AbdulNafaySarmad1/STAS-Security-Timeline-Security-Suite-

GitHub: AbdulNafaySarmad1/STAS-Security-Timeline-Security-Suite-

结合 C++ 高性能引擎与 PyQt6 现代界面的混合恶意软件分析平台,支持静态特征提取、动态行为追踪、时间线重建和风险评分。

Stars: 0 | Forks: 0

# 安全时间线分析套件 (STAS) [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT) [![C++17](https://img.shields.io/badge/C++-17-blue.svg)](https://en.cppreference.com/w/cpp/17) [![Python 3.10+](https://img.shields.io/badge/Python-3.10+-green.svg)](https://www.python.org/downloads/) **一个混合静态 + 动态 + 行为的恶意软件分析平台**,具备自动时间线重建、风险评分、图表生成以及美观的暗色模式仪表盘。 STAS 结合了高性能 C++ 分析引擎与现代 PyQt6 Python GUI,旨在提供功能强大、本地化、开源的恶意软件分析工具。 ## 功能特性 ### 核心引擎 (C++) - **静态分析** - MD5, SHA1, SHA256 哈希计算 - 熵值计算(加壳/加密检测) - PE 头解析(导入表、导出表、节区、TLS 回调) - 字符串提取 - 加壳检测(UPX, ASPack 等) - YARA 规则扫描(自定义 + 社区规则) - **动态时间线(模拟 / 可扩展)** - 进程、文件、注册表、网络事件 - 带时间戳并排序 - 持久化检测(Run 键值、服务等) - **SQLite 事件存储** - 完整时间线可导出为 JSON/HTML - **风险评分引擎** - 基于规则 + 机器学习就绪的评分(0–100) - 分类:隐蔽性、持久化、传播、数据窃取 ### 仪表盘 (Python + PyQt6) - 暗色模式 Fluent UI - 实时事件流(实时更新) - 时间线可视化 - 带颜色编码的风险评分面板 - 静态分析摘要 - 按类型/严重程度过滤事件 - 导出报告(JSON, HTML, Markdown) - 内置 SQLite 浏览器 ## 截图 ![STAS 仪表盘](P1 ) ## 快速开始 ### 前置条件 - Windows 10/11 (64-bit) - Visual Studio 2022(社区版即可)及 C++ 桌面开发组件 - Python 3.10+ - Git ### 构建与运行 1. 克隆仓库 ``` git clone https://github.com/AbdulNafaySarmad1/STAS-Security-Timeline-Security-Suite- cd STAS Build the C++ engine Bash# Open "x64 Native Tools Command Prompt for VS 2022" mkdir build && cd build cmake .. -DCMAKE_TOOLCHAIN_FILE=C:/vcpkg/scripts/buildsystems/vcpkg.cmake -G "Visual Studio 17 2022" -A x64 cmake --build . --config Release Install Python dependencies & run dashboard Bashcd ../src/python pip install pyqt6 pyinstaller graphviz pandas sqlite3 python dashboard.py Analyze a sample Bashcd ../../build/Release stas_engine.exe ../../../test_sample.exe Switch back to dashboard — events appear live! Standalone Executables (Optional) Bash# Engine is already built as stas_engine.exe # Dashboard 独立版 cd ../src/python pyinstaller --onefile --windowed --name STAS_Dashboard dashboard.py # → dist/STAS_Dashboard.exe Project Structure textSTAS/ ├── build/ # CMake build output ├── src/ │ ├── cpp/ # Core engine (static, dynamic, SQLite, scoring) │ └── python/ # PyQt6 dashboard + anomaly detection ├── data/ # ML baseline, YARA rules ├── events.db # Generated analysis database ├── dummy_test.exe # Example test file └── README.md Future Roadmap (Bonus Features Ready to Add) Real API hooking via MinHook GraphViz process/file/network graphs scikit-learn anomaly detection (clustering/families) LLM-powered behavioral narration Full sandbox with suspended process + remote thread injection Memory dump + string extraction REST API server mode Contributing Pull requests are welcome! Especially: Real dynamic hooking modules YARA rule contributions UI enhancements ML model improvements License MIT License — feel free to use, modify, and distribute. STAS — Because your malware deserves a timeline. Built with 🔥 by Abdul Nafay Sarmad — December 2025 ```
标签:AMSI绕过, Bash脚本, C++17, DAST, DInvoke, HTTP头分析, PE文件解析, PyQt6, Python, SQLite, YARA, 云安全监控, 云资产可视化, 互联网扫描, 加壳检测, 可视化仪表盘, 威胁检测, 开源, 恶意软件分析, 无后门, 混合分析, 熵值计算, 网络安全, 逆向工具, 隐私保护, 静态分析, 风险评分