|
1 | | -\# x2y AV Ultimate |
| 1 | +# x2y AV Ultimate |
| 2 | +Real-Time Security & System Integrity for Windows |
2 | 3 |
|
3 | | -Real-Time Security \& System Integrity for Windows |
| 4 | +   |
4 | 5 |
|
| 6 | +**x2y AV Ultimate** is a professional-grade security utility developed by **x2y devs tools**. It delivers genuine, non-AI, production-level system protection by utilizing a Hybrid Architecture (Flutter UI + Native Windows Service) to execute privileged system checks, real-time file monitoring, and advanced malware persistence analysis. |
5 | 7 |
|
| 8 | +## 📝 Table of Contents |
6 | 9 |
|
7 | | -!\[Version](https://img.shields.io/badge/version-7.0.0-blue.svg) !\[Platform](https://img.shields.io/badge/badge/platform-Windows-0078D6.svg) !\[License](https://img.shields.io/badge/license-MIT-green.svg) |
| 10 | +* [🌟 Features](#-features) |
| 11 | +* [🚀 Technologies Used](#-technologies-used) |
| 12 | +* [🛠️ Installation](#-installation) |
| 13 | + * [User Installation](#user-installation) |
| 14 | + * [Building from Source](#building-from-source) |
| 15 | +* [💡 Usage](#-usage) |
| 16 | +* [🤝 Contributing](#-contributing) |
| 17 | +* [📜 License](#-license) |
| 18 | +* [📞 Contact](#-contact) |
8 | 19 |
|
| 20 | +## 🌟 Features |
9 | 21 |
|
| 22 | +### 1. Real-Time Protection Shield |
10 | 23 |
|
11 | | -\*\*x2y AV Ultimate\*\* is a professional-grade security utility developed by \*\*x2y devs tools\*\*. It delivers genuine, non-AI, production-level system protection by utilizing a Hybrid Architecture (Flutter UI + Native Windows Service) to execute privileged system checks, real-time file monitoring, and advanced malware persistence analysis. |
| 24 | +* **Active Monitoring:** Runs in the background (System Tray) watching high-risk entry points (Downloads, Desktop, Documents). |
| 25 | +* **Instant Blocking:** Intercepts file creation events, calculates SHA-256 hashes, and compares them against a local threat database. |
| 26 | +* **Kinetic Action:** Automatically kills malicious processes and quarantines files before execution. |
12 | 27 |
|
| 28 | +### 2. Intelligent Scanning Engine |
13 | 29 |
|
| 30 | +* **Quick Scan:** Rapidly audits critical system areas (System32, User Root, Startup). |
| 31 | +* **Full Scan:** Recursively traverses the entire file system with progress estimation. |
| 32 | +* **Custom Scan:** Target specific files or folders for analysis. |
| 33 | +* **Smart Filtering:** Uses exclusion zones to ignore trusted directories (configurable in Settings). |
14 | 34 |
|
15 | | -\## 📝 Table of Contents |
| 35 | +### 3. Network Activity Monitor |
16 | 36 |
|
| 37 | +* **Live Traffic Map:** Visualization of active network flow using dynamic charts. |
| 38 | +* **Process Mapping:** Maps every TCP/UDP connection to its specific Process ID (PID) using native `netstat` calls. |
| 39 | +* **Threat Intel:** Flags suspicious connections or non-standard ports. |
17 | 40 |
|
| 41 | +### 4. Persistence Auditor |
18 | 42 |
|
19 | | -\* \[🌟 Features](#-features) |
| 43 | +* **Registry Analysis:** Scans `HKCU` and `HKLM` Run keys for hidden malware. |
| 44 | +* **Startup Folder:** Audits physical startup directories for unauthorized scripts or binaries. |
20 | 45 |
|
21 | | -\* \[🚀 Technologies Used](#-technologies-used) |
| 46 | +### 5. Quarantine Vault |
22 | 47 |
|
23 | | -\* \[🛠️ Installation](#%EF%B8%8F-installation) |
| 48 | +* **Secure Isolation:** Threats are renamed to `.x2y_quarantine` and locked. |
| 49 | +* **Management:** Users can Restore false positives or Permanently Delete threats. |
24 | 50 |
|
25 | | - \* \[User Installation](#user-installation) |
