malwi / README.md
schirrmacher's picture
Update README.md
1d66f22 verified
---
license: mit
---
<div align="center">
# malwi - AI Python Malware Scanner
<img src="malwi-logo.png" alt="Logo">
<a href='https://huggingface.co/schirrmacher/malwi'><img src='https://img.shields.io/badge/%F0%9F%A4%97%20HF-Model-blue'></a>
</div>
## Key Features
- πŸ›‘οΈ **AI-Powered Python Malware Detection**
- ⚑ **Lightning-Fast Codebase Scanning**
- πŸ”’ **100% Offline & Private**
- πŸ’° **Free & Open-Source**
- πŸ‡ͺπŸ‡Ί **Developed in the EU**
### 1) Install
```
pip install --user malwi
```
### 2) Run
```bash
malwi scan examples/malicious
```
### 3) Evaluate: a [recent zero-day](https://socket.dev/blog/malicious-pypi-package-targets-discord-developers-with-RAT) detected with high confidence
```
__ __
.--------.---.-| .--.--.--|__|
| | _ | | | | | |
|__|__|__|___._|__|________|__|
AI Python Malware Scanner
- target: examples
- seconds: 1.87
- files: 14
β”œβ”€β”€ scanned: 4 (.py)
β”œβ”€β”€ skipped: 10 (.cfg, .md, .toml, .txt)
└── suspicious:
β”œβ”€β”€ examples/malicious/discordpydebug-0.0.4/setup.py
β”‚ └── <module>
β”‚ β”œβ”€β”€ archive compression
β”‚ └── package installation execution
└── examples/malicious/discordpydebug-0.0.4/src/discordpydebug/__init__.py
β”œβ”€β”€ <module>
β”‚ β”œβ”€β”€ process management
β”‚ β”œβ”€β”€ deserialization
β”‚ β”œβ”€β”€ system interaction
β”‚ └── user io
β”œβ”€β”€ run
β”‚ └── fs linking
β”œβ”€β”€ debug
β”‚ β”œβ”€β”€ fs linking
β”‚ └── archive compression
└── runcommand
└── process management
=> πŸ‘Ή malicious 0.98
```