Contents
This tool scans text-based files: PHP, JS, HTML, TXT, Python, Ruby, Perl, Shell scripts, CGI, and ZIP archives.
It cannot fully scan binary files (EXE, DLL, PDF, Office macros, images).
Obfuscated PHP plugins, hidden admin backdoors, and code that dynamically constructs payloads may not be detected.
Large files or ZIPs may be slow or crash the browser if memory usage is high.
By using this tool you agree to the restrictions and limitations disclosed here.
Tool Suites:
| SEO Tools | Server Tools | Text Tools | Development Tools | Email Tools | Image Tools | More |
Introduction
The Malware Scanner uses entirely browser-based mechanics and lets the user scan individual files or ZIP archives for suspicious code patterns without the necessity of uploading to a server, thereby ensuring privacy and security. It supports all major types of text-based source code in the formats PHP, JS, Python, Ruby, Perl, Shell, CGI, HTML, TXT, and ZIPArchives.
Key benefits
— Scans directly within the browser; there is no uploading of files to the server, and thus any sensitive code stays local.
— Checks for typical malicious patterns such as eval(), base64_decode(), shell_exec(), system(), and any other suspicious code snippets.
— Reports are color-coded to denote safe files in green, suspicious ones in yellow, and binary files skipped in red, providing clarity at first glance.
— The scan report can be copied or downloaded for offline viewing or record-keeping.
This tool is a go-to option for anyone wanting their scripts, theme/plugin files, or code snippets just checked over quickly and privacy-friendly-like: developers, system admins, or website owners.