Skip to content

Commit b241b0c

Browse files
committed
Finish merge
2 parents 3e9ff79 + 5e21f02 commit b241b0c

File tree

1 file changed

+81
-202
lines changed

1 file changed

+81
-202
lines changed

README.md

Lines changed: 81 additions & 202 deletions
Original file line numberDiff line numberDiff line change
@@ -1,256 +1,135 @@
1-
\# x2y AV Ultimate
1+
# x2y AV Ultimate
2+
Real-Time Security & System Integrity for Windows
23

3-
Real-Time Security \& System Integrity for Windows
4+
![Version](https://img.shields.io/badge/version-7.0.0-blue.svg) ![Platform](https://img.shields.io/badge/badge/platform-Windows-0078D6.svg) ![License](https://img.shields.io/badge/license-MIT-green.svg)
45

6+
**x2y AV Ultimate** is a professional-grade security utility developed by **x2y devs tools**. It delivers genuine, non-AI, production-level system protection by utilizing a Hybrid Architecture (Flutter UI + Native Windows Service) to execute privileged system checks, real-time file monitoring, and advanced malware persistence analysis.
57

8+
## 📝 Table of Contents
69

7-
!\[Version](https://img.shields.io/badge/version-7.0.0-blue.svg) !\[Platform](https://img.shields.io/badge/badge/platform-Windows-0078D6.svg) !\[License](https://img.shields.io/badge/license-MIT-green.svg)
10+
* [🌟 Features](#-features)
11+
* [🚀 Technologies Used](#-technologies-used)
12+
* [🛠️ Installation](#-installation)
13+
* [User Installation](#user-installation)
14+
* [Building from Source](#building-from-source)
15+
* [💡 Usage](#-usage)
16+
* [🤝 Contributing](#-contributing)
17+
* [📜 License](#-license)
18+
* [📞 Contact](#-contact)
819

20+
## 🌟 Features
921

22+
### 1. Real-Time Protection Shield
1023

11-
\*\*x2y AV Ultimate\*\* is a professional-grade security utility developed by \*\*x2y devs tools\*\*. It delivers genuine, non-AI, production-level system protection by utilizing a Hybrid Architecture (Flutter UI + Native Windows Service) to execute privileged system checks, real-time file monitoring, and advanced malware persistence analysis.
24+
* **Active Monitoring:** Runs in the background (System Tray) watching high-risk entry points (Downloads, Desktop, Documents).
25+
* **Instant Blocking:** Intercepts file creation events, calculates SHA-256 hashes, and compares them against a local threat database.
26+
* **Kinetic Action:** Automatically kills malicious processes and quarantines files before execution.
1227

28+
### 2. Intelligent Scanning Engine
1329

30+
* **Quick Scan:** Rapidly audits critical system areas (System32, User Root, Startup).
31+
* **Full Scan:** Recursively traverses the entire file system with progress estimation.
32+
* **Custom Scan:** Target specific files or folders for analysis.
33+
* **Smart Filtering:** Uses exclusion zones to ignore trusted directories (configurable in Settings).
1434

15-
\## 📝 Table of Contents
35+
### 3. Network Activity Monitor
1636

37+
* **Live Traffic Map:** Visualization of active network flow using dynamic charts.
38+
* **Process Mapping:** Maps every TCP/UDP connection to its specific Process ID (PID) using native `netstat` calls.
39+
* **Threat Intel:** Flags suspicious connections or non-standard ports.
1740

41+
### 4. Persistence Auditor
1842

19-
\* \[🌟 Features](#-features)
43+
* **Registry Analysis:** Scans `HKCU` and `HKLM` Run keys for hidden malware.
44+
* **Startup Folder:** Audits physical startup directories for unauthorized scripts or binaries.
2045

21-
\* \[🚀 Technologies Used](#-technologies-used)
46+
### 5. Quarantine Vault
2247

23-
\* \[🛠️ Installation](#%EF%B8%8F-installation)
48+
* **Secure Isolation:** Threats are renamed to `.x2y_quarantine` and locked.
49+
* **Management:** Users can Restore false positives or Permanently Delete threats.
2450

25-
  \* \[User Installation](#user-installation)
51+
## 🚀 Technologies Used
2652

27-
  \* \[Building from Source](#building-from-source)
53+
This application is built using **Flutter for Windows** with heavy reliance on FFI (Foreign Function Interface) for native system interactions.
2854

29-
\* \[💡 Usage](#-usage)
55+
* **UI Framework:** Flutter (Dart)
56+
* **Database Engine:** SQLite (via `sqflite_common_ffi`) - Stores Scan History and Threat Definitions.
57+
* **Native Interop:**
58+
* `win32_registry`: For reading Windows Registry keys.
59+
* `process_run`: For executing `netstat` and `taskkill`.
60+
* `window_manager` & `system_tray`: For background persistence and window control.
61+
* **Cryptography:** `crypto` package for SHA-256 file hashing.
3062

