A self-directed cybersecurity project documenting real offensive and defensive security work, executed independently using industry-standard tools and methodologies.
This repository demonstrates hands-on penetration testing, system hardening, failed and successful attack paths, and verifiable evidence — presented in a professional, performance-focused dashboard.
- Type: Independent / Self-Directed Practice
- Duration: 02 July 2025 – 02 September 2025
- Environment: Kali Linux & Windows 11
- Focus Areas: Penetration Testing · Security Hardening · Compliance Auditing
- HTML5, CSS3, Vanilla JavaScript (no frameworks, no backend)
- Optimized animations (keyframes, transitions, IntersectionObserver)
- Netlify-ready static site
- index.html
- assets/css/style.css
- assets/js/app.js
- assets/data/tools.json
- Results Screenshots/ (filenames referenced in UI; not auto-loaded)
This project was conducted independently for educational and portfolio purposes only.
- All offensive security testing was performed exclusively in authorized lab environments (HackTheBox and local test systems).
- Do not target real systems without explicit written permission.
- All commands and screenshots are provided as evidence of lawful lab practice.
- You are solely responsible for how you use this material.
- Evidence is loaded on-demand via a modal to avoid auto-displaying sensitive artifacts.
- Screenshots are grouped by phase (Enumeration, Nmap, Web, Exploitation/LFI, SMB, CIS‑CAT).
- The Tools & Commands Matrix is searchable and filterable (success and failed attempts).
Use any static server. Examples:
- Install the Live Server extension
- Open index.html and click “Go Live”
npx serve .# Python 3
python -m http.server 5500
# then open http://localhost:5500Note: Loading JSON via the file:// protocol is blocked by browsers. A local server or Netlify is required for the Tools Matrix. The app includes a safe JS fallback dataset to preview without a server.
- Build command: (leave empty)
- Publish directory: /
- Drag-and-drop the project folder into Netlify, or connect a Git repo.
Place your real screenshots in Results Screenshots/ — the UI references filenames only and loads on demand:
- TombWatcher.png
- TombWatcher Pwned.png
- CIS CAT Success Report.png
- Screenshots with cmds/… (Enumeration/Nmap/Web/LFI/SMB/CIS‑CAT)
This project is open source under the MIT License (see LICENSE). Free to practice and adapt responsibly. Misuse is your responsibility.