Joomla-Anti-Malware-Scan-Script--JAMSS- icon indicating copy to clipboard operation
Joomla-Anti-Malware-Scan-Script--JAMSS- copied to clipboard

a Joomla! and WordPress Security script that automatically scans the Joomla! or Wordpress files for some patterns and "fingerprints" of malware, trojans or other injections into PHP code

Results 11 Joomla-Anti-Malware-Scan-Script--JAMSS- issues
Sort by recently updated
recently updated
newest added

is it alway in development? for joomla 4.0

Add support to detect Joomla 3.8+, the file `Version.php` is in a new location.

Had issues loading the site and thought maybe a malware issue. Ran php file within the main directory as noted and see... No Joomla CMS found here! Please check you...

Hi, I tried this but it is not working. it gives this error on J3.8.1. Maybe Joomla changed something. Kind regards, Tom

Although JSON files are not a threat, on the last websites I recovered from hacked to clean, I found Javascript obfuscated code on JSON files, maybe because the attacker just...

I'm finding this pretty hard to use. Take a look at this Pattern #17 - PHP: multiple encoded, most probably obfuscated code found --> found 1 occurence(s) in file ./templates/zenbase/tpls/blocks/fonts.php...

Hi A collegue discovered two manipulatetd gif files in his (Joomla-) template image folder, that starts straight with `

#025 \tmp\jed_checker\unzipped\shortcode v3.zip/plg_bdthemes_shortcodes/images/spinner.gif in line: 3 info code Pattern found#24 - PHP execution operator: backticks (``) in gif file backticks (``)! how it's possible to fix? have any solution?

My Joomla! version is the 3.5.0-rc. From JED Checker (component), I've got this. > Rule Jamss - JAMSS - Joomla! Anti-Malware Scan Script > # 001 > > example.php in...

Please consider detecting variable named functions. `\$[a-zA-Z0-9_]+\s+\(` so: `$`, valid variable name characters, maybe whitespaces and `(`. Thank you!