Skip to content
This repository has been archived by the owner on Feb 11, 2024. It is now read-only.

Commit

Permalink
Fix some links in the readme
Browse files Browse the repository at this point in the history
  • Loading branch information
jvoisin committed Feb 11, 2020
1 parent c00804e commit 8c6c048
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions README.md
Expand Up @@ -50,7 +50,7 @@ both) category, and should re-read the previous statement.
## How does it work?

Detection is performed by crawling the filesystem and testing files against a
[set](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/php.yar)
[set](https://github.com/jvoisin/php-malware-finder/blob/master/php-malware-finder/php.yar)
of [YARA](http://virustotal.github.io/yara/) rules. Yes, it's that simple!

Instead of using an *hash-based* approach,
Expand All @@ -73,7 +73,7 @@ YACC=bison ./configure
make
```

- Download php-malware-finder `git clone https://github.com/nbs-system/php-malware-finder.git`
- Download php-malware-finder `git clone https://github.com/jvoisin/php-malware-finder.git`

## How to use it?

Expand Down Expand Up @@ -103,17 +103,17 @@ Oh, and by the way, you can run the *comprehensive* testsuite with `make tests`.

## Whitelisting

Check the [whitelist.yar](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/whitelist.yar) file.
Check the [whitelist.yar](https://github.com/jvoisin/php-malware-finder/blob/master/php-malware-finder/whitelist.yar) file.
If you're lazy, you can generate whitelists for entire folders with the
[generate_whitelist.py](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/utils/generate_whitelist.py) script.
[generate_whitelist.py](https://github.com/jvoisin/php-malware-finder/blob/master/php-malware-finder/utils/generate_whitelist.py) script.

## Why should I use it instead of something else?

Because:
- It doesn't use [a single rule per sample](
https://github.com/Neo23x0/signature-base/blob/e264d66a8ea3be93db8482ab3d639a2ed3e9c949/yara/thor-webshells.yar
), since it only cares about finding malicious patterns, not specific webshells
- It has a [complete testsuite](https://travis-ci.org/nbs-system/php-malware-finder), to avoid regressions
- It has a [complete testsuite](https://travis-ci.org/jvoisin/php-malware-finder), to avoid regressions
- Its whitelist system doesn't rely on filenames
- It doesn't rely on (slow) [entropy computation]( https://en.wikipedia.org/wiki/Entropy_(information_theory) )
- It uses a ghetto-style static analysis, instead of relying on file hashes
Expand All @@ -122,7 +122,7 @@ Because:
## Licensing

PHP-malware-finder is
[licensed](https://github.com/nbs-system/php-malware-finder/blob/master/php-malware-finder/LICENSE)
[licensed](https://github.com/jvoisin/php-malware-finder/blob/master/php-malware-finder/LICENSE)
under the GNU Lesser General Public License v3.

The _amazing_ YARA project is licensed under the Apache v2.0 license.
Expand Down

0 comments on commit 8c6c048

Please sign in to comment.