Skip to content

A Python script for monitoring and terminating suspicious processes such as PowerShell and FTP to enhance system security. Includes logging functionality and instructions for creating an executable.

License

Notifications You must be signed in to change notification settings

CodeBerserkers888/AntyPayload-SecureProcessMonitor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SecureProcessMonitor

Static Badge GitHub Release Date

SecureProcessMonitor Logo

ANTYPAYLOAD-SECURE PROCESS MONITOR

HTTP error 401 for prompt `slogan`

license last-commit repo-top-language repo-language-count

Developed with the software and tools below.

Python GitHub%20Actions


🔗 Quick Links


📍 Overview

HTTP error 401 for prompt overview


📦 Features

HTTP error 401 for prompt features


📂 Repository Structure

└── AntyPayload-SecureProcessMonitor/
    ├── .github
    │   └── workflows
    │       └── python-package.yml
    ├── LICENSE
    ├── README.md
    ├── assets
    │   └── logo.png
    ├── processmonitor.py
    ├── requirements.txt
    └── src
        ├── email_notifier.py
        ├── gui.py
        └── processmonitor.py

🧩 Modules

.
File Summary
processmonitor.py HTTP error 401 for prompt processmonitor.py
requirements.txt HTTP error 401 for prompt requirements.txt
.github.workflows
File Summary
python-package.yml HTTP error 401 for prompt .github/workflows/python-package.yml
src
File Summary
email_notifier.py HTTP error 401 for prompt src/email_notifier.py
gui.py HTTP error 401 for prompt src/gui.py
processmonitor.py HTTP error 401 for prompt src/processmonitor.py

🚀 Getting Started

Requirements

Ensure you have the following dependencies installed on your system:

  • Python: version 1.0.0

⚙️ Installation

  1. Clone the AntyPayload-SecureProcessMonitor repository:
git clone https://github.com/CodeBerserkers888/AntyPayload-SecureProcessMonitor
  1. Change to the project directory:
cd AntyPayload-SecureProcessMonitor
  1. Install the dependencies:
pip install -r requirements.txt

🤖 Running AntyPayload-SecureProcessMonitor

Use the following command to run AntyPayload-SecureProcessMonitor:

python main.py

🧪 Tests

To execute tests, run:

pytest

🛠 Project Roadmap

  • ► INSERT-TASK-1
  • ► INSERT-TASK-2
  • ► ...

🤝 Contributing

Contributions are welcome! Here are several ways you can contribute:

Contributing Guidelines
  1. Fork the Repository: Start by forking the project repository to your GitHub account.
  2. Clone Locally: Clone the forked repository to your local machine using a Git client.
    git clone https://github.com/CodeBerserkers888/AntyPayload-SecureProcessMonitor
  3. Create a New Branch: Always work on a new branch, giving it a descriptive name.
    git checkout -b new-feature-x
  4. Make Your Changes: Develop and test your changes locally.
  5. Commit Your Changes: Commit with a clear message describing your updates.
    git commit -m 'Implemented new feature x.'
  6. Push to GitHub: Push the changes to your forked repository.
    git push origin new-feature-x
  7. Submit a Pull Request: Create a PR against the original project repository. Clearly describe the changes and their motivations.

Once your PR is reviewed and approved, it will be merged into the main branch.


📄 License

This project is protected under the MIT License.

👏 Acknowledgments

  • List any resources, contributors, inspiration, etc. here.

Return


About

A Python script for monitoring and terminating suspicious processes such as PowerShell and FTP to enhance system security. Includes logging functionality and instructions for creating an executable.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages