Submit
Path:
~
/
/
proc
/
self
/
root
/
opt
/
imunify360
/
venv
/
lib
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
/
File Content:
malicious.pickle
��� }�(�malware malicious list�}�(�return_type��MaliciousListAgentResponse��help�� Show the list of malicious files��type��dict��cli�}��users�]��root�as�schema�}�(�since�}�(�type��integer��coerce��int��default�K �help��+Show files found after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��,Show files found before this unix timestamp.�u�limit�}�(�type��integer��coerce��int��default�K2�help�� Page size�u�offset�}�(�type��integer��coerce��int��default�K �help��Page offset�u�search�}�(�type��string��nullable���help��(Search by file path and owner username. �u�site_search�}�(�type��string��nullable���help��(Search by site path and owner username. �u� by_scan_id�}�(�type��string��nullable���help��bSearch by scan id. Can be obtained via `malware on-demand list` or `malware on-demand list-user`. �u�user�}�(�type��string��nullable���help��GAdmins can filter results by user. Users can only see their own files. �u� by_status�}�(�type��list��schema�}��type��string�s�nullable���help�X Filter by status. Possible values: `found`, `cleanup_pending`, `cleanup_started`, `cleanup_done`, `cleanup_removed`, `cleanup_requires_myimunify_protection`, `cleanup_restore_pending`, `cleanup_restore_started`, `restore_from_backup_started`, `restored_from_backup`. �u�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�nullable���help��vList specific files by ID. IDs be obtained via `malware malicious list`. Conflicts with other filters and `order_by`. �u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["status+","scanid.started-"]` would order by `status` ascending and `scanid.started` descending. �uuu�"malware malicious remove-from-list�}�(�type��dict��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required��� positional���help��JList of file IDs to remove. IDs be obtained via `malware malicious list`. �u�items�}�(�rename��ids��help�� DEPRECATED�u�user�}�(�type��string��nullable���help�� (internal)�uu�help��JRemove entries from the list of malicious files without removing the files�u� malware malicious move-to-ignore�}�(�help��Move files to ignore list��type��dict��return_type��NumberAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required��� positional���help��HList of file IDs to move. IDs be obtained via `malware malicious list`. �u�items�}�(�rename��ids��help�� DEPRECATED�u�user�}�(�type��string��nullable���help�� (internal)�uuu�malware malicious cleanup�}�(�help��Cleanup malicious files��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required��� positional���help��KList of file IDs to cleanup. IDs be obtained via `malware malicious list`. �u�items�}�(�rename��ids��help�� DEPRECATED�u�user�}�(�type��string��nullable���help�� (internal)�u� standard_only�}�(�type��boolean��help�� (internal)�uuu�"malware malicious restore-original�}�(�help��CRestore the original copy that was created before a cleanup attempt��type��dict��return_type��SucceededFailedAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required��� positional���help��KList of file IDs to restore. IDs be obtained via `malware malicious list`. �u�items�}�(�rename��ids��help�� DEPRECATED�u�user�}�(�type��string��nullable���help�� (internal)�uuu�malware malicious diff�}�(�help��0Get difference between infected and cleaned file��type��dict��cli�}��users�]��root�as�schema�}�(�id�}�(�type��integer��nullable���coerce��int��help��pSpecific file by ID. IDs be obtained via `malware malicious list`. Conflicts with other filters and `order_by`. �u�user�}�(�type��string��nullable���help��GAdmins can filter results by user. Users can only see their own files. �uuu�malware malicious cleanup-all�}�(�help��Cleanup all malicious files��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�user�}�(�type��string��nullable���help�� (internal)�u� standard_only�}�(�type��boolean��help�� (internal)�uuu�malware cleanup status�}�(�help��"Show the status of running cleanup��type��dict��cli�}��users�]��root�asu�malware user cleanup�}�(�help��$Cleanup all files of a specific user��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�user�}�(�type��list��schema�}��type��string�s�required��� positional���help��NAdmins can cleanup files of any user. Users can only cleanup their own files. �u� standard_only�}�(�type��boolean��help�� (internal)�uuu�malware user restore-original�}�(�help��LRestore the original (infected) copy of all cleaned files of a specific user��type��dict��return_type��SucceededFailedAgentResponse��cli�}��users�]��root�as�schema�}��user�}�(�type��list��schema�}��type��string�s�required��� positional���help��NAdmins can restore files of any user. Users can only restore their own files. �usuu.
Submit
FILE
FOLDER
INFO
Name
Size
Permission
Action
history.pickle
1079 bytes
0644
history.yaml
1195 bytes
0644
ignore.pickle
2471 bytes
0644
ignore.yaml
2808 bytes
0644
imunify-patch-subscriptions.pickle
177 bytes
0644
imunify-patch-subscriptions.yaml
159 bytes
0644
malicious.pickle
5382 bytes
0644
malicious.yaml
6687 bytes
0644
malware-rebuild-patterns.pickle
270 bytes
0644
malware-rebuild-patterns.yaml
261 bytes
0644
malware-rescan-files.pickle
183 bytes
0644
malware-rescan-files.yaml
181 bytes
0644
malware-send-files.pickle
236 bytes
0644
malware-send-files.yaml
244 bytes
0644
on-demand-queue.pickle
2255 bytes
0644
on-demand-queue.yaml
2631 bytes
0644
on-demand-user.pickle
1521 bytes
0644
on-demand-user.yaml
1629 bytes
0644
on-demand.pickle
3216 bytes
0644
on-demand.yaml
3650 bytes
0644
read.pickle
482 bytes
0644
read.yaml
526 bytes
0644
submit.pickle
802 bytes
0644
submit.yaml
915 bytes
0644
user.pickle
1745 bytes
0644
user.yaml
1979 bytes
0644
vulnerabilities.pickle
2775 bytes
0644
vulnerabilities.yaml
3162 bytes
0644
N4ST4R_ID | Naxtarrr