Skip to content

Welcome to x2y AV Ultimate v7.0 - Production-Grade Security Suite

Choose a tag to compare

@x2yDevs x2yDevs released this 04 Dec 18:28
· 9 commits to main since this release

x2y AV Ultimate v7.0 - Production-Grade Security Suite

License: MIT
Platform: Windows
Maintenance: Active

Welcome to the official release of x2y AV Ultimate v7.0! This version introduces our professional-grade security utility, meticulously engineered to keep your Windows system safe, clean, and fully monitored. Built with a hybrid architecture (Flutter UI + native Windows service), v7.0 combines powerful real-time monitoring with advanced multi-feed threat intelligence, system integrity verification, and comprehensive network analysis.

This production-ready release is designed for users who demand genuine, enterprise-level protection without the bloat of traditional antivirus tools. It operates silently in the background, safeguarding critical directories, auditing system persistence mechanisms, and automatically quarantining threats using real-world malware signatures from global security feeds.

📖 Table of Contents

✨ Features

x2y AV Ultimate v7.0 is packed with an array of features designed to provide robust, enterprise-level protection for your Windows system.

🛡️ Real-Time Protection Shield

  • Active Directory Monitoring: Continuously watches Downloads, Desktop, Documents, and other high-risk system areas.
  • Instant Threat Blocking: Intercepts malicious file creation and terminates dangerous processes before execution.
  • Multi-Source Detection: Leverages signatures from MalwareBazaar, Feodo Tracker, and proprietary databases for comprehensive threat identification.

🔍 Intelligent Scanning Engine

  • Quick Scan: Rapid audit of critical system areas (System32, User Root, Startup).
  • Full System Scan: Comprehensive recursive traversal with detailed progress estimation.
  • Custom Path Scan: Target-specific directories with smart exclusion filtering.
  • Scheduled Scans: Automated daily/weekly scanning with configurable timing.

🌐 Network Activity Intelligence

  • Live Connection Visualization: Real-time TCP/UDP connection mapping.
  • Process Attribution: Maps network connections to specific Process IDs (PIDs).
  • Threat Intelligence: Flags suspicious ports and known malicious endpoints.

🔐 Persistence Auditor

  • Registry Analysis: Deep scans of HKCU/HKLM Run keys for hidden malware.
  • Startup Folder Monitoring: Audits physical startup locations for unauthorized entries.
  • Service Detection: Identifies suspicious Windows service installations.

🗄️ Secure Quarantine Vault

  • Encrypted Isolation: Threat files renamed to .x2y_quarantine extension for secure containment.
  • Restore Capability: Safely restore false positives with original metadata.
  • Permanent Deletion: Securely erase confirmed threats with multiple overwrite passes.

🛡️ Threat Intelligence Engine (v7.0 New Feature)

x2y AV Ultimate v7.0 now features a production-grade threat intelligence system:

  • 🔄 Multi-Feed Aggregation
    • MalwareBazaar Integration: Real-time signatures from abuse.ch (ransomware, trojans, spyware).
    • Feodo Tracker: Botnet Command & Control binary detection (Emotet, Dridex, QakBot).
    • Static Signatures: Industry-standard EICAR and historical malware database.
  • ⚡ Automatic Updates
    • Background Synchronization: Daily signature updates without user intervention.
    • Offline Protection: Local cache ensures functionality during network outages.
    • Update Verification: Cryptographic verification of downloaded threat data.
  • 📊 Intelligence Dashboard
    • Signature Count Display: Real-time tracking of loaded threat definitions.
    • Update History: Log of database synchronization events.
    • Manual Refresh: User-triggered updates for immediate protection.

🚀 Technologies Used

Component Technology Purpose
Frontend UI Flutter (Dart) Modern, responsive dashboard with real-time updates
Database SQLite + sqflite_common_ffi Local threat signature storage and scan history
Native Integration FFI (Foreign Function Interface) Windows API calls for system monitoring
Networking HTTP Client + WebSocket Threat feed synchronization and live updates
Cryptography crypto package SHA-256 file hashing and signature verification
System Tray system_tray package Background operation and quick access
Windows Registry win32_registry Persistence auditing and configuration
Process Management process_run Network connection mapping and threat termination

🛠️ Installation

Option 1: Installer (Recommended)

  1. Download: Obtain x2y_av_ultimate_setup_v7.0.0.exe from the GitHub Releases page.
  2. Run as Administrator: Execute the installer with administrator privileges (required for full antivirus functionality and service installation).
  3. Follow Setup Wizard: Install to your preferred directory (default is Program Files) with an optional Desktop shortcut.
  4. Launch: The application will auto-start with Windows integration upon successful installation.

Option 2: Portable Version

  1. Extract: Download and extract x2y_av_ultimate_portable_v7.0.0.zip to your desired location.

x2y_av_ultimate_setup_v7.0.0.zip

  1. Run: Execute x2y_av_ultimate.exe directly from the extracted folder.
    • Note: Some features, especially real-time protection and service integration, may require administrator elevation on the first run.

System Requirements

  • OS: Windows 10/11 (64-bit)
  • RAM: 4GB minimum, 8GB recommended
  • Storage: 500MB free space
  • Permissions: Administrator rights are essential for full protection and system-level monitoring.

💡 Usage

x2y AV Ultimate v7.0 provides an intuitive dashboard and robust settings for managing your system's security.

🖥️ Main Dashboard

  • Protection Status: Real-time shield activity indicator showing active monitoring.
  • Quick Actions: One-click buttons to initiate quick scans or update threat definitions.
  • Threat Counter: Live tracking of detected and quarantined threats.
  • System Health: Displays CPU/RAM usage during scans to monitor performance impact.

⚙️ Settings Panel

  • Real-Time Shield Toggle: Enable or disable background monitoring as needed.
  • Exclusion Management: Add trusted directories or files to an ignore list to prevent false positives.
  • Update Controls: Manual threat database synchronization and configuration for automatic updates.
  • Scheduler Configuration: Set automated daily/weekly scan times.
  • Startup Integration: Control whether x2y AV Ultimate launches automatically with Windows.

📈 Network Monitor

  • Live Connection Map: Visual display of all active TCP/UDP network connections.
  • Process Filtering: Isolate connections by specific applications or processes.
  • Export Capability: Save connection logs for external analysis and auditing.

📊 History & Reports

  • Scan Timeline: Chronological record of all past scans, including type and duration.
  • Threat Details: Comprehensive information on detected items, including threat type, location, and action taken.
  • Export Function: Generate detailed PDF/CSV reports for documentation or compliance purposes.

🤝 Contributing

We warmly welcome contributions from security researchers, developers, and enthusiasts! Your insights and code can help make x2y AV Ultimate even more robust.

Development Setup

# Clone the repository
git clone https://github.com/x2ydevs/x2y_av_ultimate.git

# Navigate into the project directory
cd x2y_av_ultimate

# Install Flutter dependencies
flutter pub get

# Run the application in debug mode
flutter run

# Build a release version for Windows
flutter build windows

Contribution Areas

  • Threat Intelligence: Integration of new threat feeds or improvements to signature detection algorithms.
  • UI/UX Enhancements: Dashboard improvements, new visualization tools, or usability refinements.
  • Performance: Optimization of scanning algorithms, memory usage, or real-time monitoring efficiency.
  • Documentation: User guides, API documentation, or detailed threat analysis reports.

Submission Process

  1. Fork the repository.
  2. Create a feature branch: git checkout -b feature/your-improvement-name
  3. Commit your changes with clear and descriptive messages.
  4. Push your branch to your forked repository.
  5. Open a Pull Request to the main branch of the original repository, providing a detailed description of your changes.

📄 License

This project is licensed under the MIT License. See the LICENSE file for full details.

Copyright © 2024 x2y devs tools

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

Commercial Use: This software can be used commercially. Attribution is appreciated but not strictly required.

📞 Contact

For any inquiries, support, or security-related matters, please reach out to us.

Technical Support

Security Reports

For vulnerability disclosures or critical security concerns, we encourage encrypted communication.

  • PGP Key: Available upon request.
  • Encrypted Email: security@x2ydevs.xyz
  • Response Time: We aim for a response within 24-48 hours for critical issues.

Community & Updates

Stay connected for the latest news, updates, and releases.


Developed with precision by x2y Devs Tools
Enterprise-grade security, accessible to everyone.


⚠️ Important Disclaimer: x2y AV Ultimate is designed as a security enhancement tool. While it provides robust protection against known threats, no security solution can guarantee 100% protection against all malware. Always practice safe computing habits and maintain regular backups of critical data.

  • Version: 7.0.0
  • Release Date: 2025
  • Build Signature: SHA-256 verified
  • Compatibility: Windows 10/11 x64