Finally..... Antivirus........ :)
-
"Shying" away from a company might make sense from the standpoint of wanting to finish your education before starting a career; however, continually backing away from all legitimate work is not encouraging anyone to actually utilize your product. Humans are not attracted to that which lurks in the shadows.
Sir, how could a person who is in the mid of his bachelor's degree could skip his education and join in a company? I could be surrounded by a person's who might hold masters. Anyone in this situation could shy. It is impractical to skip my education i.e if some unexpected things happened then I can't go back and continue studies. I am not backing off, the job of the student is to study
-
You have very specific dreams, which I suppose could go either way as far as increasing your chances of accidentally becoming a billionaire (like Bill Gates, Zuckerberg, etc....don't think any of those on this kind of list had a particular dream other than to play with computers and somehow make money at it). I would like to see what you developed, but am scary about visiting any links that don't meet security checks, which these days amounts to a reputation check (that is a Catch-22 of course). If you put it up at github, let me know (please don't use sourceforge.net---those people still scare the hell out of me...never know if something is going to pop up from an install and scurry across the room to infect the denizens of earth). ...and that segues to to my own thoughts on anti-malware lately, which is that it would be nice to have access to a massive database of reputation scan information and code hashes. VirusTotal does make their database API available, but unless you provide information to them you are limited to 4 queries per minute (so on my machine with tens of thousands of files someone will have proven NP == P by the time the scan completes, at which time the Universe will evaporate).
-
Yes, Sir the project is hosted on Github GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^]
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
-
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
-
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:
VISWESWARAN1998 wrote:
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it
When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source
-
VISWESWARAN1998 wrote:
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it
When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source
Sir, I know about ClamAV it is not too much for windows, It primarily concentrates on *nix operating systems. Yes,there is Windows specific ClamWin but is it not drawing too much of attention. Another free products will perform very well than that! I don't know what to do so I made my project as open-source. I made a mistake, I've have concentrated only on how the project can be implemented and totally forgetting what I am going to do for the resources. But the project is not dead yet! I dont know why I can't move away from this. I thought I would start my career by creating an AV company of my own at-least I expect to get job in some other AV company
-
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi
-
Sir, It will work fine along with your primary antivirus and will not slow down your system. Kindly have a look at it GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^] I am quiet sure there is no open-source ransomware or any-other threats. :cool: It has various other bunch of tools too...
-
Strange - I moved to Kaspersky because Defender slugged the computer for several hours every afternoon, despite being told to scan between midnight and 05:00. Kaspersky does nothing slow on my PC at all - and it's only a dual core with 4GB of RAM! Just goes to show that PC are far too different for their own good sometimes! :laugh:
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
Odd. I run Defender. Never had it slow down anything. This computer runs quite well. McAfee on the other hand was a killer. I had another computer that had to turn on the fan every time there was a scan. And the scan NEVER finished. It kept running until it used up all the memory.
-
I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi
There is only two things reamaning sire one is my address and phone no :-\ you analyzed our languages and cultures which I have not even revealed a single info anywhere here. I doubt that you lived in India for a while. You are saying about this? Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table[^]
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:
-
I don't know what did you make or is it any good, but I admire hard work. Making your own program(s) is good attitude for a 18 years old student. Just keep on practicing and some day some people will pay you for it. ;)
-
There is only two things reamaning sire one is my address and phone no :-\ you analyzed our languages and cultures which I have not even revealed a single info anywhere here. I doubt that you lived in India for a while. You are saying about this? Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table[^]
No, I have not lived in India for a while. I will try to make this reply brief since I believe codeproject would prefer I just connect a blog here rather than write lengthy articles in this venue. There is an excellent article from 1982 describing the persistent paradox of psychic phenomena from an engineering perspective (Proceedings of the IEEE, Vol 70, No 2, February 1982 by Robert G Jahn). Perhaps that is incidentally relevant to my quick study on India, or I simply have an effective neural search facility in my "meat computer," grin. Regarding my reference to file entropy, I did not use the Dr. Fu article, but rather one written by Rob VandenBrink, a consultant at Compugen writing for SANS Technology Institute ("Using File Entropy to Identify Ransomwared File").