Our win32 command-line scanner based on the Panda Engine v1.4.3 is still undergoing QA testing but we're releasing it here first for research purposes. Some of the new functionalities included are support of Vista platforms, Office12, SIS, MMS formats, low-level rootkit detection and more. Check out the specs of the Panda Engine v1.4.3 for more info.
The current Panda Antivirus Command-Line (aka PAVCL) is version 9.4.3.10 and can be downloaded from here. There's also a linux scanner available in (EDIT LINK) rpm and (EDIT LINK) tgz even though that is still based on a previous version of the engine. As soon as we're done integrating 1.4.3 into linux I'll post it here.
It's basic syntax is:
pavcl.exe [parameter] [what to scan]
Simply run "pavcl.exe" to get a complete listing of the available parameters. Some of the most interesting and commonly used ones are the following:
-nob |
Do not scan boot sector |
-del |
Delete infected files |
-cmp |
Seach for viruses in compressed files |
-clv |
Disinfect viruses found |
-heu:1 |
Activates heuristic high sensibility |
-nbr |
Does not allow Ctrl-C breaking of the program |
-nos |
Deactivate sounds |
-rpt:path |
Create a report file |
-aex |
Scan all extensions |
-mem |
Scan memory |
-nomem |
Do no scan memory |
Some typical examples:
pavcl -cmp -aex -clv c:windows
pavcl -cmp -aex -nob -nos -heu:1 -nomem "c:utilitiesdownloads from internet"
12 comments
It could be real nice to have that on a bootable linux cd with ntfs-3g that auto mount all ntfs drive on a pc. That would make a great rescue cd 🙂
I believe we include percisely this (a linux boot with the scanner) in our regular product CDs that come with the box when you buy it off the shelf.
sorry, i’m a little bit confused.
The version which is linked above doesn’t support Vista so far?
I tested this one under Vista (Ultimate), but ended without any operations or error messages.
What command line parameters are you using ash?
It would be nice if the CLI were to return a return code with the number of virii found, i.e. 0= no virus found, 13 would equal 13 virii found. This would greatly help automatation.
I tried it out but whatever I try to input to generate a rapport he never creates one. A bug or what am I doing wrong? 🙂
In what format is the rapport made? Standard text file?
It’s not necessary to define the -rpt switch. It’ll create a default standard text file report named ‘pavcl.log’ in the same directory as pavcl is running from, in the format:
[ date/time ] malware_name in pathfilename
How do you redirect the virus list info into the report file? I know the “-info” prints the info, but I have not been able to send it to the report file. I tried without specifying a report file and specifying a report file with “-rpt”. Thank you!
How do you send the virus revision date and number of detectable viruses info into a log file? I tried without specifying a log file and also with the “-rpt:” option, but the information is not making it to the log file. I also tried running with an individual command with the “-info”. thank you in advanced.
Harold try using -rpt:report.txt
the *.rpm & *.tgz links go nowhere, page not found.
2009-08-06
@mark, should be fixed now. Please try again.