Daily Weekly Monthly

Daily Shaarli

All links of one day in a single page.

June 21, 2017

malware backdoors - check tools

Links of malware hack check tools :

Loki

Simple IOC Scanner
Scanner for Simple Indicators of Compromise

phpscanner

PHP scanner written in Python for identifying PHP backdoors and php malicious code. This tool is mainly reusing below mentioned tools. To use this tool, you need to install yara library for Python from the source.

php-malware-finder

Does its very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malwares/webshells. Detection is performed by crawling the filesystem and testing files against a set of YARA rules.

php-malware-scanner

Scans the current working directory and display results with the score greater than the given value. Released under the MIT license.

Yasca (GitHub)

an open source program which looks for security vulnerabilities, code-quality, performance, and conformance.

acunetix Web Security Scanner

Acunetix WVS automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.

RIPS

A static source code analyser for vulnerabilities in PHP .scripts

nikto2

an open source web server scanner which performs comprehensive tests against web servers for multiple items, including potentially dangerous files/program.

ClamAV extension for PHP (php-clamav) - a fork of the php-clamavlib project allows to incorporate virus scanning features in your PHP scripts.

Older projects: securityscanner, phpsecaudit.

Check also the following security websites:

sectools.org

phpsec.org PHP Security Consortium

    Founded in January 2005, the PHP Security Consortium (PHPSC) is an international group of PHP experts dedicated to promoting secure programming practices within the PHP community. Members of the PHPSC seek to educate PHP developers about security through a variety of resources, including documentation, tools, and standards.
Is Flagged null , are you banlisted ??

This tool is going to check if any URLs from your site are currently listed in a couple of Phishing DBs. If it finds any the tool will let you know if Google has the URL flagged for Social Engineering. It is also going to check the URL you enter to see if it is currently listed in Google’s Malware API, if Google has the URL flagged.

When you submit the tool will query the API to see if the URL is listed and respond with -

null -> The URL/domain is not currently flagged by Google, not in the Safe Browsing API.
MALWARE -> The domain is currently flagged by Google as malicious
SOCIAL_ENGINEERING -> The URL is currently flagged by Google as a SOCIAL_ENGINEERING URL, either "traditional phishing" OR deceptive content - SEE: Social Engineering (Phishing and Deceptive Sites)
UNWANTED_SOFTWARE -> The domain is currently flagged by Google for downloading unwanted software - SEE:Unwanted Software Policy
MALWARE, SOCIAL_ENGINEERING, UNWANTED_SOFTWARE -> You can probably figure this one out (real rare for this to occurr)