php-malware-detector
Code scanner
An application that uses rules and algorithms to identify malicious PHP code in files
PHP malware detector
132 stars
11 watching
15 forks
Language: PHP
last commit: almost 6 years ago
Linked from 1 awesome list
anti-malwareantivirusphpshell-detectorvulnerability-scanners
Related projects:
Repository | Description | Stars |
---|---|---|
php-gettext/php-scanner | Automates the process of analyzing PHP code to extract translation metadata for use with gettext | 14 |
psecio/parse | A tool to scan PHP code for potential security issues at compile-time | 366 |
0xbillyyy/scandir | A tool designed to scan directories and detect sensitive files using PHP. | 0 |
maaaaz/androwarn | Analyze Android app malice and detect malicious behaviors | 484 |
maldroid/maldrolyzer | A framework to analyze and extract data from Android malware, providing actionable information about malicious code. | 102 |
unicodeveloper/laravel-identify | A Laravel package to detect user's browser, operating system, language and device information. | 191 |
dustyfresh/php-vulnerability-audit-cheatsheet | A collection of grep commands to help find potentially vulnerable PHP code | 346 |
sonarsource/sonar-php | Analyzes PHP code for quality and security issues | 390 |
security-code-scan/security-code-scan | Detects vulnerabilities in C# and VB.NET code | 944 |
cbschuld/browser.php | A PHP class to detect a user's browser and platform using the user agent string. | 579 |
kasperskylab/klara | Helps Threat Intelligence researchers hunt for new malware by efficiently scanning large collections of files with Yara rules | 697 |
codeyourweb/fastfinder | Tools for detecting suspicious files and directories on Windows and Linux endpoints. | 232 |
psecio/canary | A security tool that enables input detection and response. | 30 |
jaybizzle/crawler-detect | A PHP class that detects bots and crawlers using user agent analysis. | 1,999 |
hejelylab/easeyara | A desktop application that enables quick and efficient scanning of systems for malware and suspicious activity using various scanning tools. | 30 |