This script is designed to search throughout a file for instances of code/commands that could potentially be used for malicious purposes. Since basically all Linux commands are not designed for malicious purposes, scripts that perform certain tasks, such as system administration, will be shown as possibly malicious due to potential use of sudo/su or user/group management commands.

Currently, the usage is limited to scanning for Linux commands, but there are plans to expand usage to other types of files, such as Windows batch scripts.

The basic usage is to run the script with a file as the first argument. You can also input --help as the first argument for information. If the file type you're trying to scan is listed as unsupported, but is plaintext, you can use the -f (for force) option as the 2nd argument.

Report bugs and/or suggestions, and I will see about fixing/adding them to a new version.

This script is published under the GPLv3 (https://www.gnu.org/licenses/)

Features

  • Scans plaintext & BASH/SH scripts for potentially malicious commands

Project Activity

See All Activity >

Follow Malicious Script Detector

Malicious Script Detector Web Site

You Might Also Like
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Malicious Script Detector!

Additional Project Details

Registered

2022-04-08