Windows Defensive Research Platform

Investigate behavior,
trace signals,
drive response.

ShadowLab is an API-first cybersecurity platform for threat hunting, process intelligence, YARA inspection, persistence analysis, timeline review, quarantine control, and operator-driven response.

  • FastAPI API-first backend
  • PySide6 Native desktop shell
  • Threat Intel VT, MalwareBazaar, AbuseIPDB

Live operator surface

Overview & hunt controls

API status: online
Primary Controls
Advanced Hunt
Overview Processes Threat Intel Network Timeline

Threat intel

Hash reputation

  • MalwareBazaar lookup
  • Process hash auto-fill
  • Verdict history

Response layer

Quarantine & timeline

  • Incident updates
  • Artifact tracking
  • Kill-tree and remediation
Architecture FastAPI backend + PySide6 desktop client
Focus Threat hunting, triage, incident response
Use case Owned, isolated, lab-only defensive environments

A product surface built around the analyst workflow, not just a dashboard.

01

Process Intelligence

Inspect process metadata, command-line behavior, SHA-256, signature state, internals, strings, YARA hits, and sandbox traces from one operator surface.

02

Threat Intel Enrichment

Run hash and IP lookups with external intelligence sources and keep verdict history inside the workflow rather than jumping across tools.

03

Persistence & Deception

Review persistence points, trigger remediation, deploy honeypots, manage canaries, and capture evidence artifacts during high-signal events.

04

Timeline, Incidents, Quarantine

Move from a raw detection to response with timeline context, incident status, ownership, quarantine actions, and exportable artifacts.

From detection signal to response action.

01

Detect

Telemetry, process scans, YARA, strings, and hunt modules surface suspicious activity.

02

Investigate

Threat intel, process internals, network context, and memory workflow deepen the signal.

03

Triage

Incidents, severity, ownership, and timeline context support fast analyst decision-making.

04

Respond

Quarantine, kill-tree, persistence remediation, and evidence collection close the loop.

Each view maps to a concrete part of the defensive workflow.

Overview

High-signal operational entry point

Hero controls, telemetry trend, API state, and operator tabs are presented as one tactical surface instead of a fragmented utility interface.

ShadowLab Overview Dashboard Interface

Processes

Deep process analysis without leaving the workspace

Auto triage, memory analysis, internals, strings, YARA, sandbox trace, AI analyst summaries, and response controls stay close to the selected process.

ShadowLab Detailed Process Inspection View

Intel / Response / Hunt

Cross-functional panels for real workflows

Threat intel, network capture, deception, hosts, timeline, history, artifacts, quarantine, and persistence are exposed as first-class operator tools.

Threat IntelLookup history + verdict surface
TimelineBehavioral detection incident feed
NetworkPacket capture + ARP discovery
QuarantineRestore, delete, webhook operations
DeceptionHoneypot, canary, evidence workflows
ArtifactsIncident bundle and report outputs

ShadowLab was rebuilt from a dashboard-centric prototype into an API-first security platform with a native operator experience.

The project now presents a more product-oriented architecture: FastAPI for orchestration and automation, PySide6 for the desktop surface, modular services for telemetry and response, and integrated workflows for incident review, quarantine, persistence, deception, and threat-intel enrichment.

Built by Ulfat Ibadov

Offensive Security Expert

ShadowLab is positioned as a Windows-focused defensive research platform for investigation, threat hunting, and response-oriented workflows. The goal is to present a serious security product direction rather than a simple dashboard demo.

Ulfat Ibadov portrait

See the full walkthrough or inspect the codebase.