Zerorose is a project that tries to use machine learning to analyze known vulnerabilities in the visitors system. It does this by identifying plugins, browser, OS, common misconfigurations and similar key identifiers, and checking if any of them are known to be vulnerable for any issues, if they are or infected with malwares, if they still have support, if their compatibility/installation can cause other issues or best practice bypasses. We try to make Exploitkits [1], adwares[2] and other malicious infections like ransom-wares[3] doesn't occur.

What are exploit kits? [1]

An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and discovering and exploiting vulnerabilities to upload and execute malicious code on the client. One of the earlier kits was MPack, in 2006.[1] Exploit kits are often designed to be modular and easy to use, enabling the addition of new vulnerabilities and the removal of existing ones.

False Positives

Although we try to deliver reliable and actionable information, it is possible for the system to assume and identify non-existent issues because of a number of factors. This could be because you using a modified user agent, using modified plugins or the names of plugins, addons or scripts you using matching a known malware.

How are you different from exploit kits?

You may have heard of Blackhole[4], Crime, Angler[5] or other exploit kits. What they are doing is not much different from us, except maybe: we are cooler, free and safe.

How can I trust zerorose?

If you are reading this, it likely means you click anywhere and could already be infected. Fortunately, zerorose is run by real people just trying to help.

Are you the only one doing this?

As far as we are aware, yes. Us and exploit kits.

Why not open source?

We figured it's quite easier to visit our website than download/run it in your host every time you want to scan something, and that data will soon be outdated. That and we don't want to share our codes.

Is it free?

Absolutely.

Why aren't you using SSL?

Yes, we are aware of your data analysis being sent in plain HTTP could help attackers gain more knowledge about your system. We are not funded to use uber-secure certificates at the time and using Let's Encrypt is the same in this case. We are working on it.

Do you accept donations?

Yes, we welcome any kind of help being we are a small team doing this in a part time.

Reference

  1. https://en.wikipedia.org/wiki/Exploit_kit
  2. https://en.wikipedia.org/wiki/Adware
  3. https://en.wikipedia.org/wiki/Ransomware
  4. https://blogs.sophos.com/2015/07/21/a-closer-look-at-the-angler-exploit-kit/