A comprehensive cybersecurity defense system featuring real-time memory monitoring, intelligent firewall management, automated backup systems, and a sophisticated web-based dashboard for system administration.
- β Continuous Memory Monitoring - Advanced ELF binary integrity checking with SHA256 hash verification
- β Intelligent Firewall Control - Dynamic iptables management with lockdown capabilities
- β Automated Backup System - Weekly backup scheduling with integrity preservation
- β Hash Verification System - Real-time file integrity monitoring and validation
- β System Manager - Centralized process and security orchestration
- β Multi-Level Authentication - Secure API authentication with JWT tokens
- β Application Redundancy - Dockerized deployment for high availability
- β Real-time Memory Analytics - Live visualization of memory check cycles and threat detection
- β Firewall Status Monitor - Port monitoring and network traffic analysis
- β Backup Management - Backup size tracking and copy management
- β Owner Authentication - AES-protected cloud database authentication for privileged operations
- β Containerized Deployment - Full Docker orchestration for rapid deployment
- β Modern Web Design - Responsive UI with real-time data visualization
- β Multi-Section Dashboard - Organized views for different security domains
- β Secure Authentication - Owner-level authentication system
- β Lockdown Interface - Emergency lockdown controls with visual feedback
- Framework: Django with Strawberry GraphQL
- Authentication: JWT-based API authentication
- Database: Django ORM with user and hash management
- APIs: RESTful endpoints and GraphQL queries for real-time data
- Framework: Next.js 15 with React 19
- Styling: Tailwind CSS with custom animations
- Charts: Chart.js and Recharts for data visualization
- UI Components: Radix UI components with custom theming
- Memory Monitor:
memchecker.cpp- Advanced ptrace-based memory analysis - Firewall Control:
firewall.cpp- iptables management with lockdown modes - Backup System:
backup.cpp- Automated file backup with versioning - Legacy Process:
legacy.cpp- Protected binary for integrity testing
- Docker and Docker Compose
- Linux environment with iptables support
- Root privileges for system-level operations
# Clone the repository
git clone https://github.com/aadidevcb/defcyber.git
cd defcyber
# Build the complete system
docker-compose build
# Start the complete system
docker-compose up -d# Security layer setup
cd security
g++ -o mem_check memchecker.cpp -lssl -lcrypto
g++ -o firewall firewall.cpp
g++ -o backup backup.cpp
g++ -o legacy legacy.cpp
# Backend setup
cd ../backend
pip install -r requirements.txt
python manage.py makegrations
python manage.py migrate
python manage.py runserver
# Frontend setup
cd ../frontend
npm install
npm run build
npm start# Backend
DJANGO_SECRET_KEY=your-secret-key
JWT_SECRET_KEY=your-jwt-secret
# Frontend
NEXT_PUBLIC_API_URL=http://localhost:8000/graphql/- Firewall Rules: Configure allowed ports in
manager.py - Memory Monitoring: Set hash verification paths in
memchecker.cpp - Backup Schedule: Modify backup intervals in
backup.cpp
- Navigate to
http://localhost:3000 - Authenticate with user credentials
- Monitor real-time security metrics
- Access owner-level controls at
http://localhost:8000/admin
# Firewall control
./firewall normal # Enable normal operations
./firewall shutdown # Emergency lockdown
./firewall show # Display open ports
# Memory monitoring
./mem_check # Start continuous monitoring
# Backup operations
./backup # Start backup daemon- Authentication:
POST /api/token/ - GraphQL:
POST /graphql/ - Admin Panel:
/admin/
- Memory integrity status with hash verification
- Network traffic monitoring (upload/download rates)
- Open port detection and analysis
- Backup status and storage utilization
- Memory corruption detection
- Unauthorized port access
- Network anomaly detection
- System lockdown notifications
- User Authentication: JWT-based API access
- Owner Authentication: AES-encrypted privileged access
- System Authentication: Hash-based binary verification
- Memory Tampering: SHA256 hash comparison of running processes
- Network Intrusion: Traffic pattern analysis and port monitoring
- File Integrity: Continuous backup verification and restoration
- Automatic Lockdown: Network isolation on threat detection
- Manual Override: Owner-level emergency controls
- System Recovery: Automated backup restoration
Complete containerization for:
- Security monitoring services
- Django backend API
- Database management
- Shared volume management
- Fork the repository
- Create a feature branch
- Implement security enhancements
- Test with provided Docker environment
- Submit pull request
This project is licensed under the MIT License - see the LICENSE file for details.
This system is designed for educational and authorized security testing purposes. Ensure proper authorization before deploying in production environments.
HACKSKY DEFCYBER - Advanced cybersecurity defense through intelligent monitoring and automated threat response.