Skip to content

Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.

License

Notifications You must be signed in to change notification settings

DecryptMike/DecryptMike-Log-Analyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Python Flask Real-Time License

DecryptMike Logo

📊 Log Analyzer with Real-Time Threat Detection


🛠️ Features

  • ✅ Detects brute-force login attempts
  • ✅ Identifies suspicious IP activity
  • ✅ Flags directory traversal attacks
  • ✅ Real-time dashboard using Flask
  • ✅ Color-coded terminal alerts
  • ✅ Simulated attacker log entries

📸 Screenshot

Log Analyzer in Action


🧱 Project Structure

log-analyzer/
├── logs/
│   └── test.log
├── templates/
│   └── index.html
├── static/
│   └── DecryptMikeLogo.png
├── analyzer.py
├── dashboard.py
├── simulator.py
├── requirements.txt
└── README.md

⚙️ Tech Stack

Python 3.11
Flask
Colorama
HTML/CSS (for dashboard)

🚀 Getting Started

1. Clone the Repo

git clone https://github.com/DecryptMike/Log-Analyzer-Threat-Detection.git
cd log-analyzer

2. Set Up Virtual Environment

python3 -m venv venv
source venv/bin/activate

3. Install Requirements

pip install -r requirements.txt

4. Start the Real-Time Dashboard

python dashboard.py

Visit: http://127.0.0.1:5000

5. Simulate Attack Log Entries

In a separate terminal tab:

python simulator.py

📄 Why I Built It

This project was built to showcase real-world cybersecurity monitoring skills. It simulates a functioning honeypot that detects and logs threats in real time while displaying them on a visual dashboard.


⚠️ Legal Disclaimer

This tool is intended for educational and authorized personal use only.
Do not use it to store sensitive or production passwords without enhancements.


💻 Built by @DecryptMike


About

Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. Built For Threat Detection And Security Analysis.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published