Adversary Shield — Setup & Access Guide Prerequisites Download all project files including the dataset CSV files and the Test_inject folder before proceeding. Setup Steps
Signing In Enter your credentials based on your role, then verify your identity using the OTP code sent to your email. RoleUsernamePasswordSOC AnalystsocSoc@12345!Compliance OfficercmpCmp@12345!End UsereuserEuser@12345!
Testing the System Once logged in, use the Live Demo button to automatically generate simulated network traffic and attack events — no manual data injection needed. This allows you to explore all system features, dashboards, alerts, and reports in real time without requiring a live network environment.