1.1.2

Co

Coral

Coral CC

PHP Intrusion Detection and File Integrity Platform

Take back your peace of mind and take an active step to prevent the loss of resources and web security with Coral! Coral is a unique PHP-powered intrusion detection and file integrity monitor designed to keep your website, web application, or blog safe from the dark exploits of people who are up to no good. It takes some of the most powerful Linux security ideas and puts them into a slick and easy to use web interface. Coral is powerful and feature rich and aims to keep your online assets safe.

Server and Host Requirements

Apache Web Server

PHP 7.1.3

A MySQL or MariaDB Database

Javascript Enabled Browser

Additional Details

  • OS: Linux (Redhat/Debian)*
  • Framework: Slim 3
  • CLI: Yes

* OS Support is limited to Linux OS only


Listed information is for the current Coral version 1.1.1. Additional dependencies can be found in the composer.json file.

Get serious about your website's security

Watch Coral Screencast

Learn more about the application and watch a quick video on how to get up and running with Coral!

If you are having trouble playing the video, right click on it to download.

A Wordpress site's best friend!

Coral is a stand-alone application, but it is highly useful when purposed for Wordpress code inspection. Coral is a file integrity scanning tool that allows you to get instant notification when there are modifications to your Wordpress site. Additionally, Coral creates safe backups and allows you to restore a safe copy of bad files without hunting down where the problem is. It is also adept at finding insecure PHP code in your themes and plugins. If you use Wordpress, you should really be using Coral!

Thanks to the stand-alone nature of Coral, it can safely sit on your site and help you find out when bad guys are doing their nasty deeds. Whether it is Wordpress, Joomla!, or Drupal - Coral will inspect and find malicious code.

Built to protect Wordpress Sites

Features

Please refer to your version's manual for product specific features


Easy 3-Step Installation

Installing Coral is just as easy as Wordpress! There are just three steps: edit your config.php file, create your database tables at the click of a button, and then create your account! For such a powerful security application, it doesn't get much easier!

An Intuitive Dashboard

Get a bird's eye view of all monitors!

Multiple System Logs

Coral keeps tracks of everything going on. Logs are maintained in your database and on the live file system. this includes errors, scan results, and other important information to help keep your site safe!

Monitor your Site in Chunks

Coral works by creating monitors which are folders and their sub-folders in your public_html or web root. You can setup multiple monitors to keep an eye on specific areas of your site, such as a Wordpress blog, a Joomla! install, or you can just watch the entire thing.

Vigilant and Automated

You can configure Coral to run automatically on linux based servers with unique cron api routes. Each monitor can be run independently to maximize server performance. Coral was designed to have a small footprint, and has been clocked performing a comprehensive, line by line, scan of Drupal 8, which has over 12K files, at about 5 minutes (0.03s per/file).

Easy to Understand Snapshots

Coral uses snapshots to let you know what's going on with your site. It specializes in identifying unique threats for PHP websites and web applications. You don't have to be a genius or programmer to understand when you need to take action. Depending on website's file permissions, Coral can even be configured to handle certain threats automatically!

Keep an eye on all those files

Coral builds a safe duplicate of your files and securely stores them away as a safe-state when performing scans. Coral makes finding files by their extension type a breeze. You can easily find suspicious files without the hassle and can even search by filename to drill down through potentially thousands of files.

Zoom in and check stuff out at the file level

You can "zoom" in and take a look at each and every file that Coral monitors independently and get a specific threat assessment for that file. You can take action, all from within the dashboard, to correct a situation from a secure, safe-copy or repository of your monitor.

Independent options for fine control

Each monitor can be configured to behave differently. You can limit what files get placed in the repository, and configure Coral to try and "auto-magically" handle threats when it performs one of three routine scans.

Don't Manage your website alone?

You can create multiple user accounts for your business. You can configure Coral to email every registered user after each scan is complete or when an important event is triggered. All Coral user accounts have the same access.

Built in Documentation!

Everything you need to know to operate Coral efficiently and effectively is included in the built in documentation. There isn't a need for you to ever have to leave your application to figure out to do something.

Command Line Interface

Coral 1.1.0 and later features a new command line interface (CLI) for interacting with Coral on the command line! Using the CLI, you can run security routines manually or using cron without the limitations exposed to PHP when travelling via HTTP!

Fine Tuned for Maximum Performance

Coral is a lightweight, but extremely useful, application that is designed to be hands off. It is focused on the non-tech savvy business owner or website manager, who wants an easy way to check their site for vulnerabilities. It's warm interface design is made to reassure you that threats have no place on your website!

Comprehensive Scan Benchmarks

The most exhaustive scan Coral offers. It goes through every monitored file line by line and performs all the quick checks in addition to doing it! The optimize scan option cuts this even further by skipping the line-by-line process for files that match the repository profile.


Application File Count Performance Comparison in Seconds
Drupal 8 12,218
300s
Joomla! 3 4,538
125s
Wordpress 4 1,297
35s
Entity 2 250
7s
Serenity 2 214
6s

Comprehensive Scans shown were configured to not include images, audio, or video files, or optimizations.

Minimize Threats

Coral actively monitors your website and web application data to look for tampering and actively responds to any threats it finds.

Notification of Threats

Get usable and reliable information about threats as soon as they arise. No more "grep"-ing through files and folders looking for hidden exploits. Coral will find them for you.

Automated and Vigilant

Coral can be configured to run when you are not around. It will send you email messages with a monitor report that lets you know each and every time it runs what it found.

Seamless Integration

Coral doesn't care if it is Wordpress, Joomla!, Drupal, or just a bunch of random files. You tell it where to look and it builds an active repository looking for changes and common PHP-based code injection attacks.

What are you waiting for?

Buy Coral CC