The Alert Dashboard is a blue team monitoring dashboard that uses a real-time, terminal-based defensive console designed for competition environments. It automatically detects the operating system (Windows or Linux) and loads the correct monitoring modules.
The dashboard provides:
- Live log monitoring
- Process activity monitoring
- File integrity monitoring
- Real-time alerts
- A curses-based TUI (Text User Interface)
This tool is lightweight, fast, and requires no admin privileges.
The Alert Dashboard has features that include:
- OS auto-detection
- Log monitoring
- Process monitoring
- File integrity monitoring
- Real-time alerts
- A clean curses-based UI
- Python Requirements
You must install:
- psutil (All Operating Systems require this)
- curses (Linux/macOS)
- windows-curses (Windows only)
Install psutil:
pip install psutilWindows does NOT include curses by default. Install the Windows-compatible version:
pip install windows-cursesAfter installation, Python can import curses normally.
Most Linux distros already include curses.
If missing:
Debian/Ubuntu:
sudo apt install python3-cursesFedora/RHEL:
sudo dnf install python3-cursesArch:
sudo pacman -S python-cursesBasic usage:
python dashboard.pyOptional arguments:
--log <path> Monitor an additional log file
--watch <dirs> Comma-separated directories to watchExample:
python dashboard.py --log /var/log/auth.log --watch "/etc,/var/www"Windows example:
python dashboard.py --watch "C:\Users\YourName\Downloads,C:\Temp"At startup, the dashboard detects the OS using:
platform.system().lower()This determines which monitoring modules to load:
Windows:
- Process monitor (psutil)
- File monitor (polling)
- Log monitor (only if a log file is provided)
Linux:
- Process monitor (psutil)
- File monitor (polling)
- Log monitor (auth.log, syslog, or custom)
On Linux:
- /var/log/auth.log
- /var/log/syslog
On Windows:
- Only logs you explicitly provide with --log
The monitor highlights suspicious keywords:
- fail
- denied
- unauthorized
- invalid
- error
- login
Tracks:
- New processes
- High CPU usage
- Unusual spikes in activity
Events look like:
NEW PID 5321 - chrome.exe
HIGH CPU 72.5% PID 884 - python.exeWatches directories for:
- New files
- Modified files
- Deleted files
Example events:
NEW FILE: /etc/passwd.bak
MODIFIED: C:\Users\User\Downloads\config.ini
DELETED: /var/www/html/index.php- THE TUI DASHBOARD
The screen is divided into four panels:
- Logs
- Processes
- File Changes
- Alerts
Alerts are automatically generated from:
- Suspicious log entries
- High CPU processes
- File changes
Controls:
- Press 'Q' to quit