SentinelShield is an enterprise-grade Web Application Firewall (WAF) acting as a reverse proxy gateway.
It:
- Intercepts traffic
- Detects threats
- Blocks malicious requests before reaching backend
- Predictive AI engine
- Zero-day detection
- Autonomous rule generation
| Feature | v3.0 | v4.0 🚀 |
|---|---|---|
| Detection | Regex | ML (TF-IDF + Logistic Regression) |
| Evasion | URL decoding | Shannon Entropy detection |
| Bot Defense | Rate limiting | Behavioral fingerprinting |
| Rules | Manual | Auto self-healing |
| False Positives | High | Payload isolation |
| UI | Static | Glassmorphism + Live AI |
| Alerts | Hardcoded | Telegram OAuth |
| Component | Tech |
|---|---|
| Backend | Flask (Python) |
| AI Engine | Scikit-Learn |
| Server | Waitress |
| DB | SQLite3 |
| Frontend | HTML/CSS/JS |
| Threat Intel | MaxMind, AbuseIPDB |
git clone https://github.com/akshatcore/SentinelShield.git
cd SentinelShieldpython -m venv venvWindows:
venv\Scripts\activateMac/Linux:
source venv/bin/activatepip install flask requests pyjwt bcrypt geoip2 reportlab waitress python-dotenv scikit-learn numpyRename:
.env.example → .env
Edit .env:
# WAF ROUTING
REVERSE_PROXY_URL=http://your-backend.com
# SECURITY
SECRET_KEY=your_secret
JWT_SECRET=your_jwt_secret
ADMIN_USER=admin
ADMIN_PASS=strong_password
# OPTIONAL
TELEGRAM_BOT_TOKEN=your_token
ABUSEIPDB_API_KEY=your_api_keystatic/background.jpeg→ UI wallpaperGeoLite2-City.mmdb→ place in root folder
python app.pyAccess dashboard:
http://127.0.0.1:5000/
Experience SentinelShield in action:
🔗 Live Demo: https://sentinelshield-1.onrender.com/
⚡ Fully functional AI-powered WAF dashboard with real-time monitoring, threat detection, and SOC interface.
Akshat Tiwari GitHub: https://github.com/akshatcore
This project is for defensive cybersecurity purposes only.
Do NOT:
- attack systems without permission
- misuse replay/forensics tools



