Skip to content

dobin/avred-server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

avred-server

Provides an HTTP interface to scan files with the installed AntiVirus software on Windows via AMSI.

Details

To be used with the AV Reduction (avred) project. Exposes a port, which accepts a (virus) file and runs an AV against it.

Returns {"detected": true} if file was detected by AV, or {"detected": false} if it wasn't.

Setup

  1. Create a Windows VM and install the AV of your choosing (or use pre-installed Defender)
  2. install python3, pip3
  3. pip -r requirements.txt
  4. Disable sample submission on your AV
  5. Browser to http://localhost:8001/test to check if it works

Note: If you get a `ImportError: DLL load failed while importing _brotli", see google/brotli#782, solution is:

install "vc_redist.x64.exe" from this link https://support.microsoft.com/en-gb/help/2977003/the-latest-supported-visual-c-downloads

Run it as a windows service

Use nssm 2.24.101 from https://nssm.cc/ 64 bit version, use a admin terminal.

Find python.exe path:

C:\Users\hacker\Downloads>where python.exe
C:\Users\hacker\AppData\Local\Programs\Python\Python310\python.exe
C:\Users\hacker\AppData\Local\Microsoft\WindowsApps\python.exe

Configure service:

nssm.exe install AvredServer

Set exe, working directory and target python. Like:

nssm.exe set AvredServer Application "C:\Users\hacker\AppData\Local\Programs\Python\Python310\python.exe"
nssm.exe set AvredServer AppDirectory "C:\Users\hacker\Desktop\avred-server\"
nssm.exe set AvredServer AppParameters "C:\Users\hacker\Desktop\avred-server\avred_server.py"
nssm.exe start AvredServer

Test with http://localhost:8001/test

About

The AMSI server for Avred

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages