A log monitoring tool for security analysis, threat detection, and system diagnostics
This project is strictly for educational and authorized cybersecurity research purposes.
⚠️ Warning: Do not deploy this tool on systems you do not own or have explicit permission to monitor. Unauthorized use is illegal and violates ethical hacking principles.
By using Ghost Log Monitor, you agree to employ it only on systems where you have legal authorization.
✅ Real-time log monitoring (supports .log, .txt, and custom formats)
✅ Automated threat detection (SQLi, XSS, brute force, suspicious IPs, etc.)
✅ Custom alert system (GUI popups + optional email/SMTP notifications)
✅ Threshold-based warnings (repeated IPs, error spikes, keyword patterns)
✅ Dark/Light mode GUI (built with customtkinter for modern UI)
✅ Log rotation & archiving (auto-compress old logs with configurable retention)
- Python 3.7+
- Libraries:
(See requirements.txt)
customtkinter>=5.2.1 pillow>=10.1.0
- Clone the repo:
git clone https://github.com/yourusername/ghost-log-monitor.git cd ghost-log-monitor - Install dependencies:
pip install -r requirements.txt
- (Optional) Use the included
ghost-log-monitor.exefor Windows deployments.
Edit config.py to customize:
- Security thresholds (IP/error limits, keywords)
- Email alerts (SMTP server, recipients)
- Log retention (file size/age triggers)
- GUI themes (colors, refresh rate)
python main.pyGUI Controls:
- Browse & select log files
- Start/stop monitoring
- Real-time alert dashboard
- Filter logs by severity/keyword
Educational Use Only:
This tool demonstrates log analysis techniques for defensive cybersecurity.
🚨 Unauthorized monitoring of systems is a crime. Use exclusively on networks/devices you own or have written consent to test.
MIT License - See LICENSE.
👻 Ghost Log Monitor – Because even ghosts leave traces.