����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#!/usr/bin/env bash
##
# Linux Malware Detect v2.0.1
# (C) 2002-2026, R-fx Networks <proj@rfxn.com>
# (C) 2026, Ryan MacDonald <ryan@rfxn.com>
# This program may be freely redistributed under the terms of the GNU GPL v2
##
export PATH=/sbin:/bin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
# $1 file path, $2 signature name, $3 file owner, $4 file mode, $5 file size (b), $6 file md5sum
if [ -f "$1" ]; then
sed -i -e '/<script>var.*jquery.min.php?.*encodeURIComponent.*jquery.min.php.*document.getElementsByTagName.*window.location.search.match.*;}<\/script>/d' "$1"
fi
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| base64.inject.unclassed | File | 566 B | 0755 |
|
| gzbase64.inject.unclassed | File | 594 B | 0755 |
|
| js.inject.VisitorTracker | File | 566 B | 0755 |
|
| js.inject.fakejquery02 | File | 610 B | 0755 |
|
| php.brute.bf1lic | File | 502 B | 0755 |
|
| php.inject.n1zb | File | 482 B | 0755 |
|
| php.malware.magentocore_ccskim | File | 656 B | 0755 |
|
| php_malware_hexinject | File | 656 B | 0755 |
|