Skip to content

Commit

Permalink
Update fix.sh
Browse files Browse the repository at this point in the history
  • Loading branch information
PovilasKondrotas authored Nov 6, 2024
1 parent 905557d commit cf98853
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions fix.sh
Original file line number Diff line number Diff line change
Expand Up @@ -418,7 +418,7 @@ function func_list_suspicious_file {
function func_list_suspicious_file_subdomain {
echo -ne "${PURPLE}Enter clients subdomain name (without domain.tld, if subdomain is def.abc.com, enter just def): ${NC}"; read -r subdomainName

suspicious_Encoding=("eval(gzinflate(base64_decode\|eval (gzinflate(base64_decode\|eval(gzinflate (base64_decode\|eval (gzinflate (base64_decode\|eval(base64_decode\|eval (base64_decode\|gzinflate(base64_decode\|gzinflate (base64_decode\|gzinflate")
#suspicious_Encoding=("eval(gzinflate(base64_decode\|eval (gzinflate(base64_decode\|eval(gzinflate (base64_decode\|eval (gzinflate (base64_decode\|eval(base64_decode\|eval (base64_decode\|gzinflate(base64_decode\|gzinflate (base64_decode\|gzinflate")
dashed_line=("----------------------------------------------------------------------------------------------")
func_domain_selection;
cd ~/domains/"${domain_name}"/public_html/"${subdomainName}" || exit
Expand Down Expand Up @@ -679,9 +679,9 @@ function func_vulnerabilities_checker_all {

# WordPress core, plugins, themes
for x in domains/*/; do
cd ~/${x}public_html
cd ~/"${x}public_html" || exit
printf "=%.0s" {1..85}
printf "\nWorking on "${x}"\n"
printf "\nWorking on %s\n" "$x"
date
wp core version | curl -X POST -H "Content-Type: application/json" -H "Response-Type: table" http://iskander-api.heiko.xyz/core -d @-
wp plugin list --format=json | curl -X POST -H "Content-Type: application/json" -H "Response-Type: table" http://iskander-api.heiko.xyz/plugins -d @-
Expand Down Expand Up @@ -1143,7 +1143,7 @@ function backup_and_clean_js_injections() {
mysqldump -u"$DB_USER" -p"$DB_PASSWORD" -h"$DB_HOST" "$DB_NAME" > "$FULL_BACKUP_FILE"

# Create a backup file
BACKUP_FILE="../js_injection_backup_$(date +%Y%m%d_%H%M%S).sql"
#BACKUP_FILE="../js_injection_backup_$(date +%Y%m%d_%H%M%S).sql"
LOG_FILE="../js_injection_removal_log_$(date +%Y%m%d_%H%M%S).log"

# Tables and columns to check for JavaScript injections
Expand Down Expand Up @@ -1203,7 +1203,7 @@ function japanese_hack_cleanup() {
mysqldump -u"$DB_USER" -p"$DB_PASSWORD" -h"$DB_HOST" "$DB_NAME" > "$FULL_BACKUP_FILE"

# Create a backup file
BACKUP_FILE="../malware_backup_$(date +%Y%m%d_%H%M%S).sql"
#BACKUP_FILE="../malware_backup_$(date +%Y%m%d_%H%M%S).sql"
LOG_FILE="../removal_log_$(date +%Y%m%d_%H%M%S).log"

# Tables and columns to check
Expand Down

0 comments on commit cf98853

Please sign in to comment.