ANTIVIRUSxML
File integrity monitor with malware detection using machine learning
Install / Use
/learn @da4nyy/ANTIVIRUSxMLREADME
:notebook_with_decorative_cover: Table of Contents
<!-- About the Project -->:star2: About the Project
Overview
This Python project is a project that combine between :
- basic file integrity monitor: which it takes two arguments: a directory to scan, and an output file for alerts. The script will recursively scan the given directory and its subdirectories, and will create alerts for any added, removed, or changed files. The script uses the os, sys, and pickle libraries to perform file system operations, as well as the datetime, hashlib, logging, and time libraries for other operations.
- malware detection using machine learning : it helps train a classifier to be able to detect PE files as either malicious or legitimate. It tries out 6 different classification algorithms before deciding which one to use for prediction by comparing their results.
:toolbox: Getting Started
<!-- Prerequisites -->:bangbang: Prerequisites
This project uses some libraries that you need to install them first :
pip install -r requirements.txt
<!-- Installation -->
:gear: Installation
git clone https://github.com/da4nyy/ANTIVIRUSxML/
cd ANTIVIRUSxML
<!-- Run Locally -->
:running: Run Locally
Clone the project
Go to the project directory
cd ANTIVIRUSxML/
Install dependencies
pip install -r requirements.txt
train the model ( you can skip this phase : you already find the files in the classifier directory
python3 Malware-detection-learning.py data.csv
Start the file monitor and malware detection handler
python3 antivirusXml.py -i <input directory to monitor> -o <output file>
<!-- Usage -->
:eyes: Usage
- You may monitor the integrity of the files that may have PII. In this case, you can place the script where your files live, and create a crontab or use task scheduler to run the script.
- You can use the script to monitor the files stored in the web app and scan the added files.
- If you are in the Blue Team at a CCDC competition, you can use this script to monitor your server and easily see which files modified.
:compass: Roadmap
- [x] scan x32 PE files
- [ ] scan x64 PE files
:wave: Contributing
<a href="https://github.com/da4nyy/ANTIVIRUSxML/graphs/contributors"> </a>Contributions are always welcome!
<!-- Contact -->:handshake: Contact
kacem hakim - @DARNY - da4nyyy@proton.me
Project Link: https://github.com/
<!-- Acknowledgments -->:gem: Acknowledgements
Related Skills
tmux
330.7kRemote-control tmux sessions for interactive CLIs by sending keystrokes and scraping pane output.
claude-opus-4-5-migration
81.4kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
model-usage
330.7kUse CodexBar CLI local cost usage to summarize per-model usage for Codex or Claude, including the current (most recent) model or a full model breakdown. Trigger when asked for model-level usage/cost data from codexbar, or when you need a scriptable per-model summary from codexbar cost JSON.
blogwatcher
330.7kMonitor blogs and RSS/Atom feeds for updates using the blogwatcher CLI.
