A unified cybersecurity dashboard integrating offensive and defensive security tools into a single platform. Built for the SECUR-EU project to provide security teams with centralized visibility across threat intelligence, vulnerability assessment, intrusion detection, and network monitoring.
βββββββββββββββββββββββββββββββ
β Next.js Dashboard β
β (port 3000) β
ββββββββββββ¬βββββββββββββββββββ
β
ββββββββββββββββββββββββΌβββββββββββββββββββββββ
β β β
ββββββββββΌβββββββββ ββββββββββΌβββββββββ ββββββββββΌβββββββββ
β CTI Services β β Defensive Sec β β Offensive Sec β
β β β β β β
β - Dark Web Intel β β - SIEM (SEUXDR) β β - Pentest Suite β
β - Red Flags (AD) β β - DTM Traffic β β - SSL Checker β
β - VSP Scoring β β - SQS Botnet β β β
βββββββββββββββββββ βββββββββββββββββββ βββββββββββββββββββ
- Dark Web Monitoring β Automated scanning of dark web sources for leaked credentials and organizational mentions
- Red Flags (Log Anomaly Detection) β AI-powered log analysis using LLM models to detect anomalous patterns
- Vulnerability Score Prediction (VSP) β ML-based CVSS score prediction from vulnerability descriptions using NLP
- SIEM Dashboard (SEUXDR) β Host-based intrusion detection powered by Wazuh, with agent management, alert monitoring, and organization-level visibility
- Data Traffic Monitoring (DTM) β Network traffic analysis via Suricata with Kafka-based ingestion pipeline
- Anomaly Detection β Statistical anomaly detection on network traffic patterns
- Botnet Detection (SQS) β sFlow-based botnet detection with OpenSearch analytics
- Pentest Suite β Automated penetration testing with Nmap, OWASP ZAP, and Metasploit
- SSL/TLS Checker β Certificate validation and security assessment
| Layer | Technology |
|---|---|
| Frontend | Next.js 15, React 19, Tailwind CSS, Recharts |
| Auth | JWT + bcrypt, MongoDB |
| SIEM | Wazuh (OpenSearch), Go API server, mTLS agents |
| Traffic | Suricata, Kafka, Logstash, Spring Boot (Java 17) |
| Botnet | sFlow, OpenSearch, Logstash, FastAPI |
| ML/AI | Flask, scikit-learn, NLTK, Ollama |
| Pentest | Go server, Nmap, ZAP, Metasploit (Docker) |
| Infra | Docker Compose, PostgreSQL, MongoDB, Kafka |
- Ubuntu 22.04 / 24.04 LTS or Debian 12 (bookworm) and newer
- 20 GB RAM minimum, 32 GB recommended. Wazuh's installer briefly co-runs the indexer (1.5 GB JVM heap), the manager, and the dashboard alongside two more Spring Boot apps (DTM, AD) β ~10 GB peak during first install. 16 GB hosts routinely OOM-kill networking during Wazuh init. 32 GB gives comfortable headroom for query bursts and Wazuh re-init on container recreate.
- 4 vCPUs minimum
- 50 GB disk space
- SSH access with passwordless
sudo
The installer auto-detects the server IP via hostname -I, which on
VirtualBox returns the NAT address (10.0.2.x) β that address only exists
inside the VM. Pass the host-reachable IP explicitly so the frontend .env
and SEUXDR's TLS cert SAN match the address operators actually use:
sudo SERVER_IP=<host-only-ip> ./install.shIf the platform also needs to receive packets for Suricata/tshark (DTM
network monitoring), set CAPTURE_INTERFACE to the interface that sees the
target traffic β typically the host-only adapter (enp0s8) on VirtualBox,
because VirtualBox NAT (slirp) does not expose raw packets to af-packet:
sudo SERVER_IP=192.168.56.10 CAPTURE_INTERFACE=enp0s8 ./install.shDeploy the entire platform to a fresh Ubuntu server with a single command:
# 1. Install Ansible on your local machine
pip install ansible
# 2. Configure target server
cp inventory.yml.example inventory.yml
vi inventory.yml # set your server IP and SSH user
# 3. Configure variables
vi vars.yml # set jwt_secret, mongodb credentials
# 4. Deploy
ansible-playbook -i inventory.yml deploy.ymlThe playbook automatically installs all dependencies (Docker, Node.js 20, Go 1.22, Java 17), copies the platform to /opt/secur-eu/, builds the frontend, and starts everything via systemd.
If you prefer to set up manually:
# Install dependencies
apt install -y docker.io nodejs npm default-jdk golang-go
# Copy platform to /opt
cp -r . /opt/secur-eu/
# Configure frontend
cd /opt/secur-eu/frontend
cp local.env .env # edit with your server IP
npm ci && npm run build
# Start backend (all 10 service groups)
cd /opt/secur-eu/backend
chmod +x start.sh stop.sh
./start.sh
# Start frontend
cd /opt/secur-eu/frontend
npm start -- -p 3000After deployment, the following services are running:
| Service | Port | Description |
|---|---|---|
| Dashboard | 3000 | Next.js web interface |
| SEUXDR Manager | 8443 (HTTPS) | SIEM/HIDS API server |
| SSL Checker | 5000 | TLS certificate analysis |
| Pentest | 3001 | Penetration testing API |
| VSP | 5002 | Vulnerability score prediction |
| Dark Web | 8001 | Dark web monitoring API |
| Red Flags | 8002 | Log anomaly detection |
| DTM | 8087 | Data traffic monitoring |
| Anomaly Detection | 5001 | Network anomaly detection |
| SQS (Botnet) | 8000 | Botnet detection API |
| OpenSearch | 9200 | Search and analytics engine |
| Kafka | 9092 | Message broker |
| MongoDB | 27017 | Dashboard auth database |
| PostgreSQL | 8432 | DTM/AD shared database |
# Systemd services (after Ansible deployment)
sudo systemctl start|stop|status secureu-backend
sudo systemctl start|stop|status secureu-frontend
# View logs
journalctl -u secureu-frontend -f
journalctl -u secureu-backend -f
# Manual start/stop
cd /opt/secur-eu/backend
./start.sh # starts all 10 backend service groups
./stop.sh # gracefully stops everythingsecureu-platform/
βββ deploy.yml # Ansible deployment playbook
βββ inventory.yml.example # Target server template
βββ vars.yml # Deployment variables
β
βββ frontend/ # Next.js dashboard
β βββ app/ # Pages and API routes
β β βββ api/ # Backend proxy routes
β β βββ defsec/ # Defensive security pages
β β βββ cti/ # Threat intelligence pages
β β βββ offsec/ # Offensive security pages
β β βββ ...
β βββ components/ # React components
β β βββ siem/ # SIEM Dashboard
β β βββ darkweb/ # Dark Web monitoring
β β βββ cti/ # VSP, Red Flags
β β βββ dtmad/ # Traffic monitoring
β β βββ sqs/ # Botnet detection
β β βββ ...
β βββ lib/ # Auth, DB utilities
β
βββ backend/ # Microservices
βββ start.sh # Start all services
βββ stop.sh # Stop all services
βββ seuxdr/ # SIEM/HIDS (Wazuh + Go)
βββ dtmad/ # DTM + Anomaly Detection (Java)
βββ sqs/ # Botnet detection (FastAPI)
βββ darkweb/ # Dark web backend
βββ redflags/ # Log anomaly (Ollama)
βββ vsp/ # Vulnerability scoring (Flask)
βββ pentest/ # Pentest suite (Go)
βββ sslchecker/ # SSL checker (Flask)
This project is developed as part of the SECUR-EU research initiative.




