Joomla-Anti-Malware-Scan-Script--JAMSS-
Joomla-Anti-Malware-Scan-Script--JAMSS- copied to clipboard
a Joomla! and WordPress Security script that automatically scans the Joomla! or Wordpress files for some patterns and "fingerprints" of malware, trojans or other injections into PHP code
is it alway in development? for joomla 4.0
Add support to detect Joomla 3.8+, the file `Version.php` is in a new location.
Had issues loading the site and thought maybe a malware issue. Ran php file within the main directory as noted and see... No Joomla CMS found here! Please check you...
Hi, I tried this but it is not working. it gives this error on J3.8.1. Maybe Joomla changed something. Kind regards, Tom
Although JSON files are not a threat, on the last websites I recovered from hacked to clean, I found Javascript obfuscated code on JSON files, maybe because the attacker just...
I'm finding this pretty hard to use. Take a look at this Pattern #17 - PHP: multiple encoded, most probably obfuscated code found --> found 1 occurence(s) in file ./templates/zenbase/tpls/blocks/fonts.php...
Hi A collegue discovered two manipulatetd gif files in his (Joomla-) template image folder, that starts straight with `
#025 \tmp\jed_checker\unzipped\shortcode v3.zip/plg_bdthemes_shortcodes/images/spinner.gif in line: 3 info code Pattern found#24 - PHP execution operator: backticks (``) in gif file backticks (``)! how it's possible to fix? have any solution?
My Joomla! version is the 3.5.0-rc. From JED Checker (component), I've got this. > Rule Jamss - JAMSS - Joomla! Anti-Malware Scan Script > # 001 > > example.php in...
Please consider detecting variable named functions. `\$[a-zA-Z0-9_]+\s+\(` so: `$`, valid variable name characters, maybe whitespaces and `(`. Thank you!