Manage antivirus, rootkit-detection, and UFW host firewall on a Linux desktop — install ClamAV/ClamTk/rkhunter (core) plus optional advanced tools (Lynis, chkrootkit, AIDE, debsecan), keep definitions current, run scans, schedule periodic runs, and configure conservative desktop-tuned UFW rules. Scan results stored in a user-defined folder set up on first run.
npx claudepluginhub danielrosehill/claude-code-plugins --plugin linux-av-managerInstall the optional advanced security-audit layer on top of the core AV set — Lynis (system hardening audit), chkrootkit (second-opinion rootkit scanner), AIDE (file integrity DB), debsecan (Debian/Ubuntu CVE scanner). Lets the user pick a subset; doesn't force the full stack. Triggers on "install lynis", "add advanced AV tools", "install rootkit/audit tools".
Install the core AV tool set on Linux — ClamAV (clamscan + clamd + freshclam), ClamTk (GUI front-end), rkhunter. Uses the package manager recorded by `onboard`. Configures freshclam to run as a service, runs an initial definitions update, and updates `installed` flags in plugin config. Triggers on "install AV core", "install clamav", "set up antivirus".
First-run setup for linux-av-manager. Picks a scan-results folder (default ~/linux-av-manager/scans/), records distro/package-manager info, detects which AV tools are already installed, and offers to install the core set (ClamAV, ClamTk, rkhunter). Triggers on "set up linux-av-manager", "first run", or any scan/install request when no config exists.
Run an on-demand security scan with one or more installed tools — ClamAV (clamscan / clamdscan against home or a chosen path), rkhunter, chkrootkit, Lynis (system audit), AIDE (integrity check). User picks scope (quick / deep / specific path) and which scanners to run. Reports go to the user-defined scan-results folder, organised per tool with timestamped filenames. Triggers on "scan my system", "run clamav", "rkhunter scan", "lynis audit".
Set up periodic AV scans on a Linux desktop using systemd timers (preferred) or cron. Schedules definition updates plus scans (ClamAV, rkhunter, Lynis) at user-chosen cadences (e.g. daily definitions refresh, weekly quick scan, monthly deep scan). Wires desktop notifications on findings via notify-send / libnotify. Triggers on "schedule scans", "set up periodic AV", "automate clamav".
Maintain an existing UFW ruleset on a Linux desktop — list current rules, diff against the saved baseline, add or remove individual rules, dedupe redundant entries, flag overly-permissive rules (any-source allows, broad port ranges), and snapshot the new state. Triggers on "show ufw rules", "add ufw rule", "remove ufw rule", "audit ufw", "update firewall".
Set up UFW (Uncomplicated Firewall) on a Linux desktop with conservative, desktop-appropriate defaults — deny incoming, allow outgoing, allow established/related, allow common LAN-only services if present (mDNS, KDE Connect, syncthing) only after asking. Does NOT impose aggressive rules that break common desktop workflows. Triggers on "set up ufw", "configure firewall", "first-time ufw".
Refresh signature databases and definition files for every installed scanner — freshclam (ClamAV), rkhunter --update, lynis update info, AIDE differential check (does NOT promote a new baseline), debsecan suite refresh. Reads installed flags from plugin config and skips tools that aren't present. Triggers on "update AV definitions", "refresh signatures", "update clamav".
Claude Code plugin for managing antivirus, rootkit-detection, and host firewall on a Linux desktop. Layered approach: install a small "core" set first (ClamAV, ClamTk, rkhunter), add advanced tools (Lynis, chkrootkit, AIDE) on top when wanted, set up UFW with desktop-appropriate defaults, keep definitions current, run scans, and schedule periodic runs.
onboard — first-run setup. Picks the scan-results folder, records system info, and offers to install the core tool set.install-core — install ClamAV (CLI + daemon + freshclam), ClamTk (GUI front-end), rkhunter.install-advanced — install optional layer: Lynis, chkrootkit, AIDE, debsecan.update-definitions — refresh signature databases for every installed scanner.scan — on-demand scan with one or more installed scanners; report to scan-results folder.schedule — periodic runs via systemd timers (preferred) or cron, with desktop notifications on findings.ufw-setup — first-time UFW setup tuned for desktops: deny incoming, allow outgoing, opt-in LAN allows for mDNS / KDE Connect / Syncthing / Samba / CUPS only after asking. Conservative — won't break common desktop workflows.ufw-maintain — list, diff against baseline, add / remove / dedupe rules, flag overly-permissive entries, snapshot after every change.claude plugins install linux-av-manager@danielrosehill
This plugin manages defensive AV and host-firewall tooling for personal/desktop use. It does not perform offensive scans, exploit testing, or evade detection.
Claude + Google Stitch workflow toolkit with MCP integration (prompt authoring, screen generation, design extraction)
Share bugs, ideas, or general feedback.
The most comprehensive Claude Code plugin — 48 agents, 182 skills, 68 legacy command shims, selective install profiles, and production-ready hooks for TDD, security scanning, code review, and continuous learning
Comprehensive skill pack with 66 specialized skills for full-stack developers: 12 language experts (Python, TypeScript, Go, Rust, C++, Swift, Kotlin, C#, PHP, Java, SQL, JavaScript), 10 backend frameworks, 6 frontend/mobile, plus infrastructure, DevOps, security, and testing. Features progressive disclosure architecture for 50% faster loading.
Core skills library for Claude Code: TDD, debugging, collaboration patterns, and proven techniques
Tools to maintain and improve CLAUDE.md files - audit quality, capture session learnings, and keep project memory current.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim