A multi-language, extensible cybersecurity platform for threat analysis, IOC enrichment, attack surface reconnaissance, and collaborative threat detection. Built with Python, Java, JavaScript, HTML, and CSS for enterprise-grade threat intelligence and detection operations.
CTIAS Lab empowers security analysts, students, and researchers to:
- Run collaborative threat analysis in a controlled, sandboxed environment
- Analyze Indicators of Compromise (IOCs) using ML and rule-based detection
- Perform attack surface reconnaissance with visual mapping and recon modules
- Build custom detection rules and contribute them back to the community
- Learn cybersecurity through guided labs and real-world attack scenarios
- Integrate multiple languages seamlessly into a single threat intel platform
- Discover and map target infrastructure (domains, IPs, services)
- Visual graph representation of hosts, ports, and vulnerabilities
- Multi-stage recon modules: DNS, WHOIS, SSL/TLS fingerprinting, port scanning
- Submit IPs, domains, URLs, file hashes for analysis
- Parallel processing with Python, Java, and JS modules
- Reputation checks, malware correlation, and threat feeds
- Upload logs (Apache, Nginx, Windows, syslog, etc.)
- Parse and normalize events with Java-based engines
- Real-time detection with ML anomaly detectors and rule engines
- YAML/JSON rule editor with live validation
- Sigma-like rule format for portability
- Test rules against sample data before deployment
- Guided cybersecurity exercises with real attack traces
- Interactive scenarios demonstrating detection and response
- Sample datasets, playbooks, and best practices
- Python: ML models, PCAP analysis, IOC enrichment, anomaly detection
- Java: Log normalization, rule engines, high-throughput processing
- JavaScript: Browser-based analyzers, URL deobfuscation, client-side crypto
- Go/Rust (Optional): Fast scanners, OSINT collectors, performance-critical tasks
- Docker & Docker Compose (recommended)
- OR: Python 3.9+, Java 11+, Node.js 16+, PostgreSQL 13+
- Git
git clone https://github.com/pangerlkr/ctias-lab.git
cd ctias-lab
docker-compose up -dThen open: http://localhost:3000 (Frontend) and http://localhost:8000 (API)
ctias-lab/
frontend/ # React/Vue SPA + UI components
gateway/ # Python FastAPI backend
modules-java/ # Java microservices
modules-python/ # Python analysis modules
modules-js/ # JavaScript/TypeScript analyzers
rules/ # Community-contributed detection rules
scenarios/ # Training labs & sample datasets
docs/ # Architecture, operations, contributing
docker/ # Docker Compose & Dockerfiles
tests/ # Integration & unit tests
CONTRIBUTING.md
SECURITY.md
LICENSE (MIT)
See ARCHITECTURE.md for detailed system design.
| Component | Technology | Purpose |
|---|---|---|
| Frontend | React/Vue, HTML5, CSS3, Chart.js | Web UI for analysts |
| Gateway API | Python FastAPI | REST/GraphQL API, job orchestration |
| Backend Services | Java, Spring Boot | High-performance processing |
| ML/Analysis | Python, scikit-learn, pandas | Anomaly detection, enrichment |
| Web Tools | JavaScript, TypeScript | Browser-based analyzers |
| Database | PostgreSQL | Events, rules, users |
| Cache/Queue | Redis | Job queue, session cache |
| Containerization | Docker, Docker Compose | Reproducible deployments |
| CI/CD | GitHub Actions | Automated testing & releases |
We welcome contributions from security professionals, data scientists, and developers. See CONTRIBUTING.md for:
- How to add new detection modules in Java, Python, or JavaScript
- Language-specific style guides
- Testing & CI/CD requirements
- Pull request workflow
For Security Engineers: Add detection rules, log parsers, and playbooks
For Data Scientists: Implement ML models and anomaly detectors
For Full-Stack Developers: Enhance UI, add API endpoints, optimize performance
For DevOps Engineers: Create Kubernetes manifests and CI/CD pipelines
- ARCHITECTURE.md - System design, module contracts, data flow
- THREAT_MODELS.md - Security assumptions, threat scenarios
- OPERATIONS.md - Deploy, monitor, scale, troubleshoot
- API_REFERENCE.md - Gateway endpoints and schemas
- CONTRIBUTING.md - Developer onboarding guide
CTIAS Lab is designed for defensive and educational purposes only.
- All reconnaissance and testing occurs in a controlled lab environment
- Do NOT use this platform for unauthorized testing
- Always obtain proper authorization before running any attack simulations
- Comply with local laws and regulations
- See SECURITY.md for responsible disclosure
Project Maintainer: Pangerkumzuk Longkumer (@pangerlkr)
Organization: NEXUSCIPHERGUARD INDIA
Contact: contact@pangerlkr.link
Location: Kohima, Nagaland, India
CTIAS Lab is licensed under the MIT License. See LICENSE for details.
Star this repo and contribute to make it better!