diff options
| -rwxr-xr-x | php-malware-finder/tests.sh | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/php-malware-finder/tests.sh b/php-malware-finder/tests.sh index c973196..4f1c765 100755 --- a/php-malware-finder/tests.sh +++ b/php-malware-finder/tests.sh | |||
| @@ -35,7 +35,6 @@ run_test freepbx.php '0x31d:$execution: system(base64_decode' | |||
| 35 | 35 | ||
| 36 | # Classic shells | 36 | # Classic shells |
| 37 | run_test classic/ajaxshell.php 'DodgyStrings' | 37 | run_test classic/ajaxshell.php 'DodgyStrings' |
| 38 | run_test classic/ajaxshell.php 'Websites' | ||
| 39 | run_test classic/ajaxshell.php '0x23e2:$: shell_exec' | 38 | run_test classic/ajaxshell.php '0x23e2:$: shell_exec' |
| 40 | run_test classic/ajaxshell.php "0x16e0:\$ini_get: ini_get('safe_mode" | 39 | run_test classic/ajaxshell.php "0x16e0:\$ini_get: ini_get('safe_mode" |
| 41 | run_test classic/ajaxshell.php "0x17f1:\$ini_get: ini_get('open_basedir" | 40 | run_test classic/ajaxshell.php "0x17f1:\$ini_get: ini_get('open_basedir" |
| @@ -92,7 +91,6 @@ run_test artificial/bypasses.php "0x132:\$var_as_func: \$_POST\['funct'\](" | |||
| 92 | run_test real/sucuri_2014_04.php '0x67:$execution3:' | 91 | run_test real/sucuri_2014_04.php '0x67:$execution3:' |
| 93 | run_test real/novahot.php 'DodgyStrings' | 92 | run_test real/novahot.php 'DodgyStrings' |
| 94 | run_test real/guidtz.php '0x12d8:$non_printables:' | 93 | run_test real/guidtz.php '0x12d8:$non_printables:' |
| 95 | run_test real/guidtz.php 'NonPrintableChars' | ||
| 96 | 94 | ||
| 97 | # Asp files | 95 | # Asp files |
| 98 | run_test_asp classic/cmdasp.asp 'DodgyStrings' | 96 | run_test_asp classic/cmdasp.asp 'DodgyStrings' |
