Skip to content

Latest commit

 

History

History
52 lines (28 loc) · 2.84 KB

README.md

File metadata and controls

52 lines (28 loc) · 2.84 KB

Antivirus

Codacy Badge

Antivirus model developed by me during my internship at the Institute of Computer Technology

Detects in real-time malware such as virus signatures, code caves, and system DLL spoofing. Has a simulation of a remote real-time database of virus signatures (used EICAR signature as an example)

Technology stack used: C#, C++, .NET Framework, WPF, Win32 API, MS-SQL (for system DLLs unautorized changes tracking), Firebase (to imitate some remote virus signature), encryption and decryption systems (MD5, SHA1)

Examples: 1. Main window (here you can start or stop real-time protection, or start to scan separate file or directory):

image

2. Malware detected (here you can delete the infected file and end processes associated with it, add it to exclusions, skip this file, update its checksum, or end the scan):

image

3. Choose separate file or directory to scan (you can allow or deny checksum verification and access to the remote database of virus signatures):

image

image

4. Directory scanning:

image

5. Settings window (here you can edit the list of trusted processes, the list of files checksum, and allow or deny accsess to the remote database:

image

6. The list of files checksums (here you can add, edit or clear the list):

image image

7. Remote virus signatures database (Firebase) simulation structure:

image

Project structure:

image

Auto-generated class diagram:

image