31-
\* \[🤝 Contributing](#-contributing)
63+
## 🛠️ Installation
3264

33-
\* \[📜 License](#-license)
65+
### User Installation
3466

35-
\* \[📞 Contact](#-contact)
67+
1. Go to the [Releases](https://github.com/x2yDevs/x2y_av_ultimate/releases) page.
68+
2. Download the latest `x2y_av_setup.exe`.
69+
3. Run the installer. The app will launch and minimize to the System Tray, providing real-time protection.
3670

71+
### Building from Source
3772

73+
**Prerequisites:**
3874

39-
\## 🌟 Features
40-
41-
42-
43-
\### 1. Real-Time Protection Shield
44-
45-
\* \*\*Active Monitoring:\*\* Runs in the background (System Tray) watching high-risk entry points (Downloads, Desktop, Documents).
46-
47-
\* \*\*Instant Blocking:\*\* Intercepts file creation events, calculates SHA-256 hashes, and compares them against a local threat database.
48-
49-
\* \*\*Kinetic Action:\*\* Automatically kills malicious processes and quarantines files before execution.
50-
51-
52-
53-
\### 2. Intelligent Scanning Engine
54-
55-
\* \*\*Quick Scan:\*\* Rapidly audits critical system areas (System32, User Root, Startup).
56-
57-
\* \*\*Full Scan:\*\* Recursively traverses the entire file system with progress estimation.
58-
59-
\* \*\*Custom Scan:\*\* Target specific files or folders for analysis.
60-
61-
\* \*\*Smart Filtering:\*\* Uses exclusion zones to ignore trusted directories (configurable in Settings).
62-
63-
64-
65-
\### 3. Network Activity Monitor
66-
67-
\* \*\*Live Traffic Map:\*\* Visualization of active network flow using dynamic charts.
68-
69-
\* \*\*Process Mapping:\*\* Maps every TCP/UDP connection to its specific Process ID (PID) using native `netstat` calls.
70-
71-
\* \*\*Threat Intel:\*\* Flags suspicious connections or non-standard ports.
72-
73-
74-
75-
\### 4. Persistence Auditor
76-
77-
\* \*\*Registry Analysis:\*\* Scans `HKCU` and `HKLM` Run keys for hidden malware.
78-
79-
\* \*\*Startup Folder:\*\* Audits physical startup directories for unauthorized scripts or binaries.
80-
81-
82-
83-
\### 5. Quarantine Vault
84-
85-
\* \*\*Secure Isolation:\*\* Threats are renamed to `.x2y\_quarantine` and locked.
86-
87-
\* \*\*Management:\*\* Users can Restore false positives or Permanently Delete threats.
88-
89-
90-
91-
\## 🚀 Technologies Used
92-
93-
94-
95-
This application is built using \*\*Flutter for Windows\*\* with heavy reliance on FFI (Foreign Function Interface) for native system interactions.
96-
97-
98-
99-
\* \*\*UI Framework:\*\* Flutter (Dart)
100-
101-
\* \*\*Database Engine:\*\* SQLite (via `sqflite\_common\_ffi`) - Stores Scan History and Threat Definitions.
102-
103-
\* \*\*Native Interop:\*\*
104-
105-
  \* `win32\_registry`: For reading Windows Registry keys.
106-
107-
  \* `process\_run`: For executing `netstat` and `taskkill`.
108-
109-
  \* `window\_manager` \& `system\_tray`: For background persistence and window control.
110-
111-
\* \*\*Cryptography:\*\* `crypto` package for SHA-256 file hashing.
112-
113-
114-
115-
\## 🛠️ Installation
116-
117-
118-
119-
\### User Installation
120-
121-
1\. Go to the \[Releases](https://github.com/YOUR\_USERNAME/x2y\_av\_ultimate/releases) page.
122-
123-
2\. Download the latest `x2y\_av\_setup.exe`.
124-
125-
3\. Run the installer. The app will launch and minimize to the System Tray, providing real-time protection.
126-
127-
128-
129-
\### Building from Source
130-
131-
132-
133-
\*\*Prerequisites:\*\*
134-
135-
\* Flutter SDK (version 3.0 or higher)
136-
137-
\* Visual Studio 2022 (with the "Desktop development with C++" workload installed)
138-
139-
75+
* Flutter SDK (version 3.0 or higher)
76+
* Visual Studio 2022 (with the "Desktop development with C++" workload installed)
14077