| 51 | +## 🚀 Technologies Used |
26 | 52 |
|
27 | | - \* \[Building from Source](#building-from-source) |
| 53 | +This application is built using **Flutter for Windows** with heavy reliance on FFI (Foreign Function Interface) for native system interactions. |
28 | 54 |
|
29 | | -\* \[💡 Usage](#-usage) |
| 55 | +* **UI Framework:** Flutter (Dart) |
| 56 | +* **Database Engine:** SQLite (via `sqflite_common_ffi`) - Stores Scan History and Threat Definitions. |
| 57 | +* **Native Interop:** |
| 58 | + * `win32_registry`: For reading Windows Registry keys. |
| 59 | + * `process_run`: For executing `netstat` and `taskkill`. |
| 60 | + * `window_manager` & `system_tray`: For background persistence and window control. |
| 61 | +* **Cryptography:** `crypto` package for SHA-256 file hashing. |
30 | 62 |
|
31 | | -\* \[🤝 Contributing](#-contributing) |
| 63 | +## 🛠️ Installation |
32 | 64 |
|
33 | | -\* \[📜 License](#-license) |
| 65 | +### User Installation |
34 | 66 |
|
35 | | -\* \[📞 Contact](#-contact) |
| 67 | +1. Go to the [Releases](https://github.com/x2yDevs/x2y_av_ultimate/releases) page. |
| 68 | +2. Download the latest `x2y_av_setup.exe`. |
| 69 | +3. Run the installer. The app will launch and minimize to the System Tray, providing real-time protection. |
36 | 70 |
|
| 71 | +### Building from Source |
37 | 72 |
|
| 73 | +**Prerequisites:** |
38 | 74 |
|
39 | | -\## 🌟 Features |
40 | | - |
41 | | - |
42 | | - |
43 | | -\### 1. Real-Time Protection Shield |
44 | | - |
45 | | -\* \*\*Active Monitoring:\*\* Runs in the background (System Tray) watching high-risk entry points (Downloads, Desktop, Documents). |
46 | | - |
47 | | -\* \*\*Instant Blocking:\*\* Intercepts file creation events, calculates SHA-256 hashes, and compares them against a local threat database. |
48 | | - |
49 | | -\* \*\*Kinetic Action:\*\* Automatically kills malicious processes and quarantines files before execution. |
50 | | - |
51 | | - |
52 | | - |
53 | | -\### 2. Intelligent Scanning Engine |
54 | | - |
55 | | -\* \*\*Quick Scan:\*\* Rapidly audits critical system areas (System32, User Root, Startup). |
56 | | - |
57 | | -\* \*\*Full Scan:\*\* Recursively traverses the entire file system with progress estimation. |
58 | | - |
59 | | -\* \*\*Custom Scan:\*\* Target specific files or folders for analysis. |
60 | | - |
61 | | -\* \*\*Smart Filtering:\*\* Uses exclusion zones to ignore trusted directories (configurable in Settings). |
62 | | - |
63 | | - |
64 | | - |
65 | | -\### 3. Network Activity Monitor |
66 | | - |
67 | | -\* \*\*Live Traffic Map:\*\* Visualization of active network flow using dynamic charts. |
68 | | - |
69 | | -\* \*\*Process Mapping:\*\* Maps every TCP/UDP connection to its specific Process ID (PID) using native `netstat` calls. |
70 | | - |
71 | | -\* \*\*Threat Intel:\*\* Flags suspicious connections or non-standard ports. |
72 | | - |
73 | | - |
74 | | - |
75 | | -\### 4. Persistence Auditor |
76 | | - |
77 | | -\* \*\*Registry Analysis:\*\* Scans `HKCU` and `HKLM` Run keys for hidden malware. |
78 | | - |
79 | | -\* \*\*Startup Folder:\*\* Audits physical startup directories for unauthorized scripts or binaries. |
80 | | - |
81 | | - |
82 | | - |
83 | | -\### 5. Quarantine Vault |
84 | | - |
85 | | -\* \*\*Secure Isolation:\*\* Threats are renamed to `.x2y\_quarantine` and locked. |
86 | | - |
87 | | -\* \*\*Management:\*\* Users can Restore false positives or Permanently Delete threats. |
88 | | - |
89 | | - |
90 | | - |
91 | | -\## 🚀 Technologies Used |
92 | | - |
93 | | - |
94 | | - |
95 | | -This application is built using \*\*Flutter for Windows\*\* with heavy reliance on FFI (Foreign Function Interface) for native system interactions. |
