├── Decrypt Mike Threat Log Streams.gif ├── DecryptMikeLogo.png ├── LICENSE └── README.md /Decrypt Mike Threat Log Streams.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/DecryptMike/DecryptMike-Log-Analyzer/63972b90819616cfa3e4a500fc11c1722a22cf83/Decrypt Mike Threat Log Streams.gif -------------------------------------------------------------------------------- /DecryptMikeLogo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/DecryptMike/DecryptMike-Log-Analyzer/63972b90819616cfa3e4a500fc11c1722a22cf83/DecryptMikeLogo.png -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2025 H4ck3rByt3s 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ![Python](https://img.shields.io/badge/Python-3.11-blue?logo=python) 2 | ![Flask](https://img.shields.io/badge/Flask-2.3+-informational?logo=flask) 3 | ![Real-Time](https://img.shields.io/badge/Feature-Real--Time%20Dashboard-green) 4 | ![License](https://img.shields.io/github/license/DecryptMike/DecryptMike-Web-Vuln-Scanner) 5 | 6 |

7 | DecryptMike Logo 8 |

9 | 10 |

11 | 📊 Log Analyzer with Real-Time Threat Detection 12 |

13 | 14 | --- 15 | 16 | ## 🛠️ Features 17 | 18 | - ✅ Detects brute-force login attempts 19 | - ✅ Identifies suspicious IP activity 20 | - ✅ Flags directory traversal attacks 21 | - ✅ Real-time dashboard using Flask 22 | - ✅ Color-coded terminal alerts 23 | - ✅ Simulated attacker log entries 24 | 25 | --- 26 | 27 | ## 📸 Screenshot 28 | 29 |

30 | Log Analyzer in Action 31 |

32 | 33 | --- 34 | 35 | ## 🧱 Project Structure 36 | 37 | ``` 38 | log-analyzer/ 39 | ├── logs/ 40 | │ └── test.log 41 | ├── templates/ 42 | │ └── index.html 43 | ├── static/ 44 | │ └── DecryptMikeLogo.png 45 | ├── analyzer.py 46 | ├── dashboard.py 47 | ├── simulator.py 48 | ├── requirements.txt 49 | └── README.md 50 | ``` 51 | 52 | --- 53 | 54 | ## ⚙️ Tech Stack 55 | 56 | ```bash 57 | Python 3.11 58 | Flask 59 | Colorama 60 | HTML/CSS (for dashboard) 61 | ``` 62 | 63 | --- 64 | 65 | ## 🚀 Getting Started 66 | 67 | ### 1. Clone the Repo 68 | 69 | ```bash 70 | git clone https://github.com/DecryptMike/Log-Analyzer-Threat-Detection.git 71 | cd log-analyzer 72 | ``` 73 | 74 | ### 2. Set Up Virtual Environment 75 | 76 | ```bash 77 | python3 -m venv venv 78 | source venv/bin/activate 79 | ``` 80 | 81 | ### 3. Install Requirements 82 | 83 | ```bash 84 | pip install -r requirements.txt 85 | ``` 86 | 87 | ### 4. Start the Real-Time Dashboard 88 | 89 | ```bash 90 | python dashboard.py 91 | ``` 92 | 93 | Visit: `http://127.0.0.1:5000` 94 | 95 | ### 5. Simulate Attack Log Entries 96 | 97 | In a separate terminal tab: 98 | 99 | ```bash 100 | python simulator.py 101 | ``` 102 | 103 | --- 104 | 105 | ## 📄 Why I Built It 106 | 107 | This project was built to showcase real-world cybersecurity monitoring skills. It simulates a functioning honeypot that detects and logs threats in real time while displaying them on a visual dashboard. 108 | 109 | --- 110 | 111 | ## ⚠️ Legal Disclaimer 112 | 113 | This tool is intended for **educational and authorized personal use only**. 114 | Do not use it to store sensitive or production passwords without enhancements. 115 | 116 | --- 117 | 118 | ## 💻 Built by [@DecryptMike](https://github.com/DecryptMike) 119 | 120 | --- 121 | 122 |

123 | 124 | 125 |

126 | --------------------------------------------------------------------------------