- Modes (top dropdown)
- Sanitize → Suspicious code is commented out or neutralized instead of fully deleting the file.
- Quarantine → Suspicious files are moved to a quarantine folder (safe zone).
- Delete → Suspicious files are permanently removed.
- Warn Only → No changes are made, the tool only reports issues.
- Options (checkboxes & inputs)
- Auto-apply during scan → Automatically apply the selected action as files are detected.
- Dry-run (no destructive action) → Simulation mode. The tool only reports results but makes no actual changes. (Safe for first scans).
- Extensions (comma or * for all) → Choose which file types to scan (e.g., *.php, *.js or * for all).
- Exclude dirs (comma) → Skip certain directories (e.g., .git, node_modules).
- Protect extensions → Files with extensions like .jpg, .png, .css, .woff will never be deleted or modified unless Force is checked.
- Force modify protected files → Even protected files can be changed (use with caution).
- Main Buttons
- Select Folder → Choose the folder to scan (e.g., your project).
- Scan / Stop → Start or stop the scanning process.
- Apply action to selected → Apply the chosen mode (Sanitize/Quarantine/Delete) to only the highlighted rows in the results table.
- Open Quarantine → Opens the quarantine folder where suspicious files are stored.
- Restore All (manifest) → Restore files from quarantine based on the saved manifest.
- Open Backups → Open backup copies of cleaned/modified files.
- Export CSV → Export the scan report as a .csv file for external review.
- Exit → Close the program.
- Results Table
- File → The full path of the scanned file.
- Patterns → The suspicious code pattern found (e.g., eval(, exec().
- Protected → Whether the file is protected by extension rules.
- Action → The suggested action (sanitize, quarantine, delete, warn).
- Applied → Shows if the action has been applied yet.
- Status Bar (bottom)
- Shows progress, number of files scanned, and how many suspicious matches were found.
- Example: Done. Scanned 8703 files. Found 48.
- Run a scan with Dry-run ON → review results.
- Switch to Sanitize or Quarantine → Apply action to suspicious files.
- If satisfied, use Delete only for confirmed backdoors.
- Export CSV report for record-keeping.
- Use Open Backups / Quarantine if you need to restore files.