96 | | - |
97 | | - |
98 | | - |
99 | | -\* \*\*UI Framework:\*\* Flutter (Dart) |
100 | | - |
101 | | -\* \*\*Database Engine:\*\* SQLite (via `sqflite\_common\_ffi`) - Stores Scan History and Threat Definitions. |
102 | | - |
103 | | -\* \*\*Native Interop:\*\* |
104 | | - |
105 | | - \* `win32\_registry`: For reading Windows Registry keys. |
106 | | - |
107 | | - \* `process\_run`: For executing `netstat` and `taskkill`. |
108 | | - |
109 | | - \* `window\_manager` \& `system\_tray`: For background persistence and window control. |
110 | | - |
111 | | -\* \*\*Cryptography:\*\* `crypto` package for SHA-256 file hashing. |
112 | | - |
113 | | - |
114 | | - |
115 | | -\## 🛠️ Installation |
116 | | - |
117 | | - |
118 | | - |
119 | | -\### User Installation |
120 | | - |
121 | | -1\. Go to the \[Releases](https://github.com/YOUR\_USERNAME/x2y\_av\_ultimate/releases) page. |
122 | | - |
123 | | -2\. Download the latest `x2y\_av\_setup.exe`. |
124 | | - |
125 | | -3\. Run the installer. The app will launch and minimize to the System Tray, providing real-time protection. |
126 | | - |
127 | | - |
128 | | - |
129 | | -\### Building from Source |
130 | | - |
131 | | - |
132 | | - |
133 | | -\*\*Prerequisites:\*\* |
134 | | - |
135 | | -\* Flutter SDK (version 3.0 or higher) |
136 | | - |
137 | | -\* Visual Studio 2022 (with the "Desktop development with C++" workload installed) |
138 | | - |
139 | | - |
| 75 | +* Flutter SDK (version 3.0 or higher) |
| 76 | +* Visual Studio 2022 (with the "Desktop development with C++" workload installed) |
140 | 77 |
|
141 | 78 | ```bash |
| 79 | +# 1. Clone the repository |
| 80 | +git clone https://github.com/YOUR_USERNAME/x2y_av_ultimate.git |
| 81 | +cd x2y_av_ultimate |
142 | 82 |
|
143 | | -\# 1. Clone the repository |
144 | | - |
145 | | -git clone https://github.com/YOUR\_USERNAME/x2y\_av\_ultimate.git |
146 | | - |
147 | | -cd x2y\_av\_ultimate |
148 | | - |
149 | | - |
150 | | - |
151 | | -\# 2. Install dependencies |
152 | | - |
| 83 | +# 2. Install dependencies |
153 | 84 | flutter pub get |
154 | 85 |
|
| 86 | +# 3. Generate Icons (Optional - requires flutter_launcher_icons package) |
| 87 | +dart run flutter_launcher_icons |
155 | 88 |
|
156 | | - |
157 | | -\# 3. Generate Icons (Optional - requires flutter\_launcher\_icons package) |
158 | | - |
159 | | -dart run flutter\_launcher\_icons |
160 | | - |
161 | | - |
162 | | - |
163 | | -\# 4. Run in Debug Mode |
164 | | - |
| 89 | +# 4. Run in Debug Mode |
165 | 90 | flutter run |
166 | 91 |
|
167 | | - |
168 | | - |
169 | | -\# 5. Build Production Executable |
170 | | - |
| 92 | +# 5. Build Production Executable |
171 | 93 | flutter build windows |
172 | | - |
173 | 94 | ``` |
174 | 95 |
|
| 96 | +## 💡 Usage |
175 | 97 |
|
| 98 | +Once installed, **x2y AV Ultimate** runs silently in your system tray, offering continuous real-time protection. |
176 | 99 |
|
177 | | -\## 💡 Usage |
178 | | - |
179 | | - |
180 | | - |
181 | | -Once installed, \*\*x2y AV Ultimate\*\* runs silently in your system tray, offering continuous real-time protection. |
182 | | - |
183 | | - |
184 | | - |
185 | | -\* \*\*Accessing the UI:\*\* Click the x2y AV icon in the system tray to open the main application window. |
186 | | - |
187 | | -\* \*\*Initiating Scans:\*\* From the dashboard, you can perform Quick, Full, or Custom scans. |
188 | | - |
189 | | -\* \*\*Network Monitoring:\*\* Navigate to the Network Activity Monitor to visualize active connections and identify potential threats. |
190 | | - |
