Skip to content

hasbeejay/cybersec-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ CyberSec Toolkit

A Comprehensive Cybersecurity Multi-Tool Suite
Built by HasbeeJay & RaheemFX
CS Students at Air University, Islamabad
Semester Project for Information Security Course LinkedIn Post: https://www.linkedin.com/posts/hasbeejay_cybersecurity-informationsecurity-webdevelopment-activity-7415360283121979392-Umoy?utm_source=social_share_send&utm_medium=member_desktop_web&rcm=ACoAAFPfHccBqn2DpjZmmSltyFr-YXTZa2hcEfQ


🎯 Project Overview

The CyberSec Toolkit is a comprehensive web-based cybersecurity utility suite designed to provide multiple security assessment tools in one cohesive interface. Built as a semester project for our Information Security course, this toolkit combines three essential cybersecurity tools with a unified hacker-themed interface.

πŸ† Project Team

  • Hasbee Jay - Lead Developer & Security Analyst
  • RaheemFX - UI/UX Designer & Backend Engineer
  • Course: Information Security
  • University: Air University, Islamabad
  • Supervisor: Department of Computer Science Faculty

✨ Features

1. πŸ” Phishing Detector

  • Advanced URL Analysis: Detects phishing attempts using heuristic analysis
  • Character Obfuscation Detection: Identifies l33tsp34k, symbol replacements, and homograph attacks
  • Brand Impersonation Detection: Recognizes typosquatting and brand mimicry
  • Multi-Source Verification: Checks against Google Safe Browsing and PhishTank
  • Risk Scoring System: 0-100 risk assessment with detailed breakdown
  • Real-time Analysis: Instant results with actionable recommendations

2. πŸ“‘ Vulnerability Scanner

  • Passive Security Scanning: Non-intrusive security assessment
  • SSL/TLS Analysis: Checks certificate validity and security grade
  • Security Headers Check: Identifies missing security headers
  • DNS Information: Retrieves DNS records and server information
  • Common Port Scanning: Simulated port scanning for educational purposes
  • Detailed Reports: Comprehensive vulnerability assessment with severity ratings

3. πŸ“ IP Tracker

  • Geolocation Mapping: Visual IP location on interactive maps
  • Network Intelligence: ISP, ASN, and network information
  • Threat Intelligence: Basic threat level assessment
  • Interactive Maps: Leaflet.js integration with satellite view
  • History Tracking: Persistent scan history with export capabilities
  • Quick Lookup Tools: Pre-configured queries for common services

πŸš€ Technology Stack

Frontend

  • HTML5 - Semantic markup
  • CSS3 - Custom hacker theme with animations
  • JavaScript (ES6+) - Vanilla JavaScript, no frameworks
  • Leaflet.js - Interactive mapping
  • Font Awesome - Icon library
  • Google Fonts - Orbitron & Share Tech Mono fonts

APIs & Services

  • ipapi.co - IP geolocation
  • Google Safe Browsing - Phishing detection
  • urlscan.io - URL reputation checking
  • OpenStreetMap - Map tiles
  • Multiple Public APIs - Various security and geolocation services

Architecture

  • Progressive Web App - Works offline, installable
  • Local Storage - Persistent history and preferences
  • Responsive Design - Mobile-first approach
  • Modular JavaScript - Clean, maintainable code structure

πŸ› οΈ Usage Guide

Phishing Detector

  1. Navigate to "Phishing Detector" from the dashboard
  2. Enter a URL to analyze (e.g., https://example.com)
  3. Select analysis options (heuristic, reputation, SSL)
  4. Click "ANALYZE URL" to scan
  5. Review the risk score and detailed findings
  6. Check recommendations for next steps

Vulnerability Scanner

  1. Navigate to "Vulnerability Scanner"
  2. Enter target domain or URL
  3. Select scan options (SSL, headers, ports, DNS)
  4. Click "START SCAN"
  5. Monitor real-time progress
  6. Review comprehensive security report
  7. Export findings if needed

IP Tracker

  1. Navigate to "IP Tracker"
  2. Enter an IP address or use "MY IP" for your current IP
  3. Select lookup options (geolocation, ISP, threat intel, map)
  4. Click "TRACK IP"
  5. View interactive map and detailed information
  6. Use quick lookup buttons for common IPs
  7. Export data as JSON

πŸ” Security & Privacy

Data Handling

  • No Data Storage: We don't store scan results on our servers
  • Local Storage: All history is stored locally in your browser
  • Anonymous Usage: No registration or personal data required
  • Transparent Processing: Clear indication of external API usage

Ethical Use

  • Educational Purpose: Designed for learning and authorized testing
  • No Harmful Scanning: All tools are passive and non-intrusive
  • Respect Privacy: Tools include privacy notices and warnings
  • Compliance: Follows ethical hacking guidelines and best practices

API Usage

  • Public APIs: Uses free-tier public APIs where possible
  • Rate Limiting: Implements rate limiting to respect API providers
  • Fallback Mechanisms: Graceful degradation when APIs are unavailable
  • CORS Handling: Proper cross-origin request management

🎨 UI/UX Features

Hacker Theme

  • Matrix Background: Animated falling code effect
  • Glitch Text: Authentic hacker-style typography
  • Terminal Interface: Command-line inspired design
  • Scan Line: CRT monitor scan line effect
  • Neon Colors: Cyberpunk color scheme with glowing elements

Interactive Elements

  • Real-time Updates: Live progress indicators
  • Animated Transitions: Smooth CSS animations
  • Responsive Design: Works on all device sizes
  • Keyboard Navigation: Full keyboard support
  • Visual Feedback: Clear status indicators and alerts

πŸ§ͺ Testing & Validation

Phishing Detection Accuracy

  • True Positives: facebook.com β†’ SAFE (0-20 risk)
  • True Positives: f@cebook.com β†’ PHISHING (95+ risk)
  • True Positives: facebo0k.com β†’ PHISHING (80+ risk)
  • True Positives: secure-paypal.xyz β†’ PHISHING (80+ risk)

IP Tracking Precision

  • Google DNS: 8.8.8.8 β†’ Mountain View, California
  • Cloudflare: 1.1.1.1 β†’ Multiple locations
  • Local IP: 192.168.1.1 β†’ Private network detection

Vulnerability Scanning

  • SSL Check: Valid certificates identified correctly
  • Header Analysis: Missing security headers detected
  • DNS Validation: Proper DNS record retrieval

Academic Use

  • Free for Students: Can be used for academic projects
  • Attribution Required: Credit original authors
  • Non-commercial: Free for educational use

Commercial Use

  • Contact Authors: For commercial licensing
  • Modifications: Allowed with attribution
  • Distribution: Must include original license

πŸ‘¨β€πŸ’» Authors & Credits

Core Team

  • Hasbee Jay - GitHub

    • Lead Developer
    • Security Algorithm Design
    • Backend Integration
  • RaheemFX

    • UI/UX Design
    • Frontend Development
    • Documentation

🌐 Live Demo

Try it online: https://hasbeejay.github.io/cybersec-toolkit

Note: Some features may require active internet connection for API calls.


🚨 Disclaimer

IMPORTANT: This tool is for EDUCATIONAL PURPOSES ONLY.

Legal Notice

  1. Authorized Use Only: Only test systems you own or have permission to test
  2. No Illegal Activity: Do not use for unauthorized access or attacks
  3. Compliance: Follow all applicable laws and regulations
  4. No Warranty: Provided "as is" without any guarantees
  5. Responsibility: Users are responsible for their actions

Ethical Guidelines

  • Use for learning and authorized security assessments
  • Respect others' privacy and security
  • Report vulnerabilities responsibly
  • Promote ethical hacking practices

⭐ Support Our Project

If you find this project useful, please consider:

  1. Starring the GitHub repository
  2. Sharing with fellow students
  3. Contributing to the codebase
  4. Providing feedback and suggestions

Together, we can make the internet safer! πŸ”

About

The CyberSec Toolkit is a comprehensive, web-based cybersecurity utility suite developed as a semester project for the Information Security course. The application consolidates three essential security tools into a single, intuitive, hacker-themed interface, enabling users to perform practical and ethical cybersecurity assessments.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors