Security testing false positive illustration

The malicious detections flagged by antivirus engines when scanning our password-protected ZIP files are not caused by actual executable malware or malicious shellcode. These samples are deliberately uploaded in locked ZIP archives solely for the purpose of safely testing and validating our detection modules in a controlled environment.

Even advanced reconnaissance heuristics or behavior-based scanners (including Reconsinae) may flag these files due to simulation of typical malicious actor techniques. No payload inside is capable of execution — neither directly nor through any extraction or decompression bypass.

All such detections are expected false positives resulting from realistic malware-mimicking patterns used for quality assurance and module tuning. We do not distribute, nor have we ever distributed, any live and functional malicious software.

This is standard practice in security product development and red-team simulation testing.

DNN Defender — Hybrid AI Protection for DNN Platforms
Real-time defense against malicious code and high-risk file activityTrial active: 5 day(s) remaining.
Critical
0
High
0
Threats Over Time
WAF Events Over Time (Tự động theo giờ 24h gần nhất - Kéo ngang để xem chi tiết)
Scan Status
Scanning / Idle
Processed
0
Last Updated (UTC)
Maintenance Mode: Controlled by SecurityMode (1–4)
Realtime Watcher: RUNNING – Monitor Only | (detects file changes in real-time and scans them with a short, background delay using queued batch processing — website performance is not affected; no automatic quarantine — admin decides)
Recent Detections
Time Severity Score Path Archive
1/28/2026 5:50:47 AM SAFE 0.000 DesktopModules/MaliciousSamples/x64_shell_reverse_tcp.aspx -
1/28/2026 5:50:47 AM SAFE 0.000 DesktopModules/MaliciousSamples/x64_meterpreter_reverse_https.aspx -