SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

The OWASP SecureTea Project is an application designed to help secure a person’s laptop or computer / server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer / server.

This application uses the touchpad/mouse/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac & Windows).

The software is still under development, and will eventually have it’s own IDS(Intrusion Detection System) / IPS(Intrusion Prevention System), firewall, anti-virus, intelligent log monitoring capabilities with web defacement detection, and support for much more communication medium.

Also Read – Ustealer : Steal Ubuntu Information In Local PC

Target User

It was written to be used by anyone who is interested in IoT Security (Internet of Things) and still needs further development.

How it functions:

  • Keep track of the movement of the mouse/touchpad
  • Detect who accesses your device(laptop/server/other iot device) with mouse/touchpad installed.
  • Send warning messages on Twitter/Twilio-SMS/Slack/Telegram. More features on the way.

Objective

To alert the user via various communication mechanism, whenever The Computer / Server had been accessed by someone / attacker. And also it can be used to monitor your system & SecureTea firewall as Defense.

Installation Procedure

User Guide

See more at User Guide for translated user guides(/doc)

Developer Guide

See more at Developer guide for translated developer guides(/doc)

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

7 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

7 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 week ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago