Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
 
 
 
 
Go to file
Swissky e3b1d7fb3c Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
.github SPONSOR - Adding sponsor button 2019-09-22 16:12:30 +02:00
test Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
utils Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
.gitignore Check for constant var 2017-11-14 11:10:21 +01:00
LICENSE License added 2017-05-27 21:05:28 +02:00
README.md Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
detection.py Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
functions.py Fixes for errors by pycodestyle (except E501) to run it 2019-04-05 16:32:45 +02:00
index.py Fix maximum recursion error + catch hardcoded password in define() 2020-01-09 22:59:26 +01:00
indicators.py Fixes for errors by pycodestyle (except E501) to run it 2019-04-05 16:32:45 +02:00

README.md

PHP_Code_Static_Analysis

Python 3.4+

Basic script to detect vulnerabilities into a PHP source code, it is using Regular Expression to find sinkholes.

╭─ 👻 swissky@crashlab: ~/Github/PHP_Code_Static_Analysis  master*
╰─$ python index.py --dir test    
------------------------------------------------------------
Analyzing 'test' source code
------------------------------------------------------------
Potential vulnerability found : File Inclusion
Line 19 in test/include.php
Code : include($_GET['patisserie'])
------------------------------------------------------------
Potential vulnerability found : Insecure E-mail
Line 2 in test/mail.php
Code : mail($dest, "subject", "message", "", "-f" . $_GET['from'])
Declared at line 1 : $dest = $_GET['who'];

Currently detecting :

  • SQL injection
  • Local File Inclusion
  • Insecure emails
  • Cross Site Scripting
  • Remote Commands Execution
  • LDAP injection
  • XPATH injection
  • Header injection
  • URL redirection
  • Hardcoded credential

if you want to export each vulnerabilities type into a folder use the "export.sh"

Don't forget to read the license ;)