AcidLog is a sophisticated real-time security monitoring and visualization tool designed for cybersecurity professionals. It provides an intuitive interface for tracking, analyzing, and responding to security events in real-time.
- Introduction
- Features
- Getting Started
- Quick Start
- Usage Example
- Configuration
- Contributing
- License
- Contact
AcidLog transforms raw security logs into actionable intelligence through real-time visualization, pattern detection, and intelligent alerting. Its modular architecture and extensive customization options make it suitable for SOCs, penetration testers, and security researchers.
- Real-Time Visualization: Live timeline with smooth curves and interactive bubbles
- Multi-View Modes: Timeline, Vertical, and Split views for different analysis needs
- Smart Clustering: Automatic event grouping by severity and time proximity
- Pattern Detection: Customizable rules engine with keyword matching
- Multi-Channel Alerts: Desktop notifications, Discord webhooks, and email alerts
- Asset Management: Custom icons and sounds for different event types
- Performance Optimized: Handles 10,000+ events smoothly with WebGL acceleration
- Offline-First: Works entirely in the browser with local storage
- Modern web browser (Chrome 90+, Firefox 88+, Safari 14+)
- File System Access API support for folder monitoring (Chrome/Edge)
- 2GB+ RAM recommended for large event volumes
# Clone the repository
git clone https://github.com/infinition/acidlog.git
cd acidlog
# Open directly in browser
open index.html
# Or serve with any HTTP server
python -m http.server 8080
# Navigate to http://localhost:8080- Connect a Folder: Click "βοΈ Settings" β "Sources" β "π Connect a Folder"
- Add Log Monitor: Enter log file path and refresh interval
- Configure Rules: Set up detection patterns in "π Detection"
- Watch Events Flow: Return to main view to see real-time visualization
// Example log entry (JSON format)
{
"timestamp": "2024-01-15T10:30:45Z",
"type": "critical",
"message": "Unauthorized access attempt detected",
"source": "/var/log/auth.log",
"priority": 5
}
// Detection rule configuration
{
"keywords": "unauthorized,breach,critical",
"type": "critical",
"priority": 5,
"sound": "alert",
"notify": {
"desktop": true,
"discord": true,
"email": false
}
}AcidLog stores configuration in config/config.json:
- Detection Rules: Pattern matching and alert routing
- Visualization: Animation speed, smoothing, graph height
- Notifications: Webhook URLs, volume, desktop alerts
- Performance: Event limits, update frequency
We welcome contributions in:
- New visualization modes
- Additional log parsers
- Performance optimizations
- UI/UX improvements
2024 - AcidLog is distributed under the MIT License.