From cef31aa5caf83080f72e5e7f85249bd6633763e1 Mon Sep 17 00:00:00 2001 From: Scott C Wilson Date: Wed, 3 Jul 2019 05:01:52 -0400 Subject: Fix some typos in the README --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index de5fb50..7f9b098 100644 --- a/README.md +++ b/README.md @@ -55,7 +55,7 @@ of [YARA](http://virustotal.github.io/yara/) rules. Yes, it's that simple! Instead of using an *hash-based* approach, PMF tries as much as possible to use semantic patterns, to detect things like -"a `$_GET` variable is decoded two times, unziped, +"a `$_GET` variable is decoded two times, unzipped, and then passed to some dangerous function like `system`". ## Installation @@ -64,7 +64,7 @@ This is also possible via some Linux package managers: Debian: `sudo apt-get install yara` Red Hat: `yum install yara` (requires the [EPEL repository](https://fedoraproject.org/wiki/EPEL)) -- Download php-maleware-finder `git clone https://github.com/nbs-system/php-malware-finder.git` +- Download php-malware-finder `git clone https://github.com/nbs-system/php-malware-finder.git` ## How to use it? @@ -90,7 +90,7 @@ whitelist system, and greedy regexps. Please note that if you plan to build yara from sources, libssl-dev must be installed on your system in order to have support for hashes. -Ho, and by the way, you can run the *comprehensive* testsuite with `make tests`. +Oh, and by the way, you can run the *comprehensive* testsuite with `make tests`. ## Whitelisting -- cgit v1.3