191 | | -\* \*\*Managing Threats:\*\* Use the Quarantine Vault to review detected threats, restore false positives, or permanently delete malicious files. |
192 | | - |
193 | | - |
| 100 | +* **Accessing the UI:** Click the x2y AV icon in the system tray to open the main application window. |
| 101 | +* **Initiating Scans:** From the dashboard, you can perform Quick, Full, or Custom scans. |
| 102 | +* **Network Monitoring:** Navigate to the Network Activity Monitor to visualize active connections and identify potential threats. |
| 103 | +* **Managing Threats:** Use the Quarantine Vault to review detected threats, restore false positives, or permanently delete malicious files. |
194 | 104 |
|
195 | | -\### ⚙️ Configuration |
| 105 | +### ⚙️ Configuration |
196 | 106 |
|
197 | 107 | The app includes a robust Settings hub for customization: |
198 | 108 |
|
199 | | -\* \*\*Run on Startup:\*\* Toggles Registry keys to automatically launch x2y AV Ultimate with Windows. |
200 | | - |
201 | | -\* \*\*Scheduled Scans:\*\* Set daily scan times, which are saved to local storage. |
202 | | - |
203 | | -\* \*\*Exclusions:\*\* Add specific file paths or directories to be ignored by the Real-Time Shield and scanning engine. |
204 | | - |
205 | | - |
206 | | - |
207 | | -\## 🤝 Contributing |
208 | | - |
| 109 | +* **Run on Startup:** Toggles Registry keys to automatically launch x2y AV Ultimate with Windows. |
| 110 | +* **Scheduled Scans:** Set daily scan times, which are saved to local storage. |
| 111 | +* **Exclusions:** Add specific file paths or directories to be ignored by the Real-Time Shield and scanning engine. |
209 | 112 |
|
| 113 | +## 🤝 Contributing |
210 | 114 |
|
211 | 115 | We welcome contributions to make x2y AV Ultimate even better! If you have suggestions, bug reports, or want to contribute code, please follow these steps: |
212 | 116 |
|
213 | | - |
214 | | - |
215 | | -1\. Fork the repository. |
216 | | - |
217 | | -2\. Create a new branch (`git checkout -b feature/YourFeature` or `bugfix/FixBug`). |
218 | | - |
219 | | -3\. Make your changes and commit them (`git commit -m 'Add Your Feature'`). |
220 | | - |
221 | | -4\. Push to the branch (`git push origin feature/YourFeature`). |
222 | | - |
223 | | -5\. Open a Pull Request. |
224 | | - |
225 | | - |
| 117 | +1. Fork the repository. |
| 118 | +2. Create a new branch (`git checkout -b feature/YourFeature` or `bugfix/FixBug`). |
| 119 | +3. Make your changes and commit them (`git commit -m 'Add Your Feature'`). |
| 120 | +4. Push to the branch (`git push origin feature/YourFeature`). |
| 121 | +5. Open a Pull Request. |
226 | 122 |
|
227 | 123 | Please ensure your code adheres to the project's coding standards and includes appropriate tests. |
228 | 124 |
|
| 125 | +## 📜 License |
229 | 126 |
|
| 127 | +This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details. |
230 | 128 |
|
231 | | -\## 📜 License |
232 | | - |
233 | | - |
234 | | - |
235 | | -This project is licensed under the MIT License - see the \[LICENSE](LICENSE) file for details. |
236 | | - |
237 | | - |
238 | | - |
239 | | -\## 📞 Contact |
240 | | - |
241 | | - |
| 129 | +## 📞 Contact |
242 | 130 |
|
243 | 131 | For support, feedback, or general inquiries, please reach out to us: |
244 | 132 |
|
245 | | - |
246 | | - |
247 | | -\* \*\*Email:\*\* support@x2ydevs.xyz |
248 | | - |
249 | | -\* \*\*Website:\*\* \[x2ydevs.xyz](https://x2ydevs.xyz) |
250 | | - |
251 | | - |
252 | | - |
253 | | -Developed by x2y devs tools. |
254 | | - |
255 | | -Copyright © 2025. All rights reserved. |
| 133 | +* **Email:** support@x2ydevs.xyz |
| 134 | +* **Website:** [x2ydevs.xyz](https://x2ydevs.xyz) |
256 | 135 |
|
0 commit comments