Docs chevron_right Getting Started

Core Concepts

Virus Plow is built on a layered, zero-trust security architecture designed to detect known and unknown threats across files, memory, and network activity.

shield

Real-Time Shield

Blocks threats instantly during execution.

psychology

Heuristic Engine

Detects unknown malware patterns.

memory

Memory Protection

Stops in-memory exploits.

Detection Pipeline

File Input
Signature Scan
Heuristics
Behavior Monitor
Verdict

Signature Detection

Matches files against millions of known malware hashes and patterns.

Heuristic Analysis

Detects polymorphic and zero-day malware using behavior modeling.

Behavior Monitoring

Tracks runtime activity like file writes, registry edits, and process injection.

Cloud Intelligence

Optional API layer providing real-time threat intelligence updates.

Detection Methods Comparison

Method Detects Known Detects Unknown Speed
Signature Fast
Heuristic Medium
Behavior Slower

CLI Example

vp scan suspicious.exe
vp monitor start
vp quarantine list

API Example

POST /api/v1/scan
{ "file": "base64data" }

⚠ Heuristic Detection

May flag unknown programs as suspicious. Review before deleting.

✔ Best Practice

Keep real-time protection enabled for maximum security.

Performance Metrics

50ms

Avg Scan Time

99.8%

Detection Rate

0.1%

False Positives

Explore Next

Learn how Virus Plow is structured internally.

View Architecture →