About KicomAV


KicomAV is an open source (MIT License) antivirus engine designed for detecting malware and disinfecting it. In fact, Since 1995, it has been written in C/C++ and it was integrated into the ViRobot engine of HAURI, 1998. I decided to re-create a new KicomAV. So, this is developed in Python. Anyone can participate in the development easily.

1. How to use


Requirements

Quick start

2. Features


3. Components


KicomAV provides three command-line tools:

Tool Description
k2 Main scanner - scan files and directories for malware
k2d Daemon server - REST API and socket protocol service
k2c Client - communicate with k2d daemon

4. Daemon Mode (k2d & k2c)


KicomAV can run as a daemon server, providing both REST API (port 8311) and clamd-compatible socket protocol (port 3311).

Server (k2d)

# Start daemon server
k2d

# Start with API key authentication
k2d --generate-key

Client (k2c)

# Check server status
k2c --ping

# Scan a file
k2c /path/to/file

# Scan from stdin
k2c --stream < suspicious.exe

REST API Example

# Health check
curl http://127.0.0.1:8311/ping

# Scan a file
curl -X POST -F "file=@suspicious.exe" http://127.0.0.1:8311/scan/file

5. Releases


v0.41 (Jan 23, 2026)

v0.40 (Dec 30, 2025)

v0.33c (Sep 26, 2022)

v0.33b (Sep 24, 2022)

v0.33 (Mar 17, 2020)

v0.32 (Aug 1, 2019)

v0.31 (Jun 18, 2018)

v0.30 (Mar 07, 2018)

v0.29 (Jan 08, 2018)

v0.28 (Sep 4, 2017)

v0.27b (May 22, 2017)

v0.27a (May 17, 2017)

v0.27 (May 4, 2017)

v0.26 (June 16, 2016)

v0.25 (July 18, 2013)

v0.24 (July 7, 2013)

v0.23 (June 27, 2013)

v0.22 (June 16, 2013)

v0.21 (June 11, 2013)

v0.20b (June 1, 2013)

v0.20 (May 27, 2013)

v0.10 (May 8, 2013)

6. Supporters