COMPLETED
Technical summary
hf.sh is a Linux hosting forensic auditor, rewritten in Bash from the original hf.pl. It combines static file inspection and time-correlated evidence search across operational logs to identify probable upload/execution vectors.
Analysis architecture
Two execution phases:
- Static file analysis
- Time-window correlation
- permissions, size, metadata; - immutable attribute (chattr +i); - extension vs real MIME (spoofing checks); - risky code signatures (eval, base64_decode, etc.); - SHA-256 hash with VirusTotal lookup link.
- web logs (Apache/Nginx/domlogs); - panel traces (cPanel/DirectAdmin); - FTP logs (Pure-FTPd/ProFTPd/xferlog); - SSH/SFTP activity; - shell history when available.
Operational modes
# full mode (recommended with root)
hf.sh --mode full /home/account/public_html/index.php
# cPanel account-safe mode
hf.sh --mode user /home/account/public_html/suspicious.php
# non-colored output for CI/parsers
hf.sh --mode user --no-color /home/account/public_html/file.php
Mode semantics
full: attempts privileged host-level sources.user: restricts to account-safe sources by design.
Useful environment variables
HF_MODE=user HF_UNPRIVILEGED=1 HF_AUDIT_USER=account hf.sh /home/account/public_html/a.php
HF_MODE=full|userHF_UNPRIVILEGED=1HF_AUDIT_USER=<account>NO_COLOR=1
Output interpretation
MATCH FOUND (...): evidence source hit.SPOOFING DETECTED: extension/type mismatch.CRITICAL ALERT (immutable): file flagged with+i.- VirusTotal hash URL for quick enrichment.
Security and limits
- Read-only operation (no delete/move/remediation actions).
- Accuracy depends on log retention quality and timezone alignment.
.bash_historyis weak temporal evidence by default.- Audited-user validation reduces malicious input risk.
Install and direct usage
curl -O https://raw.githubusercontent.com/sr00t3d/cpanel-hf/refs/heads/main/hf.sh
chmod +x hf.sh
./hf.sh --version
Direct execution via curl:
bash <(curl -fsSL 'https://raw.githubusercontent.com/sr00t3d/cpanel-hf/refs/heads/main/hf.sh') --mode user /home/account/public_html/file.php
Stack and tooling
- Shell Script / Bash
- cPanel/WHM
- DirectAdmin
- grep/awk/sed/zgrep
- SHA-256 + VirusTotal hash lookup
Operational tags
- Bash
- Forensics
- cPanel
- DirectAdmin
- Incident Response
Operational outcome
- Faster probable attack-vector determination.
- Standardized forensic triage for malicious upload incidents.
- Better evidence quality for containment and hardening decisions.
GitHub progress (issues)
Real-time panel with latest repository issues.
live feed
open issues on GitHubcarregando andamento...
não foi possivel carregar as issues agora. abra no github pelo link acima.
Real results
Standalone forensic auditor for Linux/cPanel/DirectAdmin that correlates file metadata with multi-source logs to estimate probable file origin.
Architecture and organization
- Shell Script / Bash
- cPanel/WHM
- DirectAdmin
- Apache/Nginx logs
- FTP/SSH correlation
- VirusTotal hash
Execution and operations
The project follows reproducible execution flow with technical validation in production-like environments.
Screenshots
Talk about this project
Apply this implementation pattern in your environment and accelerate delivery with technical consistency.