Malice Comodo AntiVirus Plugin
This repository contains a Dockerfile of comodo for Docker's trusted build published to the public DockerHub.
- Install Docker.
- Download trusted build from public DockerHub:
docker pull malice/comodo
docker run --rm malice/comodo EICAR
$ docker run --rm -v /path/to/malware:/malware:ro malice/comodo FILE
Usage: comodo [OPTIONS] COMMAND [arg...]
Malice AVG AntiVirus Plugin
Version: v0.1.0, BuildTime: 20180903
Author:
blacktop - <https://github.com/blacktop>
Options:
--verbose, -V verbose output
--elasticsearch value elasticsearch url for Malice to store results [$MALICE_ELASTICSEARCH_URL]
--table, -t output as Markdown table
--callback, -c POST results back to Malice webhook [$MALICE_ENDPOINT]
--proxy, -x proxy settings for Malice webhook endpoint [$MALICE_PROXY]
--timeout value malice plugin timeout (in seconds) (default: 60) [$MALICE_TIMEOUT]
--help, -h show help
--version, -v print the version
Commands:
update Update virus definitions
web Create a Comodo scan web service
help Shows a list of commands or help for one command
Run 'comodo COMMAND --help' for more information on a command.
{
"comodo": {
"infected": true,
"result": "Malware",
"engine": "1.1",
"updated": "20170122"
}
}
Infected | Result | Engine | Updated |
---|---|---|---|
true | Malware | 13.0.3114 | 20170122 |
- To write results to ElasticSearch
- To create a Comodo scan micro-service
- To post results to a webhook
- To update the AV definitions
Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue.
See CHANGELOG.md
See all contributors on GitHub.
Please update the CHANGELOG.md and submit a Pull Request on GitHub.
MIT Copyright (c) 2016 blacktop