QuantumGuard is a complete offline, autonomous, cyber-defense simulator designed to simulate vulnerabilities, predict risks, auto-harden systems, and visually display security analytics in a modern cyberpunk/purple hacker-style dashboard. This system operates entirely offline, utilizing self-contained intelligence through Python, C++, heuristics, and local machine learning models. No external AI APIs or cloud services are required, ensuring full autonomy and security.
Key Features:
- Vulnerable Application Layer: Deploys OWASP Juice Shop with a custom cyberpunk theme for training purposes.
- Scanner & Risk Analyzer: Performs SAST, SCA, container, and IaC scans using local CLI tools, generating reports and predicting risks via graph analysis, statistical scoring, and heuristics.
- Attack Simulation Engine: Simulates attacks like SQL Injection, XSS, and privilege escalation in sandboxed Docker containers, with performance-critical parts in C++.
- Auto-Hardening & Remediation: Automatically fixes vulnerabilities, updates dependencies, hardens containers, and adjusts Kubernetes manifests with rollback capabilities.
- Cyberpunk Dashboard: Interactive web dashboard with animated maps, heatmaps, and real-time metrics, styled in a neon purple hacker theme.
- Self-Learning Module: Uses offline ML (scikit-learn) to learn from scan data and improve risk predictions over time.
- CI/CD Pipeline: GitHub Actions workflow for automated builds, scans, and remediation.
- Infrastructure as Code: Terraform configurations for secure, cloud-agnostic deployments.
+-------------------+ +-------------------+ +-------------------+
| Vulnerable App | | Scanner & | | Attack Simulator |
| (OWASP Juice | | Risk Analyzer | | (Python + C++) |
| Shop + Theme) | | (SAST/SCA/Trivy/ | | |
| | | tfsec) | | |
+-------------------+ +-------------------+ +-------------------+
| | |
| | |
v v v
+-------------------+ +-------------------+ +-------------------+
| Auto-Hardening & | | Cyberpunk | | Self-Learning |
| Remediation | | Dashboard | | Module (Offline |
| (Scripts for | | (Flask + React/ | | ML: scikit-learn) |
| fixes & rollback)| | Three.js) | | |
+-------------------+ +-------------------+ +-------------------+
| | |
| | |
v v v
+-------------------+ +-------------------+ +-------------------+
| CI/CD Pipeline | | Infrastructure as | | Data Storage |
| (GitHub Actions) | | Code (Terraform) | | (Logs, Reports, |
| | | | | ML Models) |
+-------------------+ +-------------------+ +-------------------+
- Programming Languages: Python (for backend, ML, scripting), C++ (for performance-critical simulations).
- Libraries: NumPy, Pandas, Scikit-learn (offline ML), NetworkX (graph analysis).
- Tools: Docker (containerization), Kubernetes (orchestration), Terraform (IaC), GitHub Actions (CI/CD).
- Security Scanners: Semgrep (SAST), OWASP Dependency-Check (SCA), Trivy (containers), tfsec (IaC).
- Frontend: Flask/FastAPI (backend), React/Three.js (interactive dashboard).
- Offline ML: Decision trees, clustering, anomaly detection using local models stored in pickle files or SQLite DB.
(Placeholder: Screenshots will be added after dashboard implementation)
- Animated attack simulation map with neon purple visuals.
- Real-time risk heatmaps for containers and services.
- Terminal-style panels displaying security metrics and logs.
-
Prerequisites:
- Docker installed and running.
- Git for cloning repositories.
- Python 3.8+ with pip.
- Node.js for frontend (if using React).
- CLI tools: semgrep, dependency-check, trivy, tfsec (install via package managers or binaries).
-
Clone the Repository:
git clone https://github.com/aaitplus/QuantumGuard.git cd QuantumGuard -
Deploy Vulnerable App:
- Run
app/clone.shto download OWASP Juice Shop. - Run
app/apply-theme.shto inject the cyberpunk theme. - Build and run with Docker:
docker build -t quantumguard-app ./docker && docker run -p 3000:3000 quantumguard-app
- Run
-
Run Security Scans:
- Execute scanner scripts in
scanner/directory. - Example:
python scanner/sast_scan.pyfor SAST using Semgrep.
- Execute scanner scripts in
-
Launch Dashboard:
- Navigate to
dashboard/and runpython app.py(Flask backend). - Open browser to
http://localhost:5000for the cyberpunk dashboard.
- Navigate to
-
CI/CD:
- Push to GitHub to trigger
.github/workflows/ci-cd.yml. - Use
actfor local testing:act -j build-and-scan.
- Push to GitHub to trigger
-
SAST (Static Application Security Testing):
- Use Semgrep:
semgrep --config auto --output reports/sast-report.json app/
- Use Semgrep:
-
SCA (Software Composition Analysis):
- OWASP Dependency-Check:
dependency-check --scan app/ --format JSON --out reports/sca-report.json
- OWASP Dependency-Check:
-
Container Scanning:
- Trivy:
trivy image --format json --output reports/container-report.json quantumguard-app
- Trivy:
-
IaC Scanning:
- tfsec:
tfsec --format json terraform/ > reports/iac-report.json
- tfsec:
Reports are stored in reports/ folder. Risk analysis scripts in scanner/ process these for predictions.
This system predicts and auto-hardens vulnerable environments without any external AI, fully offline. By simulating real-world cyber threats and autonomously adapting defenses, QuantumGuard empowers users with a sense of control and foresight in an increasingly digital world, fostering a proactive security mindset.
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please read the contributing guidelines and submit pull requests.
Mind-blowing Complexity: Demonstrates mastery of multiple layers — code, container, orchestration, IaC, predictive intelligence.
Offline Autonomy: Shows you can engineer AI-free, fully offline intelligence — a rare skill.
Cyberpunk Dashboard: Impresses recruiters visually and technically.
Self-Learning Module: Gives an impression that the system “thinks” and adapts — recruiters feel you’re at the top of DevSecOps hierarchy.
Complete Professional Structure: CI/CD, IaC, scanning, attack simulation, and remediation — all in one project.
For questions or support, contact alishanjng@gmail.com.
I build security-first systems that automate detection, simulation, and remediation across the SDLC.