Skip to content

Pushpenderrathore/Venice-firewall

Repository files navigation

🚧 Cyberwall Firewall (Educational & Research Only)


🔧 Requirements

Before building and running Cyberwall, ensure you have the following installed on a Linux host:

  • python3 (3.8+) – Python interpreter
  • pip3 – Python package manager
  • nmap – Network scanning utility
  • systemd – To run Cyberwall as a persistent service
  • git – Version control (for cloning/updating code)

Optional Security Tools:

  • shodan (API key required) – Fetch external vulnerability data
  • scapy – Advanced packet manipulation & intrusion detection

⚠️ Critical Disclaimer

Cyberwall is a student cybersecurity research project designed to simulate a firewall + intrusion detection/prevention system (IDPS).

  • 🚫 Not for production use – Run only in controlled lab or educational environments.
  • ⚖️ Legal note – Unauthorized use on external/public networks may be illegal and violate GitHub policy.
  • 🧪 Purpose – Research, reverse engineering, and academic learning only.

📋 Table of Contents


📌 About Cyberwall

Cyberwall is a Python-based AI-assisted firewall and intrusion detection system.
It integrates tools like Nmap, Shodan API, and packet inspection modules with an AI layer (GitHub Models API / GPT) to analyze detected vulnerabilities and suggest mitigations.

Core Features:

  • Automated port scan detection
  • AI-powered vulnerability classification with CVE mapping
  • Systemd service integration for persistence
  • Supports Linux servers with CAP_NET_RAW and CAP_NET_ADMIN

📁 Repository Structure

. ├── cyberguard.py # Standalone AI assistant (chat-based security Q&A) ├── cyberwall.py # Main firewall daemon (packet inspection + AI analysis) ├── cyberwall.service # Systemd unit file for auto-starting Cyberwall ├── firewall.sh # Shell script for quick firewall rule setup ├── install.sh # Automated installer (dependencies + service setup) ├── license # License file (All Rights Reserved – educational only) ├── README.md # Project documentation (you’re reading it) ├── requirments.txt # Python dependencies list └── test.py # Testing utilities for lab environments


⚙️ Installation & Usage (Lab Only)

1. Install Dependencies

sudo apt update
sudo apt install python3 python3-pip nmap git -y
pip3 install -r requirements.txt

2. Clone the Repository

git clone https://github.com/yourusername/Cyberwall.git
cd Cyberwall

3. Setup Systemd Service

sudo cp cyberwall.service /etc/systemd/system/
sudo systemctl daemon-reload
sudo systemctl enable cyberwall
sudo systemctl start cyberwall

Check logs:

journalctl -u cyberwall -f

4. Testing in Lab

    Setup 2 VMs: one attacker, one defender (Cyberwall).

    Run an Nmap scan from attacker → observe detection & AI classification.

✅ Learning Use Cases

Cyberwall is designed for students and researchers to:

    Study firewall internals (iptables, packet inspection).

    Understand Nmap scanning & vulnerability workflows.

    Practice AI-assisted security analysis.

    Simulate real-world firewall + IDPS systems.

❌ Prohibited Uses

You must not use Cyberwall for:

    Scanning or probing real-world networks without explicit permission.

    Blocking or interfering with external/public IPs.

    Deploying on production servers.

Unauthorized or malicious use is illegal and may result in disciplinary/legal action.
📜 License & Restrictions

All Rights Reserved

Copyright (c) 2025 Pushpender Singh

This software and associated files are the intellectual property of the author.

    ✅ Allowed: Personal, educational, and research use in controlled environments.

    ❌ Not Allowed: Copying, modifying, distributing, sublicensing, or using Cyberwall for commercial or production purposes without prior written permission.

    In simple terms: You can study it, but you cannot reuse or redistribute it without permission.

📚 References

    Nmap Documentation

Shodan API Docs

Linux Capabilities Guide

Systemd Services
👨‍💻 Credits

    Author: Pushpender Singh (B.Tech CSE Student, 1st Year)

    Project: Cyberwall – AI Firewall + IDPS

    Inspired by: Suricata, Snort, pfSense