Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Finally..... Antivirus........ :)

Finally..... Antivirus........ :)

Scheduled Pinned Locked Moved The Lounge
combusinesssalesquestion
68 Posts 31 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Greg Lovekamp

    "Shying" away from a company might make sense from the standpoint of wanting to finish your education before starting a career; however, continually backing away from all legitimate work is not encouraging anyone to actually utilize your product. Humans are not attracted to that which lurks in the shadows.

    L Offline
    L Offline
    Lost User
    wrote on last edited by
    #55

    Sir, how could a person who is in the mid of his bachelor's degree could skip his education and join in a company? I could be surrounded by a person's who might hold masters. Anyone in this situation could shy. It is impractical to skip my education i.e if some unexpected things happened then I can't go back and continue studies. I am not backing off, the job of the student is to study

    1 Reply Last reply
    0
    • A Ancient Zygote

      You have very specific dreams, which I suppose could go either way as far as increasing your chances of accidentally becoming a billionaire (like Bill Gates, Zuckerberg, etc....don't think any of those on this kind of list had a particular dream other than to play with computers and somehow make money at it). I would like to see what you developed, but am scary about visiting any links that don't meet security checks, which these days amounts to a reputation check (that is a Catch-22 of course). If you put it up at github, let me know (please don't use sourceforge.net---those people still scare the hell out of me...never know if something is going to pop up from an install and scurry across the room to infect the denizens of earth). ...and that segues to to my own thoughts on anti-malware lately, which is that it would be nice to have access to a massive database of reputation scan information and code hashes. VirusTotal does make their database API available, but unless you provide information to them you are limited to 4 queries per minute (so on my machine with tens of thousands of files someone will have proven NP == P by the time the scan completes, at which time the Universe will evaporate).

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #56

      Yes, Sir the project is hosted on Github GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^]

      A 1 Reply Last reply
      0
      • L Lost User

        Yes, Sir the project is hosted on Github GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^]

        A Offline
        A Offline
        Ancient Zygote
        wrote on last edited by
        #57

        Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).

        L 2 Replies Last reply
        0
        • A Ancient Zygote

          Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #58

          Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]

          1 Reply Last reply
          0
          • A Ancient Zygote

            Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #59

            Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]

            A 1 Reply Last reply
            0
            • L Lost User

              Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:

              A Offline
              A Offline
              AlphaDeltaTheta
              wrote on last edited by
              #60

              VISWESWARAN1998 wrote:

              Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it

              When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.

              Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source

              L 1 Reply Last reply
              0
              • A AlphaDeltaTheta

                VISWESWARAN1998 wrote:

                Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it

                When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.

                Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #61

                Sir, I know about ClamAV it is not too much for windows, It primarily concentrates on *nix operating systems. Yes,there is Windows specific ClamWin but is it not drawing too much of attention. Another free products will perform very well than that! I don't know what to do so I made my project as open-source. I made a mistake, I've have concentrated only on how the project can be implemented and totally forgetting what I am going to do for the resources. But the project is not dead yet! I dont know why I can't move away from this. I thought I would start my career by creating an AV company of my own at-least I expect to get job in some other AV company

                1 Reply Last reply
                0
                • L Lost User

                  Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]

                  A Offline
                  A Offline
                  Ancient Zygote
                  wrote on last edited by
                  #62

                  I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi

                  L 1 Reply Last reply
                  0
                  • L Lost User

                    Sir, It will work fine along with your primary antivirus and will not slow down your system. Kindly have a look at it GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^] I am quiet sure there is no open-source ransomware or any-other threats. :cool: It has various other bunch of tools too...

                    T Offline
                    T Offline
                    tausif ik
                    wrote on last edited by
                    #63

                    Its a good attempt but there is no easy way to make money in this business. If you can detect viruses faster than any big guys do there is a good chance your tech will be purchased by them

                    1 Reply Last reply
                    0
                    • OriginalGriffO OriginalGriff

                      Strange - I moved to Kaspersky because Defender slugged the computer for several hours every afternoon, despite being told to scan between midnight and 05:00. Kaspersky does nothing slow on my PC at all - and it's only a dual core with 4GB of RAM! Just goes to show that PC are far too different for their own good sometimes! :laugh:

                      Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                      M Offline
                      M Offline
                      mtiede
                      wrote on last edited by
                      #64

                      Odd. I run Defender. Never had it slow down anything. This computer runs quite well. McAfee on the other hand was a killer. I had another computer that had to turn on the fan every time there was a scan. And the scan NEVER finished. It kept running until it used up all the memory.

                      1 Reply Last reply
                      0
                      • A Ancient Zygote

                        I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #65

                        There is only two things reamaning sire one is my address and phone no :-\ you analyzed our languages and cultures which I have not even revealed a single info anywhere here. I doubt that you lived in India for a while. You are saying about this? Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table[^]

                        A 1 Reply Last reply
                        0
                        • L Lost User

                          Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:

                          N Offline
                          N Offline
                          ngoj
                          wrote on last edited by
                          #66

                          I don't know what did you make or is it any good, but I admire hard work. Making your own program(s) is good attitude for a 18 years old student. Just keep on practicing and some day some people will pay you for it. ;)

                          L 1 Reply Last reply
                          0
                          • N ngoj

                            I don't know what did you make or is it any good, but I admire hard work. Making your own program(s) is good attitude for a 18 years old student. Just keep on practicing and some day some people will pay you for it. ;)

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #67

                            Thank you sir for your kind encouragement!

                            1 Reply Last reply
                            0
                            • L Lost User

                              There is only two things reamaning sire one is my address and phone no :-\ you analyzed our languages and cultures which I have not even revealed a single info anywhere here. I doubt that you lived in India for a while. You are saying about this? Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table[^]

                              A Offline
                              A Offline
                              Ancient Zygote
                              wrote on last edited by
                              #68

                              No, I have not lived in India for a while. I will try to make this reply brief since I believe codeproject would prefer I just connect a blog here rather than write lengthy articles in this venue. There is an excellent article from 1982 describing the persistent paradox of psychic phenomena from an engineering perspective (Proceedings of the IEEE, Vol 70, No 2, February 1982 by Robert G Jahn). Perhaps that is incidentally relevant to my quick study on India, or I simply have an effective neural search facility in my "meat computer," grin. Regarding my reference to file entropy, I did not use the Dr. Fu article, but rather one written by Rob VandenBrink, a consultant at Compugen writing for SANS Technology Institute ("Using File Entropy to Identify Ransomwared File").

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups