A Comprehensive Cybersecurity Multi-Tool Suite
Built by HasbeeJay & RaheemFX
CS Students at Air University, Islamabad
Semester Project for Information Security Course
LinkedIn Post: https://www.linkedin.com/posts/hasbeejay_cybersecurity-informationsecurity-webdevelopment-activity-7415360283121979392-Umoy?utm_source=social_share_send&utm_medium=member_desktop_web&rcm=ACoAAFPfHccBqn2DpjZmmSltyFr-YXTZa2hcEfQ
The CyberSec Toolkit is a comprehensive web-based cybersecurity utility suite designed to provide multiple security assessment tools in one cohesive interface. Built as a semester project for our Information Security course, this toolkit combines three essential cybersecurity tools with a unified hacker-themed interface.
- Hasbee Jay - Lead Developer & Security Analyst
- RaheemFX - UI/UX Designer & Backend Engineer
- Course: Information Security
- University: Air University, Islamabad
- Supervisor: Department of Computer Science Faculty
- Advanced URL Analysis: Detects phishing attempts using heuristic analysis
- Character Obfuscation Detection: Identifies l33tsp34k, symbol replacements, and homograph attacks
- Brand Impersonation Detection: Recognizes typosquatting and brand mimicry
- Multi-Source Verification: Checks against Google Safe Browsing and PhishTank
- Risk Scoring System: 0-100 risk assessment with detailed breakdown
- Real-time Analysis: Instant results with actionable recommendations
- Passive Security Scanning: Non-intrusive security assessment
- SSL/TLS Analysis: Checks certificate validity and security grade
- Security Headers Check: Identifies missing security headers
- DNS Information: Retrieves DNS records and server information
- Common Port Scanning: Simulated port scanning for educational purposes
- Detailed Reports: Comprehensive vulnerability assessment with severity ratings
- Geolocation Mapping: Visual IP location on interactive maps
- Network Intelligence: ISP, ASN, and network information
- Threat Intelligence: Basic threat level assessment
- Interactive Maps: Leaflet.js integration with satellite view
- History Tracking: Persistent scan history with export capabilities
- Quick Lookup Tools: Pre-configured queries for common services
- HTML5 - Semantic markup
- CSS3 - Custom hacker theme with animations
- JavaScript (ES6+) - Vanilla JavaScript, no frameworks
- Leaflet.js - Interactive mapping
- Font Awesome - Icon library
- Google Fonts - Orbitron & Share Tech Mono fonts
- ipapi.co - IP geolocation
- Google Safe Browsing - Phishing detection
- urlscan.io - URL reputation checking
- OpenStreetMap - Map tiles
- Multiple Public APIs - Various security and geolocation services
- Progressive Web App - Works offline, installable
- Local Storage - Persistent history and preferences
- Responsive Design - Mobile-first approach
- Modular JavaScript - Clean, maintainable code structure
- Navigate to "Phishing Detector" from the dashboard
- Enter a URL to analyze (e.g.,
https://example.com) - Select analysis options (heuristic, reputation, SSL)
- Click "ANALYZE URL" to scan
- Review the risk score and detailed findings
- Check recommendations for next steps
- Navigate to "Vulnerability Scanner"
- Enter target domain or URL
- Select scan options (SSL, headers, ports, DNS)
- Click "START SCAN"
- Monitor real-time progress
- Review comprehensive security report
- Export findings if needed
- Navigate to "IP Tracker"
- Enter an IP address or use "MY IP" for your current IP
- Select lookup options (geolocation, ISP, threat intel, map)
- Click "TRACK IP"
- View interactive map and detailed information
- Use quick lookup buttons for common IPs
- Export data as JSON
- No Data Storage: We don't store scan results on our servers
- Local Storage: All history is stored locally in your browser
- Anonymous Usage: No registration or personal data required
- Transparent Processing: Clear indication of external API usage
- Educational Purpose: Designed for learning and authorized testing
- No Harmful Scanning: All tools are passive and non-intrusive
- Respect Privacy: Tools include privacy notices and warnings
- Compliance: Follows ethical hacking guidelines and best practices
- Public APIs: Uses free-tier public APIs where possible
- Rate Limiting: Implements rate limiting to respect API providers
- Fallback Mechanisms: Graceful degradation when APIs are unavailable
- CORS Handling: Proper cross-origin request management
- Matrix Background: Animated falling code effect
- Glitch Text: Authentic hacker-style typography
- Terminal Interface: Command-line inspired design
- Scan Line: CRT monitor scan line effect
- Neon Colors: Cyberpunk color scheme with glowing elements
- Real-time Updates: Live progress indicators
- Animated Transitions: Smooth CSS animations
- Responsive Design: Works on all device sizes
- Keyboard Navigation: Full keyboard support
- Visual Feedback: Clear status indicators and alerts
- True Positives: facebook.com β SAFE (0-20 risk)
- True Positives: f@cebook.com β PHISHING (95+ risk)
- True Positives: facebo0k.com β PHISHING (80+ risk)
- True Positives: secure-paypal.xyz β PHISHING (80+ risk)
- Google DNS: 8.8.8.8 β Mountain View, California
- Cloudflare: 1.1.1.1 β Multiple locations
- Local IP: 192.168.1.1 β Private network detection
- SSL Check: Valid certificates identified correctly
- Header Analysis: Missing security headers detected
- DNS Validation: Proper DNS record retrieval
- Free for Students: Can be used for academic projects
- Attribution Required: Credit original authors
- Non-commercial: Free for educational use
- Contact Authors: For commercial licensing
- Modifications: Allowed with attribution
- Distribution: Must include original license
-
Hasbee Jay - GitHub
- Lead Developer
- Security Algorithm Design
- Backend Integration
-
RaheemFX
- UI/UX Design
- Frontend Development
- Documentation
Try it online: https://hasbeejay.github.io/cybersec-toolkit
Note: Some features may require active internet connection for API calls.
IMPORTANT: This tool is for EDUCATIONAL PURPOSES ONLY.
- Authorized Use Only: Only test systems you own or have permission to test
- No Illegal Activity: Do not use for unauthorized access or attacks
- Compliance: Follow all applicable laws and regulations
- No Warranty: Provided "as is" without any guarantees
- Responsibility: Users are responsible for their actions
- Use for learning and authorized security assessments
- Respect others' privacy and security
- Report vulnerabilities responsibly
- Promote ethical hacking practices
If you find this project useful, please consider:
- Starring the GitHub repository
- Sharing with fellow students
- Contributing to the codebase
- Providing feedback and suggestions
Together, we can make the internet safer! π