You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-8
Original file line number
Diff line number
Diff line change
@@ -41,14 +41,31 @@ Simply pass a display option and an OPcache file.
41
41
42
42
43
43
## OPcache Malware Hunter
44
-
This tool helps detect malware hidden in OPcache files by searching specific keywords in the file's opcodes.
45
-
46
-
Pass an OPcache file or directory and the hunter will recursively go through all the `.php.bin` files.
47
-
48
-
$ ./opcache_malware_hunt.py malware.php.bin
49
-
Checking malware.php.bin
50
-
Found potentially dangerous keyword 'preg_replace'.
51
-
Found potentially dangerous keyword 'str_rot13'.
44
+
This tool helps detect malware hidden in OPcache files by looking for manipulated OPcache files. It compiles its own version of the source code, compares the compiled file
45
+
with the current cache file and checks for differences. **You must run this tool on the same system as the one where the cache files
46
+
have been compiled originally.**
47
+
48
+
OPcache malware hunter requires three parameters :
0 commit comments