Enterprise-Grade Cyber Investigation & Intelligence Platform
NexusIntel is a modular, analyst-centric cyber investigation platform designed for security researchers, SOC analysts, OSINT investigators, and red/blue teams. It correlates infrastructure, maps relationships, builds investigation graphs, and enriches intelligence in a production-grade environment.
- β Not a simple dashboard
- β Not another generic OSINT scanner
- β Not another SIEM clone
- β An investigation workspace with persistent case management
- β A cyber intelligence correlation engine
- β A relationship & infrastructure mapping system
- β An analyst-focused investigation pivot platform
- β Enterprise-grade with commercial UI/UX
Create and manage investigations with persistent sessions, evidence organization, notes, tags, and pivot tracking.
Enrich indicators (IPs, domains, URLs, emails, usernames, hashes, ASNs) with:
- DNS resolution & reverse DNS
- WHOIS & ASN data
- TLS certificates
- Subdomain discovery
- Geolocation data
- Technology fingerprinting
Interactive relationship visualization featuring:
- Node types: Domains, IPs, ASNs, certificates, emails, users, hashes, technologies
- Edge types: hosted_on, resolves_to, owns, related_to, uses, shares_certificate, shares_asn
- Capabilities: Zoom, drag, filter, cluster, export, animated transitions
Upload and organize evidence:
- Screenshots, JSON, logs, text, CSV files
- Automatic SHA256 hashing
- Metadata preservation
- Timestamp tracking
Optional API integrations for:
- AbuseIPDB
- Shodan
- Censys
- VirusTotal
- OTX (AlienVault)
- GreyNoise
Detect infrastructure relationships via:
- Shared ASN detection
- Certificate correlation
- Hosting provider analysis
- Favicon hash matching
Export investigations as:
- Markdown reports
- JSON structures
- Styled HTML documents
- Investigation summaries
Search across:
- Indicators
- Cases
- Evidence
- Notes
- Relationships
Visual investigation timeline showing:
- Analyst pivots
- Evidence uploads
- Enrichment results
- Actions taken
- FastAPI - Async web framework
- SQLAlchemy - ORM
- Pydantic - Data validation
- AsyncIO - Async operations
- httpx - Async HTTP client
- SQLite/PostgreSQL - Databases
- React 18 - UI framework
- Vite - Build tool
- TailwindCSS - Styling
- Framer Motion - Animations
- Cytoscape.js - Graph visualization
- React Flow - Alternative graph library
- Monaco Editor - Code editor
- Zustand - State management
- Docker - Containerization
- Docker Compose - Orchestration
- GitHub Actions - CI/CD
- Python 3.12+
- Node.js 18+
- Docker & Docker Compose (optional)
1. Clone the repository:
git clone https://github.com/xdrew87/nexusintel.git
cd nexusintel2. Backend setup:
cd backend
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
pip install -r requirements.txt
cp .env.example .env
python3 -m uvicorn api.main:app --reloadBackend runs on http://localhost:8000
3. Frontend setup (new terminal):
cd frontend
npm install
npm run devFrontend runs on http://localhost:5173
4. Access NexusIntel:
Open http://localhost:5173 in your browser
docker-compose up -dThis starts:
- Backend (port 8000)
- Frontend (port 5173)
- SQLite database
Visit http://localhost:5173
API docs available at http://localhost:8000/docs (Swagger UI)
GET /api/v1/investigations - List investigations
POST /api/v1/investigations - Create investigation
GET /api/v1/investigations/{id} - Get investigation
PUT /api/v1/investigations/{id} - Update investigation
DELETE /api/v1/investigations/{id} - Delete investigation
POST /api/v1/indicators/enrich - Enrich indicator
GET /api/v1/indicators/{id} - Get indicator details
GET /api/v1/graph/{investigation_id} - Get graph data
POST /api/v1/graph/pivot - Pivot from indicator
POST /api/v1/evidence/upload - Upload evidence
GET /api/v1/evidence/{id} - Get evidence
GET /api/v1/search?query=... - Global search
NexusIntel/
βββ backend/
β βββ api/ # REST API routes
β βββ models/ # SQLAlchemy models
β βββ services/ # Business logic
β βββ enrichers/ # Enrichment modules
β βββ graph/ # Graph engine
β βββ database/ # DB setup
β βββ utils/ # Utilities
β βββ main.py # Entry point
βββ frontend/
β βββ src/
β β βββ components/ # React components
β β βββ pages/ # Page routes
β β βββ hooks/ # Custom hooks
β β βββ stores/ # Zustand state
β β βββ utils/ # Utilities
β βββ public/ # Static assets
βββ docs/ # Documentation
βββ docker/ # Docker configs
βββ scripts/ # Utility scripts
NexusIntel implements:
- β Strict input validation
- β Secure file handling with path traversal protection
- β Rate limiting
- β API sanitization
- β Safe async workers
- β CSP headers
- β Secure session handling
- β Environment-based configuration (no hardcoded secrets)
Never:
- Exposed API keys
- Hardcoded secrets
- Unrestricted uploads
- Unvalidated user input
See SECURITY.md for details.
Copy .env.example to .env and configure:
# Database
DATABASE_URL=sqlite:///./nexusintel.db
# DATABASE_URL=postgresql://user:pass@localhost/nexusintel # PostgreSQL support
# API Keys (optional - leave blank to skip integrations)
SHODAN_API_KEY=
ABUSEIPDB_API_KEY=
VIRUSTOTAL_API_KEY=
CENSYS_API_KEY=
GREYNOISE_API_KEY=
# Features
ENABLE_ENRICHMENT=true
ENABLE_GRAPH_ENGINE=true
ENABLE_AUTONOMOUS_PIVOTING=false
# Server
DEBUG=false
LOG_LEVEL=INFOcd backend
pytest tests/ -v
pytest tests/ --cov=api # With coveragecd frontend
npm test
npm run test:e2eWe welcome contributions! See CONTRIBUTING.md for guidelines.
Areas for contribution:
- New enrichment modules
- UI/UX improvements
- Integration modules
- Documentation
- Bug fixes
- β Investigation workspace
- β Intelligence enrichment
- β Graph visualization
- β Evidence management
- β Basic report generation
- π Campaign clustering automation
- π Autonomous pivoting engine
- π Infrastructure heatmaps
- π Multi-user collaboration
- π Investigation sharing & collaboration
- π Advanced visualization options
- π Custom enrichment modules
- π Cloud deployment templates
This project is licensed under the MIT License - see LICENSE for details.
NexusIntel is provided for authorized security research and testing only. Unauthorized access, data collection, or use against systems you don't own or have permission to test is illegal. Users are solely responsible for ensuring lawful use.
xdrew87 - Cybersecurity Researcher & OSINT Specialist
- GitHub: @xdrew87
- Focus: Enterprise security, OSINT, infrastructure investigation
- Issues: GitHub Issues for bugs and features
- Discussions: GitHub Discussions for questions
- Documentation: See
/docsfolder
Inspired by:
- Palantir Gotham
- Maltego
- Elastic Security
- Recorded Future
- Microsoft Sentinel
Built with β€οΈ for the security research community
