summaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
Diffstat (limited to 'README.md')
-rw-r--r--README.md69
1 files changed, 69 insertions, 0 deletions
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..15b1d08
--- /dev/null
+++ b/README.md
@@ -0,0 +1,69 @@
1# PHP Malware Finder
2
3 ```
4 _______ __ __ _______
5 | ___ || |_| || |
6 | | | || || ___|
7 | |___| || || |___ Webshell finder,
8 | ___|| || ___| kiddies hunter,
9 | | | ||_|| || | website cleaner.
10 |___| |_| |_||___|
11
12Detect potentially malicious PHP files.
13```
14
15## What does it detect?
16
17PHP-malware-finder does its very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malwares/webshells.
18
19The following list of encoders/obfuscators/webshells are also detected:
20
21* [Best PHP Obfuscator]( http://www.pipsomania.com/best_php_obfuscator.do )
22* [Carbylamine]( https://code.google.com/p/carbylamine/ )
23* [Cipher Design]( http://cipherdesign.co.uk/service/php-obfuscator )
24* [Cyklodev]( http://sysadmin.cyklodev.com/online-php-obfuscator/ )
25* [Joes Web Tools Obfuscator]( http://www.joeswebtools.com/security/php-obfuscator/ )
26* [Php Obfuscator Encode]( http://w3webtools.com/encode-php-online/ )
27* [SpinObf]( http://mohssen.org/SpinObf.php )
28* [Weevely3]( https://github.com/epinna/weevely3 )
29* [atomiku]( http://atomiku.com/online-php-code-obfuscator/ )
30* [cobra obfuscator]( http://obfuscator.uk/example/ )
31* [phpencode]( http://phpencode.org )
32* [webtoolsvn]( http://www.webtoolsvn.com/en-decode/ )
33
34
35## How does it work?
36
37Detection is performed by crawling the filesystem and testing files against a [set]( https://github.com/nbs-system/php-malware-finder/blob/master/malwares.yara )
38of [YARA](https://plusvic.github.io/yara/) rules. Yes, it's that simple!
39
40
41## How to use it?
42
43```
44$ ./phpmalwarefinder -h
45Usage phpmalwarefinder [-cfhw] <file|folder> ...
46 -c Optional path to a configuration file
47 -f Fast mode
48 -h Show this help message
49 -v Verbose mode
50```
51
52Or if you prefer to use `yara`:
53
54```
55$ yara -r ./malwares.yara /var/www
56```
57
58## Whitelisting
59
60Check the [whitelist.yara]( https://github.com/nbs-system/php-malware-finder/blob/master/whitelist.yara ) file.
61If you're lazy, you can generate whitelists for entire folders with the [generate_whitelist.py]( https://github.com/nbs-system/php-malware-finder/blob/master/generate_whitelist.py ) script.
62
63## Licensing
64
65PHP-malware-finder is [licensed]( https://github.com/nbs-system/php-malware-finder/blob/master/LICENSE ) under the GNU General Public License v3.
66
67YARA (which is bundled with this software) is licensed under the Apache v2.0 license.
68
69Patches, whitelists or samples are of course more than welcome.