think_like_attacker β act_like_defender
A Python + JSON + HTML hybrid cybersecurity tool that simulates real-world defensive analysis using a Stoplight Risk Model (RED / YELLOW / GREEN).
Part of the VAXINX Protocolβ’ ecosystem β a reverse-learning engineering system where:
BUILD β TEST β BREAK β UNDERSTAND β IMPROVE β DEPLOY
This project combines:
https://regislara-byte.github.io/vaxinx-stoplight-code/dashboard/
| Platform | Link |
|---|---|
| π§ GitHub | https://github.com/regislara-byte |
| π‘ Live Dashboard | https://regislara-byte.github.io/vaxinx-cert-dashboard/ |
| π Credly | https://www.credly.com/users/regis-lara |
| Feature | Details |
|---|---|
| π€ YARA Rule Engine | Loads all .yar / .yara rules from rules/ |
| π Flask REST API | Live scan API + dashboard serving |
| π‘ SSE Streaming | Real-time file-by-file scan feed |
| π Quarantine Vault | Fernet encrypted .vxlocked files |
| π¨ Dashboard Alignment | Integrated VAXINX dashboard ecosystem |
| π§Ύ Visual Lore Artifacts | AI-readable engineering documentation workflow |
| βοΈ Automation Pipeline | Batch deployment + push workflow system |
| Signal | Decision | Action |
|---|---|---|
| π’ GREEN | Allow | Safe β no threat indicators detected |
| π‘ YELLOW | Inspect | Suspicious β manual review required |
| π΄ RED | Quarantine | High risk β encrypted into .vxlocked vault |
Foundation systems:
Detection upgrades:
Security enhancements:
.vxlocked quarantine vaultOperational upgrades:
Engineering acceleration systems:
VAXINX_SYSTEM = {
"file_scanner": "Python-based threat detection engine",
"stoplight_logic": "RED / YELLOW / GREEN classification",
"yara_engine": "Rule-based pattern matching",
"flask_api": "REST API + SSE live stream",
"vault_engine": "Encrypted quarantine system",
"json_reports": "Structured scan output",
"html_dashboard": "Visual cyber intelligence UI",
"vla_system": "Visual Lore Artifacts workflow",
"automation": "Deployment + push workflow pipeline"
}
Triggered automatically when:
stoplight == RED
Features:
.vxlocked vault storagevaxinx-stoplight-code/
βββ scanner_v3.py
βββ restore_quarantine.py
βββ vaxinx_crypto.py
βββ README.md
β
βββ automation/
β βββ push_all.bat
β βββ push_readme.bat
β βββ push_dashboard.bat
β βββ push_vla.bat
β βββ deploy_dashboard.bat
β βββ launch_scanner.bat
β βββ install_deps_py312.bat
β
βββ dashboard/
β βββ index.html
β βββ Vaxinx_Doppio.gif
β
βββ assets/
β βββ visualloreartifacts/
β βββ 001-python312-install.png
β βββ 002-yara-ok-repl.png
β βββ 003-crypto-dependency-fix.png
β βββ 004-vscode-interpreter-switch.png
β βββ 005-scanner-runtime-validation.png
β
βββ test_lab/
βββ quarantine/
βββ reports/
βββ logs/
βββ rules/
βββ .vault_keys/
This repository follows a:
Visual Lore Artifacts (VLA)
workflow philosophy.
The folder:
assets/visualloreartifacts/
contains timestamped screenshots documenting:
VLA exists to provide:
Instead of only reading code:
README β code β guess architecture
VLA enables:
screenshot β instant context β faster understanding
This creates:
This project uses lightweight .bat automation systems to accelerate deployment and reduce repetitive terminal workflows.
automation/
βββ push_all.bat
βββ push_readme.bat
βββ push_dashboard.bat
βββ push_vla.bat
βββ deploy_dashboard.bat
βββ launch_scanner.bat
βββ install_deps_py312.bat
Automate the friction.
Preserve the thinking.
Coding logic, architecture, and security reasoning remain human-directed.
Automation handles:
Recommended:
Python 3.12 is recommended for:
Core packages:
py -3.12 -m pip install cryptography flask flask-cors
Optional YARA support:
py -3.12 -m pip install yara-python
py -3.12 scanner_v3.py
Default scan target:
test_lab/
Reports generated to:
reports/scan_report.json
py -3.12 scanner_v3.py --serve
Open browser:
http://127.0.0.1:5000
| Method | Endpoint | Description |
|---|---|---|
| GET | / |
Dashboard UI |
| GET | /api/status |
Scanner health |
| GET | /api/report |
Latest scan report |
| GET | /api/rules |
Loaded YARA rules |
| POST | /api/scan |
Trigger scan |
| GET | /api/stream |
Live SSE feed |
Triggered automatically on:
RED classification
Flow:
.vxlockedpy -3.12 restore_quarantine.py
IDS = detect anomalies
IPS = block threats inline
SIEM = correlate logs
DLP = prevent data exfiltration
risk = probability Γ impact
security = prevent β detect β respond β recover
All certifications reflected in the VAXINX dashboard ecosystem.
| Type | Credential |
|---|---|
| π Badge | Introduction to Cybersecurity |
| π Certificate | Introduction to Cybersecurity |
| β Achievement | Resource Specialist |
| β Achievement | Network Defense |
| β Achievement | System Safeguards |
| β Achievement | Threat Analysis |
| β Achievement | Cybersecurity Administration |
Issuer:
Cisco Networking Academy
secret.key
.vault_keys/
Recommended .gitignore:
secret.key
.vault_keys/
quarantine/
logs/
*.pyc
__pycache__/
Use .gitignore aggressively for:
This project:
This repository is intentionally designed as:
The goal is not only to build tools, but to document:
Creator : VAXINX (Regis Lara)
Purpose : Educational / Defensive Cybersecurity
β Free to use for learning
β Not for offensive or malicious use
β Attribution required
"One Seed. 12 Phrase. Immunity."
π‘οΈ VAXINX Protocolβ’ β You donβt just scan files. You understand threats before they happen.