Update README

This commit is contained in:
Benoît S. 2018-11-02 10:29:58 +01:00
parent f495defe98
commit 4b1a297829

View file

@ -1,7 +1,6 @@
Description # Description
===========
EvoMalware is a BASH script which permits to identify files (PHP only ATM) EvoMalware is a BASH script which permits to identify files (PHP/JS only ATM)
infected by malwares/virus/backdoor. infected by malwares/virus/backdoor.
The main goal is to be used in a cron job to generate reports, but it can be The main goal is to be used in a cron job to generate reports, but it can be
used in "one shot" mode. used in "one shot" mode.
@ -16,19 +15,16 @@ There is also an "aggressive" mode which permits to find suspect files using
evomalware.suspect DB. evomalware.suspect DB.
At each run, the script downloads the last databases. At each run, the script downloads the last databases.
Configuration/Tuning # Configuration/Tuning
====================
TODO TODO
Upstream # Upstream
========
Upstream is at https://forge.evolix.org/projects/evomalware Upstream is at <https://gitea.evolix.org/evolix/evomalware>
GitHub is a mirror. GitHub is a mirror.
Interesting others projects # Interesting others projects
===========================
* WPScan, http://wpscan.org/ * WPScan, http://wpscan.org/
* Plecost, https://github.com/iniqua/plecost * Plecost, https://github.com/iniqua/plecost