rokki v0.1.2
rokki
Rokki is a simple web-sites malware scanner inspired by Manul Antimalware Tool. The tool has been developed to help system administrators to find malware in websites without a need to install PHP on the server.
Installation
Run npm install -g rokki in your terminal
Usage
rokki [options] [file/directory]
Options:
-h, --help- output usage information-V, --version- output the version number-v, --verbose- be verbose-r, --recursive- scan directories recursively. All the subdirectories in the given directory will be scanned-l, --log <file>- save scan report to #file.--json- save scan report in JSON format.--exclude <regex>- don't scan file names matching regular expression.--exclude-dir <regex>- don't scan directory names matching regular expression.--include <regex>- only scan file matching regular expression.--include-dir <regex>- only scan directory matching regular expression.--max-filesize <n>- scan files with size at most #n kilobytes (default: 100 MB)-w, --whitelist <file> - use whitelist database to minimize false positive results-p, --product <name> - provide product information added to the whitelist database--update-whitelist - add files signatures to the whitelist database provided by --whitelist parameter
Examples
Check all files in /var/www/htdocs folder.
$ rokki -r /var/www/htdocs
Check only JavaScript in /var/www/htdocs folder and show the list of all checked files.
$ rokki -r -v --include \.js$ /var/www/htdocs
Add WordPress to whitelist.
$ rokki --update-whitelist -w ./whitelist.sqlite -p "WordPress 4.3.1" ./temp/wordpress
Check all files in /var/www/htdocs folder using whitelist.
$ rokki -r -w ./whitelist.sqlite /var/www/htdocs
Warning
This tool does not have auto-update mechanism. Please make sure you have the latest NPM package installed.
Credits
- Manul Antimalware Tool by Peter Volkov (peter.r.volkov@yandex.ru) and Greg Zemskov (ai@revisium.com)
- w3af by Andres Riancho and contributors.
- Bar4mi WebShell Finder by Simon Ryeo (bar4mi@gmail.com)