$_SERVER['DOCUMENT_ROOT'],); ////////////////////////////////// // DO NOT EDIT BELOW THIS LINE! // ////////////////////////////////// function output() { flush(); ob_flush(); } echo '

EVALBASE64DECODE Malware Detector

Please wait, we are currently searching for possible infected files...




'; output(); $contents_list = array("base64_decode", "eval"); // removing eval, just incase hacker decides to use spaces in syntax $directory = $config['dir']; function getDirContents($dir, &$results = array()){ $files = scandir($dir); foreach($files as $key => $value){ $path = realpath($dir.DIRECTORY_SEPARATOR.$value); if(!is_dir($path)) { $results[] = $path; } else if(is_dir($path) && $value != "." && $value != "..") { getDirContents($path, $results); $results[] = $path; } } return $results; } $files = getDirContents($directory); foreach ($files as $filename) { if($filename != __FILE__) { $file_content = file($filename); foreach ($file_content as $line) { foreach($contents_list as $content) { if(strpos($line, $content) !== false) { echo '

Possible Infection Found:  '.$filename.'

'; output(); } } } } }