ML Anomaly Detection
Isolation Forest & Random Forest models learn your network baseline and flag deviations that rule-based systems miss.
CyberRemedy delivers the full capability of a Security Operations Centre — ML threat detection, MITRE ATT&CK mapping, SOAR automation and real-time monitoring — on a single machine you own.
Built to give small and medium teams the same power used by large security operations centres — without vendor lock-in or subscription costs.
Isolation Forest & Random Forest models learn your network baseline and flag deviations that rule-based systems miss.
Every alert is automatically tagged with tactics and techniques from the MITRE ATT&CK framework for rapid triage.
Links related alerts into multi-step chains — Recon → Exploit → C2 → Exfil — so you see the full attack story.
Automated response workflows that block, notify, escalate and run scripts without analyst intervention.
Fake SSH, HTTP, FTP, Telnet, SMB and MySQL services that trigger instant alerts on any unauthorized connection.
Full ticket lifecycle with SLA tracking and automatic case creation tied to correlated alert chains.
Scan packet payloads with built-in or custom YARA rules. Evaluate Sigma rules against live log streams in real time.
Per-entity behavioral baselines detect insider threats and compromised accounts through deviation scoring.
Visual global map showing inbound alert origins by country. Understand your threat geography at a glance.
A single Python process handles the full pipeline — no agents, no microservices, no cloud dependencies.
Collects network packets, syslog (RFC 3164/5424 on port 5514) and Windows Event Logs via the bundled agent on port 5515.
Signatures catch known patterns. ML models flag unknowns. The correlation engine chains related events into attack narratives with MITRE tags.
SOAR playbooks fire when a threat confirms — blocking IPs via iptables, ufw, nftables or Windows Firewall and alerting your team.
Forensic timelines, case management and daily PDF reports give analysts everything needed to close the loop.
Packet sniffer · Syslog · Windows Agent
Hot / warm / cold event storage
Signatures · ML · YARA · Sigma · UEBA
SOAR Playbooks · Firewall · Case Mgmt
Real-time web UI · Email alerts · PDF reports
| Capability | Description | Category |
|---|---|---|
| Signature-Based Detection | Port scans, brute-force, C2 beaconing, DNS tunneling, SQL injection — detected in real time. | Detection |
| ML Anomaly Detection | Isolation Forest + Random Forest models learn your network baseline and flag deviations. | Detection |
| Attack Chain Correlation | Links related alerts into multi-step attack chains: Recon → Exploit → C2 → Exfil. | Detection |
| MITRE ATT&CK Mapping | Automatically tags all alerts with techniques and tactics from the MITRE ATT&CK framework. | Intelligence |
| YARA Scanning | Scans packet payloads with built-in or fully custom YARA rules in real time. | Detection |
| Sigma Rules | Evaluates structured detection rules against live log streams for broad platform coverage. | Detection |
| UEBA | Tracks per-entity behavioral baselines and raises anomaly alerts on statistically significant deviations. | Analytics |
| Honeypots | Six fake services — SSH, HTTP, FTP, Telnet, SMB, MySQL — that trigger instant alerts on any connection. | Deception |
| SOAR Playbooks | Automated response workflows: block, notify, escalate, run custom scripts on alert trigger. | Response |
| Case Management | Full ticket lifecycle with SLA tracking and automatic case creation from correlated alert chains. | Operations |
| Asset Discovery | ARP + ping sweep finds all LAN devices; rogue device alerts fire on first-time detection. | Inventory |
| GeoIP Mapping | Visual global map showing inbound alert origins by country with high-risk heat overlay. | Intelligence |
| Syslog Ingestion | Receives RFC 3164/5424 syslog via UDP/TCP on port 5514. Compatible with rsyslog and syslog-ng. | Ingestion |
| Windows Event Log | Collects Windows Event Logs via the bundled lightweight agent over port 5515. | Ingestion |
| Email Alerting & Reporting | Sends CRITICAL/HIGH alerts and daily PDF reports via SMTP — configurable from the dashboard. | Reporting |
| Firewall Automation | Blocks attacker IPs automatically via iptables, ufw, nftables or Windows Firewall on detection. | Response |
| Packet Analysis | Wireshark-style flow table with ML classification, protocol distribution, and top talker analysis. | Analytics |
| Traffic Heatmap | Hour-of-day vs day-of-week heatmap showing traffic density and malicious event concentration. | Analytics |
No telemetry. No vendor access. No subscription. CyberRemedy is open-source and runs entirely on infrastructure you control.
All logs, alerts and events stay on your machine. Zero data sent to external servers — ever.
Open-source and free forever. No per-seat pricing, no tiered plans, no surprise invoices.
Modify rules, playbooks and models to fit your environment. No black-box vendor restrictions.
Enterprise-grade capability sized for small and medium teams — single-machine deployment in minutes.
Clone, install, run. No wizard, no cloud account, no API key required to get started.
sudo apt install arp-scan nmapFaster asset discoverypip install yara-python==4.5.1Native YARA scanningpip install netifaces==0.11.0Accurate interface detection# Clone and enter the directory git clone https://github.com/moon0deva/CyberRemedy.git cd CyberRemedy # Create and activate virtual environment python3 -m venv venv source venv/bin/activate # Install dependencies pip install -r requirements.txt # Launch the platform python main.py # → http://127.0.0.1:8000
Background mode: nohup python3 main.py > cyberremedy.log 2>&1 &
Community-driven and free for any team — from a solo home-lab to a full enterprise SOC. No strings attached.