Zerorose is a project that tries to use machine learning to analyze known vulnerabilities
in the visitors system. It does this by identifying plugins, browser, OS, common misconfigurations
and similar key identifiers, and checking if any of them are known to be vulnerable for any issues,
if they are or infected with malwares, if they still have support, if their compatibility/installation
can cause other issues or best practice bypasses. We try to make Exploitkits , adwares and
other malicious infections like ransom-wares doesn't occur.
What are exploit kits? 
An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software
vulnerabilities in client machines communicating with it, and discovering and exploiting vulnerabilities
to upload and execute malicious code on the client. One of the earlier kits was MPack, in 2006. Exploit
kits are often designed to be modular and easy to use, enabling the addition of new vulnerabilities and
the removal of existing ones.
Although we try to deliver reliable and actionable information, it is possible for the system to assume and
identify non-existent issues because of a number of factors. This could be because you using a modified user
agent, using modified plugins or the names of plugins, addons or scripts you using matching a known malware.
How are you different from exploit kits?
You may have heard of Blackhole, Crime, Angler or other exploit kits. What they are doing is not much
different from us, except maybe: we are cooler, free and safe.
How can I trust zerorose?
If you are reading this, it likely means you click anywhere and could already be infected.
Fortunately, zerorose is run by real people just trying to help.
Are you the only one doing this?
As far as we are aware, yes. Us and exploit kits.
Why not open source?
We figured it's quite easier to visit our website than download/run it in your host every time
you want to scan something, and that data will soon be outdated. That and we don't want to share our codes.
Is it free?
Why aren't you using SSL?
Yes, we are aware of your data analysis being sent in plain HTTP could help attackers gain more knowledge
about your system. We are not funded to use uber-secure certificates at the time and using Let's Encrypt
is the same in this case. We are working on it.
Do you accept donations?
Yes, we welcome any kind of help being we are a small team doing this in a part time.