SPECIALIZED SCANNERS

Specialized
Scanners

Advanced targeted scanning tools with 7 specialized modules designed to detect specific vulnerabilities, malicious code, and platform-specific security issues.

What are Specialized Scanners?

Specialized scanners are purpose-built security tools designed to detect specific types of vulnerabilities, malicious code, or platform-specific security issues. Unlike general-purpose scanners, these tools focus on particular technologies, attack vectors, or threat signatures with deep expertise in their domain.

These scanners leverage specialized knowledge about specific CMS platforms, web shells, backdoors, and attack tools to provide more accurate detection and detailed analysis. They can identify subtle indicators of compromise that generic scanners might miss, making them essential for thorough security assessments.

MAW-AIO's specialized scanner collection includes tools for WordPress security auditing, database interface scanning, FTP vulnerability detection, web shell hunting, and stress testing capabilities to evaluate system resilience under load.

7 Specialized Scanner Modules

17

WordPress Vuln Scanner

Operational

Comprehensive WordPress security scanner that identifies vulnerable plugins, themes, core versions, misconfigurations, and common attack vectors specific to WordPress installations.

Key Features:

  • WordPress version detection with CVE matching
  • Plugin and theme vulnerability scanning
  • User enumeration and weak password detection
  • XML-RPC and REST API security analysis
  • Backup file and debug log detection
18

PhpMyAdmin Scanner

Operational

Scan for exposed PhpMyAdmin installations and test common default credentials from .env files, identifying vulnerable database management interfaces.

Key Features:

  • PhpMyAdmin installation detection
  • .env file credential extraction
  • Automated authentication testing
  • Version-specific vulnerability checks
  • Common path enumeration
19

FTP Scanner

Operational

Scan for open FTP servers and test authentication with credentials from .env files or common default passwords to identify insecure file transfer services.

Key Features:

  • FTP service detection on port 21
  • Anonymous login testing
  • Credential-based authentication
  • Banner grabbing and version detection
  • Directory listing and file enumeration
20

Webshell Scanner

Operational Threat Detection

Detect web shells and malicious backdoor scripts on web servers using signature-based detection, heuristic analysis, and behavioral pattern matching.

Key Features:

  • 1000+ webshell signatures (c99, r57, WSO, etc.)
  • Suspicious code pattern detection
  • PHP, ASP, ASPX, JSP shell identification
  • Obfuscated code analysis
  • Common webshell path enumeration
21

ALFA Perl Scanner

Operational

Specialized scanner for detecting ALFA TEaM Perl shell installations, one of the most popular and feature-rich web shells used by attackers.

Key Features:

  • ALFA shell signature detection
  • Multiple version identification
  • Common installation paths
  • Perl CGI backdoor detection
  • Automated verification testing
22

Gsocket Scanner

Operational

Hunt for exposed Gsocket defunct.dat credential files with recursive directory scanning to identify unauthorized remote access tools and backdoors.

Key Features:

  • Gsocket defunct.dat file detection
  • Recursive directory traversal
  • Secret key extraction
  • Connection credential analysis
  • Backdoor persistence identification
23

MawDDoS Stress Tester

Maintenance

Advanced DDoS stress testing tool with multiple attack modes and anti-bot bypass capabilities for evaluating system resilience under high-load conditions.

Status:

Currently under maintenance

This module is being updated with enhanced capabilities and improved anti-detection features. Expected to be operational in the next release.

Planned Features:

  • Multiple attack vectors (HTTP, UDP, TCP)
  • Anti-bot protection bypass
  • Customizable payload generation
  • Real-time performance metrics

Detection Methodologies

Signature-Based

Uses predefined patterns and signatures to identify known threats, malware, and vulnerabilities with high accuracy and low false-positive rates.

Heuristic Analysis

Employs behavior-based detection to identify suspicious patterns and previously unknown threats through code analysis and anomaly detection.

Deep Inspection

Performs thorough code examination, deobfuscation, and structural analysis to uncover sophisticated threats and hidden backdoors.

Common Use Cases

Incident Response

  • Detect and identify web shells during breach investigations
  • Locate unauthorized access tools and backdoors
  • Identify compromised WordPress installations
  • Verify system integrity after security events

Proactive Security

  • Regular malware scanning on production servers
  • WordPress security hardening and vulnerability assessment
  • Continuous monitoring for exposed admin interfaces
  • Stress testing to validate DDoS mitigation

Important Security Notice

Authorized Use Only

These specialized scanners are powerful tools designed for authorized security testing and incident response. Unauthorized scanning, detection of web shells without permission, or stress testing of systems you don't own is illegal and punishable by law.

  • Never use stress testing tools against third-party systems
  • Do not scan systems without explicit written authorization
  • Respect rate limits and avoid service disruption
  • Use only on systems you own or have permission to test