$ docker run -d -p 3993:3993 malice/fprot web
INFO[0000] web service listening on port :3993$ http -f localhost:3993/scan malware@/path/to/evil/malwareNOTE: I am using httpie to POST to the malice micro-service
HTTP/1.1 200 OK
Content-Length: 124
Content-Type: application/json; charset=UTF-8
Date: Sat, 21 Jan 2017 05:39:29 GMT
{
"f-prot": {
"infected": true,
"result": "EICAR_Test_File (exact)",
"engine": "4.6.5.141",
"updated": "20170122"
}
}