Hey everyone,
I've developed a Python script that can help in scanning for potential backdoors or shells within your CMS. With the proliferation of CMS sources, ensuring the security of your system is paramount. Below is the script along with instructions on how to use it effectively:
Instructions:1. Copy the script provided below and paste it into a text editor like Notepad.
2. Save the file as "BackdoorScanner.py".
3. Replace the placeholder directory path ("C:/Users/path") with the actual source code directory path of your CMS.
4. Run the script must have python installed
-how to run phyton script
Notes:- The script scans files with extensions: .php, .java, .txt, and .html within the specified directory.
- Detected backdoor or shell patterns are logged in the "backdoor_scan_results.txt" file.
- It wont scan obfuscate code like if he hide it using ioncube or sourceguardian the script wont read it . ( i will also release a script to scan for obfuscate content)
Feel free to enhance the list of patterns according to your requirements or based on inputs from security forums.
For more comprehensive or newer known shell patterns, feel free to reach out to me privately. The reason why to avoid b4d actors to use the list as counter to their

activitiy.
Happy scanning and stay secure!
P/S : if i posted in wrong section kindly move it to the corresponding one. Thanks