14178
```bash
79+
# 1. Clone the repository
80+
git clone https://github.com/YOUR_USERNAME/x2y_av_ultimate.git
81+
cd x2y_av_ultimate
14282

143-
\# 1. Clone the repository
144-
145-
git clone https://github.com/YOUR\_USERNAME/x2y\_av\_ultimate.git
146-
147-
cd x2y\_av\_ultimate
148-
149-
150-
151-
\# 2. Install dependencies
152-
83+
# 2. Install dependencies
15384
flutter pub get
15485

86+
# 3. Generate Icons (Optional - requires flutter_launcher_icons package)
87+
dart run flutter_launcher_icons
15588

156-
157-
\# 3. Generate Icons (Optional - requires flutter\_launcher\_icons package)
158-
159-
dart run flutter\_launcher\_icons
160-
161-
162-
163-
\# 4. Run in Debug Mode
164-
89+
# 4. Run in Debug Mode
16590
flutter run
16691

167-
168-
169-
\# 5. Build Production Executable
170-
92+
# 5. Build Production Executable
17193
flutter build windows
172-
17394
```
17495

96+
## 💡 Usage
17597

98+
Once installed, **x2y AV Ultimate** runs silently in your system tray, offering continuous real-time protection.
17699

177-
\## 💡 Usage
178-
179-
180-
181-
Once installed, \*\*x2y AV Ultimate\*\* runs silently in your system tray, offering continuous real-time protection.
182-
183-
184-
185-
\* \*\*Accessing the UI:\*\* Click the x2y AV icon in the system tray to open the main application window.
186-
187-
\* \*\*Initiating Scans:\*\* From the dashboard, you can perform Quick, Full, or Custom scans.
188-
189-
\* \*\*Network Monitoring:\*\* Navigate to the Network Activity Monitor to visualize active connections and identify potential threats.
190-
191-
\* \*\*Managing Threats:\*\* Use the Quarantine Vault to review detected threats, restore false positives, or permanently delete malicious files.
192-
193-
100+
* **Accessing the UI:** Click the x2y AV icon in the system tray to open the main application window.
101+
* **Initiating Scans:** From the dashboard, you can perform Quick, Full, or Custom scans.
102+
* **Network Monitoring:** Navigate to the Network Activity Monitor to visualize active connections and identify potential threats.
103+
* **Managing Threats:** Use the Quarantine Vault to review detected threats, restore false positives, or permanently delete malicious files.
194104

195-
\### ⚙️ Configuration
105+
### ⚙️ Configuration
196106

197107
The app includes a robust Settings hub for customization:
198108

199-
\* \*\*Run on Startup:\*\* Toggles Registry keys to automatically launch x2y AV Ultimate with Windows.
200-
201-
\* \*\*Scheduled Scans:\*\* Set daily scan times, which are saved to local storage.
202-
203-
\* \*\*Exclusions:\*\* Add specific file paths or directories to be ignored by the Real-Time Shield and scanning engine.
204-
205-
206-
207-
\## 🤝 Contributing
208-
109+
* **Run on Startup:** Toggles Registry keys to automatically launch x2y AV Ultimate with Windows.
110+
* **Scheduled Scans:** Set daily scan times, which are saved to local storage.
111+
* **Exclusions:** Add specific file paths or directories to be ignored by the Real-Time Shield and scanning engine.
209112

113+
## 🤝 Contributing
210114

211115
We welcome contributions to make x2y AV Ultimate even better! If you have suggestions, bug reports, or want to contribute code, please follow these steps:
212116

213-
214-
215-
1\. Fork the repository.
216-
217-
2\. Create a new branch (`git checkout -b feature/YourFeature` or `bugfix/FixBug`).
218-
219-
3\. Make your changes and commit them (`git commit -m 'Add Your Feature'`).
220-
221-
4\. Push to the branch (`git push origin feature/YourFeature`).
222-
223-
5\. Open a Pull Request.
224-
225-
117+
1. Fork the repository.
118+
2. Create a new branch (`git checkout -b feature/YourFeature` or `bugfix/FixBug`).
119+
3. Make your changes and commit them (`git commit -m 'Add Your Feature'`).
120+
4. Push to the branch (`git push origin feature/YourFeature`).
121+
5. Open a Pull Request.
226122

227123
Please ensure your code adheres to the project's coding standards and includes appropriate tests.
228124

125+
## 📜 License
229126

127+
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
230128

231-
\## 📜 License
232-
233-
234-
235-
This project is licensed under the MIT License - see the \[LICENSE](LICENSE) file for details.
236-
237-
238-
239-
\## 📞 Contact
240-
241-
129+
## 📞 Contact
242130

243131
For support, feedback, or general inquiries, please reach out to us:
244132

245-
246-
247-
\* \*\*Email:\*\* support@x2ydevs.xyz
248-
249-
\* \*\*Website:\*\* \[x2ydevs.xyz](https://x2ydevs.xyz)
250-
251-
252-
253-
Developed by x2y devs tools.
254-
255-
Copyright © 2025. All rights reserved.
133+
* **Email:** support@x2ydevs.xyz
134+
* **Website:** [x2ydevs.xyz](https://x2ydevs.xyz)
256135

0 commit comments

Comments
 (0)