All Projects → scr34m → Php Malware Scanner

scr34m / Php Malware Scanner

Licence: gpl-3.0
Scans PHP files for malwares and known threats

Projects that are alternatives of or similar to Php Malware Scanner

Virustotal Tools
Submits multiple domains to VirusTotal API
Stars: ✭ 29 (-89.42%)
Mutual labels:  scanner, malware
Hijackthis
A free utility that finds malware, adware and other security threats
Stars: ✭ 349 (+27.37%)
Mutual labels:  scanner, malware
Magento Malware Scanner
Scanner, signatures and the largest collection of Magento malware
Stars: ✭ 608 (+121.9%)
Mutual labels:  scanner, malware
Php Antimalware Scanner
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (-33.94%)
Mutual labels:  scanner, malware
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-61.68%)
Mutual labels:  command-line-tool, malware
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-91.97%)
Mutual labels:  scanner, command-line-tool
moneta
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+40.15%)
Mutual labels:  scanner, malware
Yobi
Yara Based Detection Engine for web browsers
Stars: ✭ 39 (-85.77%)
Mutual labels:  scanner, malware
Colorpedia
Command-line tool for looking up colors and palettes.
Stars: ✭ 255 (-6.93%)
Mutual labels:  command-line-tool
Mquery
YARA malware query accelerator (web frontend)
Stars: ✭ 264 (-3.65%)
Mutual labels:  malware
Ff
Find files (ff) by name, fast!
Stars: ✭ 257 (-6.2%)
Mutual labels:  command-line-tool
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-8.76%)
Mutual labels:  scanner
Infectpe
InfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-2.92%)
Mutual labels:  malware
Tin Summer
Find build artifacts that are taking up disk space
Stars: ✭ 259 (-5.47%)
Mutual labels:  command-line-tool
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+973.72%)
Mutual labels:  scanner
Droid Hunter
(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-6.57%)
Mutual labels:  scanner
Menyoki
Screen{shot,cast} and perform ImageOps on the command line 🌱 🏞️
Stars: ✭ 255 (-6.93%)
Mutual labels:  command-line-tool
Invizzzible
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (-2.19%)
Mutual labels:  malware
Crypter
Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (-2.19%)
Mutual labels:  malware
Dockly
Immersive terminal interface for managing docker containers and services
Stars: ✭ 3,034 (+1007.3%)
Mutual labels:  command-line-tool

PHP malware scanner

Traversing directories for files with php extensions and testing files against text or regexp rules, the rules based on self gathered samples and publicly available malwares/webshells. The goal is to find infected files and fight against kiddies, because to easy to bypass rules.

How to install?

Simply clone the repository or with composer install globally composer global require scr34m/php-malware-scanner.

How to use?

Usage: php scan.php -d <directory>
    -h                   --help               Show this help message
    -d <directory>       --directory          Directory for searching
    -e <file extension>  --extension          File Extension to Scan
    -E                   --scan-everything    Scan all files, with or without extensions
    -i <directory|file>  --ignore             Directory of file to ignore
    -a                   --all-output         Enables --checksum,--comment,--pattern,--time
    -b                   --base64             Scan for base64 encoded PHP keywords
    -m                   --checksum           Display MD5 Hash/Checksum of file
    -c                   --comment            Display comments for matched patterns
    -x                   --extra-check        Adds GoogleBot and htaccess to Scan List
    -l                   --follow-symlink     Follow symlinked directories
    -k                   --hide-ok            Hide results with 'OK' status
    -r                   --hide-err           Hide results with 'ER' status
    -w                   --hide-whitelist     Hide results with 'WL' status
    -n                   --no-color           Disable color mode
    -s                   --no-stop            Continue scanning file after first hit
    -p                   --pattern            Show Patterns next to the file name
    -t                   --time               Show time of last file change
    -L                   --line-number        Display matching pattern line number in file
    -o                   --output-format      Custom defined output format
    -j                   --wordpress-version  Version of wordpress to get md5 signatures
                         --combined-whitelist Combined whitelist
                         --disable-stats      Disable statistics output

Ignore argument could be used multiple times and accept glob style matching ex.: "cache*", "??-cache.php" or "/cache" etc.

Extension argument defaults to ".php" and also can be used multiple times too.

  • --base64 is an alternative scan mode which ignores the main pattern files and uses a large list of php keywords and functions that have been converted to base64. Slower and prone to false positives, but gives additional base64 scanning coverage. These pattern files are located in base64_patterns and were derived from php 7 keywords and functions. Not many PHP extensions are included.
  • --comment flag will display the last comment to appear in the pattern file before the matched pattern, so documenting the pattern files is important.

Output formatting

Default output depending on the specified parameters, but the full format is "%S %T %M # {%F} %C %P # %L" and using ANSI coloring too.

Possible variables are:

  • %S - matching indicator, possible values are OK, ER, WL
  • %T - file change time
  • %M - file md5 hash value
  • %F - file with path
  • %P - pattern
  • %C - pattern comment
  • %L - matching pattern line number

Patterns

There are three main pattern files the cover different types of pattern matching. There is one pattern per line. All lines where the very first character is a "#" is considered a comment and not used as a pattern. Whitespace in the pattern files is not used.

  • patterns_raw.txt - Raw string matching
  • patterns-iraw.txt - Case insensitive raw string matching
  • patterns-re.txt- Regular expression matching.

Whitelisting

See whitelist.txt file for a predefined MD5 hash list. Only the first 32 characters are used, rest of the line ignored so feel free to leave a comment.

Wordpress md5 sum whitelisting

You can automatically add md5sum from wordpress core files by specifing version as argument to --wordpress-version or -j. Example:

scan -d . -j 4.9.2

That will automatically get md5sums from wordpress api (https://api.wordpress.org/core/checksums/1.0/?version=x.x.x) and add it to whitelist. To check your version simply check wp-includes/version.php file of your wordpress

Combined whitelist

This list is a pre generated database for opensource projects more information at https://scr34m.github.io/php-malware-scanner/ site. The scanner check for database hash validity and only download if it is different and of course when argument used.

Tools

text2base64.py

Takes a plaintext string as input and returns 3 base64 string equivalents. Python script that needs to be executed from the terminal to be used.

It is worth noting that the presence of one of the three output strings in a block of text does not 100% guarantee that the string was present in the original code. It is guaranteed that IF the subject string was present in the original code, then one of the three output strings will be present in the base64 version.

$ python tools/text2base64.py 'base64_decode'  
YmFzZTY0X2RlY29kZ  
Jhc2U2NF9kZWNvZG  
iYXNlNjRfZGVjb2Rl

An example: The presence of 'YmFzZTY0X2RlY29kZ' does not guarantee that 'base64_decode' is in the plain text code.
It is guaranteed that IF 'base64_decode' was present in the plain text code, then one of these three base64 strings WILL be present. The presence of 'YmFzZTY0X2RlY29kZ' in a block of code may be because 'ase64_decod' was in the original code.
ote the missing edge characters which is due to bit misalignment and character bleed.

Using as library

The scan.php perform a check, that it's called by commandline or not, so to use as library use different directory than scan.php it self.

<?php

require_once '../scan.php';

$scan = new MalwareScanner();
$scan->setFlagHideWhitelist(true);
$scan->setFlagHideOk(true);
$scan->run('../samples/test');

Resources

Licensing

PHP malware scanner is licensed under the GNU General Public License v3.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].