cmdaas
v1.0.0
Published
C-MDaaS CLI - Cloud Malware Detection as a Service
Maintainers
Readme
C-MDaaS CLI
Cloud Malware Detection as a Service - Command Line Interface
A powerful CLI tool for detecting malware in Windows PE files using machine learning.
🚀 Installation
Prerequisites
- Node.js 18+ (Download)
- Python 3.8+ with
pefileinstalled - C-MDaaS Backend running on
http://localhost:8000
Install Globally
npm install -gOr use locally:
npm install
npm startOr link for development:
npm link
cmdaas📖 Usage
Start the CLI
cmdaasLogin
- Username:
mohammed - Password:
password123
Main Commands
| Command | Description | |---------|-------------| | 🔍 Detect Malware | Scan a PE file for malware | | 📊 View Statistics | See your scan history | | ❓ Help | Show help information | | → Logout | End your session |
Example: Scan a file
- Select "🔍 Detect Malware"
- Enter file path:
C:\Windows\System32\notepad.exe - Press ENTER
- View results with confidence scores
🔧 Configuration
The CLI connects to:
- API URL:
https://cmdaas-backend.onrender.com(Default) orCMDAAS_API_URLenv var - Session file:
~/.cmdaas/session.json
🐛 Troubleshooting
"Classification failed: 401"
Solution: Your session expired. Logout and login again.
"Command failed: py ..."
Solution:
- Make sure Python is installed:
py --version - Install pefile:
pip install pefile
"Failed to parse features"
Solution: Make sure you're scanning a valid Windows PE file (.exe, .dll)
Backend not responding
Solution: Start the backend server:
uvicorn backend.api.main:app --reload📦 Project Structure
cli/
├── index.js # Main application
├── package.json # Dependencies
├── backend/
│ └── feature_extractor.py # PE feature extraction
└── README.md # This file🛠️ Development
Run locally
node index.jsInstall dependencies
npm installTest Python extractor
py backend/feature_extractor.py C:\path\to\file.exe📄 License
MIT License - See main project LICENSE file
🙏 Credits
Built with:
Made with ❤️ for C-MDaaS
