Skip to content

Evidence-backed, frontend-only cybersecurity dashboard showcasing independent offensive, defensive, and compliance security work — featuring real attack workflows, failed and successful attempts, and an on-demand tools & commands matrix.

License

Notifications You must be signed in to change notification settings

Mandar123454/CyberSecurity-Journey

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

💀 CyberSecurity Journey — Evidence-Backed Security Portfolio

Stars Forks Issues Last Commit License: MIT

HTML5 CSS3 JavaScript

A self-directed cybersecurity project documenting real offensive and defensive security work, executed independently using industry-standard tools and methodologies.

This repository demonstrates hands-on penetration testing, system hardening, failed and successful attack paths, and verifiable evidence — presented in a professional, performance-focused dashboard.

🧠 Project Overview

  • Type: Independent / Self-Directed Practice
  • Duration: 02 July 2025 – 02 September 2025
  • Environment: Kali Linux & Windows 11
  • Focus Areas: Penetration Testing · Security Hardening · Compliance Auditing

Tech

  • HTML5, CSS3, Vanilla JavaScript (no frameworks, no backend)
  • Optimized animations (keyframes, transitions, IntersectionObserver)
  • Netlify-ready static site

Structure

  • index.html
  • assets/css/style.css
  • assets/js/app.js
  • assets/data/tools.json
  • Results Screenshots/ (filenames referenced in UI; not auto-loaded)

⚠️ Disclaimer (Responsible Use)

This project was conducted independently for educational and portfolio purposes only.

  • All offensive security testing was performed exclusively in authorized lab environments (HackTheBox and local test systems).
  • Do not target real systems without explicit written permission.
  • All commands and screenshots are provided as evidence of lawful lab practice.
  • You are solely responsible for how you use this material.

Open Practice & Proof

  • Evidence is loaded on-demand via a modal to avoid auto-displaying sensitive artifacts.
  • Screenshots are grouped by phase (Enumeration, Nmap, Web, Exploitation/LFI, SMB, CIS‑CAT).
  • The Tools & Commands Matrix is searchable and filterable (success and failed attempts).

Run Locally

Use any static server. Examples:

VS Code Live Server (recommended)

  • Install the Live Server extension
  • Open index.html and click “Go Live”

Node

npx serve .

Python

# Python 3
python -m http.server 5500
# then open http://localhost:5500

Note: Loading JSON via the file:// protocol is blocked by browsers. A local server or Netlify is required for the Tools Matrix. The app includes a safe JS fallback dataset to preview without a server.

Deploy (Netlify)

  • Build command: (leave empty)
  • Publish directory: /
  • Drag-and-drop the project folder into Netlify, or connect a Git repo.

Screenshots (Filenames)

Place your real screenshots in Results Screenshots/ — the UI references filenames only and loads on demand:

  • TombWatcher.png
  • TombWatcher Pwned.png
  • CIS CAT Success Report.png
  • Screenshots with cmds/… (Enumeration/Nmap/Web/LFI/SMB/CIS‑CAT)

License

This project is open source under the MIT License (see LICENSE). Free to practice and adapt responsibly. Misuse is your responsibility.

About

Evidence-backed, frontend-only cybersecurity dashboard showcasing independent offensive, defensive, and compliance security work — featuring real attack workflows, failed and successful attempts, and an on-demand tools & commands matrix.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published