amsi 0.1.0

Wrapper for Windows Anti Malware Scan Interface
Documentation
  • Coverage
  • 88.24%
    15 out of 17 items documented1 out of 17 items with examples
  • Size
  • Source code size: 9.17 kB This is the summed size of all the files inside the crates.io package for this release.
  • Documentation size: 2.01 MB This is the summed size of all files generated by rustdoc for all configured targets
  • Links
  • naim94a/amsi
    9 3 0
  • crates.io
  • Dependencies
  • Versions
  • Owners
  • naim94a

Antimalware Scan Interface for Rust

Starting from Windows 10, and Windows Server 2016 the "Antimalware Scan Interface" is available as a native API which allows programs that run on Windows to invoke an Antivirus to scan a payload for malware.

The API may be useful for servers to inspect payloads before passing them on, such as email servers and many more.

This crate is a safe wrapper around the native WinAPI. The following functions are used:

  • AmsiInitialize
  • AmsiUninitialize
  • AmsiOpenSession
  • AmsiCloseSession
  • AmsiScanString
  • AmsiScanBuffer

Getting Started

Add amsi as a dependency to your project.

[dependencies]
amsi = "0.1.0"

Start scanning payloads.

fn main() {
    let malicious_file = r"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*";
    let ctx = amsi::AmsiContext::new("emailscanner-1.0.0").unwrap();
    let session = ctx.create_session().unwrap();
    let result = session.scan_string(r"C:\eicar-test.txt", malicious_file).unwrap();
    if result.is_malware() {
        println!("This file is malicious!");
    } else {
        println!("Seems to be ok.");
    }
}