18:21:27 +02:00
At each run, the script downloads the last databases.
2018-11-02 10:29:58 +01:00
# Configuration/Tuning
2015-06-29 18:21:27 +02:00
TODO
2018-11-02 10:29:58 +01:00
# Upstream
2015-06-29 18:21:27 +02:00
2018-11-02 10:31:41 +01:00
Upstream is at <https://gitea.evolix.org/evolix/evomalware>
2015-06-29 18:21:27 +02:00
GitHub is a mirror.
2018-11-02 10:29:58 +01:00
# Interesting others projects
2015-06-29 18:21:27 +02:00
* WPScan, http://wpscan.org/
2015-07-15 10:29:43 +02:00
* Plecost, https://github.com/iniqua/plecost
2015-08-05 15:55:53 +02:00
* Linux Malware Detect (with ClamAV), https://www.rfxn.com/projects/linux-malware-detect/