Antivirus model developed by me during my internship at the Institute of Computer Technology
Detects in real-time malware such as virus signatures, code caves, and system DLL spoofing. Has a simulation of a remote real-time database of virus signatures (used EICAR signature as an example)
Technology stack used: C#, C++, .NET Framework, WPF, Win32 API, MS-SQL (for system DLLs unautorized changes tracking), Firebase (to imitate some remote virus signature), encryption and decryption systems (MD5, SHA1)
Examples: 1. Main window (here you can start or stop real-time protection, or start to scan separate file or directory):
2. Malware detected (here you can delete the infected file and end processes associated with it, add it to exclusions, skip this file, update its checksum, or end the scan):
3. Choose separate file or directory to scan (you can allow or deny checksum verification and access to the remote database of virus signatures):
4. Directory scanning:
5. Settings window (here you can edit the list of trusted processes, the list of files checksum, and allow or deny accsess to the remote database:
6. The list of files checksums (here you can add, edit or clear the list):
7. Remote virus signatures database (Firebase) simulation structure:
Project structure:
Auto-generated class diagram: