RosaryAV is a nascent threat detection solution designed with a focus on efficiency and minimal resource usage. This user-side project serves as an open-source reference for developers with similar interests in cybersecurity and system protection. Our goal is to provide a foundation for detecting potential threats in a non-invasive manner, paving the way for a future transition into a comprehensive anti-virus solution.
This public repo will not contain any type of:
- Injection techniques: RosaryAV does not utilize any injection techniques for code execution or manipulation.
- Malicious evasive techniques: This project does not employ any malicious techniques to bypass security mechanisms or obfuscate its functionality.
- Self-security: As a development project, RosaryAV does not prioritize self-protection features at this stage.
- Threat Detection: Custom methodologies of heuristic & triage methods to identify potential system threats.
- Performance: Ensuring low resource consumption and minimal impact on user experience.
The project aims to evolve into a full-fledged threat removal tool. The final product, which will encompass both user-mode and kernel-mode environments, will not be open-source but instead offered as a paid service.
We welcome contributions from individuals who share our vision of a safer digital environment. If you're working on similar projects or have insights that could propel RosaryAV forward, please consider contributing.
This project is currently open-source for educational and collaborative purposes. The licensing for the final product will be determined as the project matures.
Shoutout to OALabs. They have an excellent community for learning reverse engineering, with professionals offering insider knowledge. Check out their UnpackMe challenges and support them on Patreon.
Please note that this README is for the open-source portion of RosaryAV. The proprietary version of this solution will be developed privately.