<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>antivirus</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1907/feed"/>
    <updated>2026-04-19T07:56:26+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1907/feed</id>
            <entry>
            <id>https://links.biapy.com/links/12557</id>
            <title type="text"><![CDATA[malware-check]]></title>
            <link rel="alternate" href="https://github.com/momenbasel/malware-check" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12557"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Static and dynamic analysis tool for detecting malicious code, suspicious binaries, and privacy violations.

Static and dynamic analysis tool for detecting malicious code, suspicious binaries, and privacy violations. Analyzes source code, compiled executables (.exe, .dll, .elf), macOS bundles (.app, .dmg, .pkg), mobile apps (.apk, .ipa), and application packages with YARA rules, Docker behavioral sandboxing, MobSF mobile analysis, payload deobfuscation, and multi-format reporting (JSON, HTML, SARIF).

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:43:12+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12555</id>
            <title type="text"><![CDATA[Dev Machine Guard]]></title>
            <link rel="alternate" href="https://github.com/step-security/dev-machine-guard" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12555"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds. 

Developer machines are the new attack surface. They hold high-value assets — GitHub tokens, cloud credentials, SSH keys — and routinely execute untrusted code through dependencies and AI-powered tools. Recent supply chain attacks have shown that malicious VS Code extensions can steal credentials, rogue MCP servers can access your codebase, and compromised npm packages can exfiltrate secrets.

Related contents:

- [\#72 - Microsoft et Adobe corrigent une vulnérabilité déjà exploitée @ Erreur 403 :fr:](https://newsletter.erreur403.fr/p/erreur-403-72-microsoft-et-adobe-corrigent-une-vuln-rabilit-d-j-exploit-e).]]>
            </summary>
            <updated>2026-04-16T11:40:14+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/12050</id>
            <title type="text"><![CDATA[Aikido Safe Chain]]></title>
            <link rel="alternate" href="https://www.aikido.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12050"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unified Security Platform from Code to Runtime.

 Protect against malicious code installed via npm, yarn, pnpm, npx, and pnpx with Aikido Safe Chain. Free to use, no tokens required. 

- [Aikido Safe Chain @ GitHub](https://github.com/AikidoSec/safe-chain).]]>
            </summary>
            <updated>2026-03-09T07:21:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11230</id>
            <title type="text"><![CDATA[pompelmi]]></title>
            <link rel="alternate" href="https://pompelmi.github.io/pompelmi/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11230"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Fast file upload security for Node.js

🔒 Malware scanning • YARA integration • ZIP bomb protection • Express/Koa/Next.js adapters • Private by design.

- [pompelmi @ GitHub](https://github.com/pompelmi/pompelmi).]]>
            </summary>
            <updated>2025-12-15T06:54:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10985</id>
            <title type="text"><![CDATA[ImunifyAV]]></title>
            <link rel="alternate" href="https://imunify360.com/imunifyav/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10985"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free Malware Scanner for Linux Servers.

Find out what’s hiding on your server, absolutely free. Your first step to a secure server starts here.

Related contents:

- [ImunifyAV - Le scanner qui exécute les malwares @ Korben :fr:](https://korben.info/imunifyav-rce-faille-php-serveur.html).]]>
            </summary>
            <updated>2025-11-17T10:34:31+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10761</id>
            <title type="text"><![CDATA[Lenspect]]></title>
            <link rel="alternate" href="https://github.com/vmkspv/lenspect" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10761"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lightweight security threat scanner intended to make malware detection more accessible and efficient. 

Lenspect is a lightweight security threat scanner powered by VirusTotal.

- [Lenspect @ Flathub](https://flathub.org/en/apps/io.github.vmkspv.lenspect).

Related contents:

- [Episode 637: Chris’ Smart Home Disaster @ Linux Unplugged](https://linuxunplugged.com/637).]]>
            </summary>
            <updated>2025-10-23T05:47:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10362</id>
            <title type="text"><![CDATA[dbarzin/pandora-box: USB Scanning device]]></title>
            <link rel="alternate" href="https://github.com/dbarzin/pandora-box" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10362"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PandoraBox is a USB scanning station designed to detect and remove malware from USB disks. It is based on Pandora by CIRCL and is distributed under the GPLv3 license.

Related contents:

- [Episode #513 consacré à Mercator @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/).]]>
            </summary>
            <updated>2025-09-23T09:10:29+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4198</id>
            <title type="text"><![CDATA[RansomLord]]></title>
            <link rel="alternate" href="https://github.com/malvuln/RansomLord" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4198"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware pre-encryption.

- [RansomLord, un outil open source capable de piéger les ransomwares ! @ IT-Connect :fr:](https://www.it-connect.fr/ransomlord-outil-open-source-anti-ransomware/).
- [RansomLord v3 – Un outil open source qui exploite les failles des ransomwares @ Korben :fr:](https://korben.info/ransomlord-v3-outil-anti-rancongiciel-open-source-exploite-failles.html).]]>
            </summary>
            <updated>2025-08-29T03:36:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4836</id>
            <title type="text"><![CDATA[Keysas]]></title>
            <link rel="alternate" href="https://github.com/r3dlight/keysas" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4836"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[USB virus cleaning station.
Retrieve untrusted files from USB (via keysas-io) or over the network.]]>
            </summary>
            <updated>2025-08-29T05:23:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7074</id>
            <title type="text"><![CDATA[docker-mailserver]]></title>
            <link rel="alternate" href="https://github.com/docker-mailserver/docker-mailserver" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7074"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Production-ready fullstack but simple mail server (SMTP, IMAP, LDAP, Antispam, Antivirus, etc.) running inside a container. Only configuration files, no SQL database. Keep it simple and versioned. Easy to deploy and upgrade. Documentation via MkDocs.]]>
            </summary>
            <updated>2025-08-29T11:36:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7075</id>
            <title type="text"><![CDATA[Poste.io]]></title>
            <link rel="alternate" href="https://poste.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7075"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[complete mail server
SMTP + IMAP + POP3 + Antispam + Antivirus
Web administration + Web email ...on your server in ~5 minutes]]>
            </summary>
            <updated>2025-08-29T11:36:20+00:00</updated>
        </entry>
    </feed>
