Cybersecurity tools

๐Ÿ”ฐ Overview

This web app is a collection of 8 beginner-friendly cybersecurity tools built with only HTML, CSS, and JavaScript, designed to simulate real-world cybersecurity concepts and practices in a user-friendly interface. It’s ideal for students, educators, and enthusiasts looking to understand security principles through interactive mini-projects.

 


๐Ÿ› ๏ธ Tools Used

  • HTML5 – structure and content
     
  • CSS3 – styling and layout
     
  • JavaScript (ES6) – functionality and interactivity
     

 


๐Ÿงฉ Project List and Cybersecurity Relevance

1. ๐Ÿ” Password Strength Checker

๐Ÿ“Œ Purpose: Teach users how password complexity affects security.

๐Ÿง  Cybersecurity Concept: Weak passwords are easy to guess or crack. Strong passwords reduce brute-force attack success rates.

โœ… How it works:

  • Checks length (8+ characters), uppercase letters, numbers, and symbols.
     
  • Gives a strength rating based on these factors.
     

๐Ÿ“„ Code Highlights:

 

if (val.length >= 8) score++;

if (/[A-Z]/.test(val)) score++;

if (/[0-9]/.test(val)) score++;

if (/[^A-Za-z0-9]/.test(val)) score++;

 

 


2. ๐Ÿ›ก๏ธ Phishing Email Detector

๐Ÿ“Œ Purpose: Help identify common phishing keywords and suspicious URLs.

๐Ÿง  Cybersecurity Concept: Phishing is a major attack vector where attackers trick users into revealing sensitive info.

โœ… How it works:

  • Analyzes user-pasted email content.
     
  • Flags words like "urgent", "verify account", or links (http://...) as suspicious.
     

๐Ÿ“„ Code Highlights:

 

const suspicious = ["urgent", "click here", "login now", "verify account"];

if (found.length > 0 || hasLink) // show phishing warning

 

 


3. ๐Ÿ”’ File Encryption Tool (XOR)

๐Ÿ“Œ Purpose: Demonstrate simple encryption logic using XOR.

๐Ÿง  Cybersecurity Concept: Encryption protects data confidentiality. XOR encryption is a basic example of symmetric key encryption.

โœ… How it works:

  • User inputs text and a numeric key.
     
  • Each character is XORed with the key.
     
  • Encrypted output is shown in Base64.
     

๐Ÿ“„ Code Highlights:

 

result += String.fromCharCode(text.charCodeAt(i) ^ key);

btoa(result) // convert to Base64

 

 


4. ๐ŸŒ Firewall Rule Simulator

๐Ÿ“Œ Purpose: Simulate basic firewall rule logic.

๐Ÿง  Cybersecurity Concept: Firewalls block or allow network traffic based on IP rules to protect internal systems.

โœ… How it works:

  • User inputs an IP address.
     
  • Checks against a hardcoded list of blocked IPs.
     
  • Displays if the IP is allowed or blocked.
     

๐Ÿ“„ Code Highlights:

 

const blockedIPs = ["192.168.1.1", "10.0.0.5"];

if (blockedIPs.includes(ip)) // blocked

 

 


5. ๐Ÿ“Š Packet Sniffer (Simulated)

๐Ÿ“Œ Purpose: Emulate packet capture output for educational purposes.

๐Ÿง  Cybersecurity Concept: Packet sniffing monitors data flow across networks. Used by attackers or defenders for analysis.

โœ… How it works:

  • Generates sample network packets (e.g., DNS, HTTP requests).
     
  • Displays them in real time like a sniffer log.
     

๐Ÿ“„ Code Highlights:

 

const packets = [

  "192.168.1.10 → 172.217.0.142 [HTTP] GET /index.html",

  "192.168.1.10 → 8.8.8.8 [DNS] Query A google.com"

];

 

 


6. ๐Ÿง  Keylogger Demo

๐Ÿ“Œ Purpose: Simulate how keyloggers capture input.

๐Ÿง  Cybersecurity Concept: Keyloggers are malware that record keystrokes, often used for credential theft.

โœ… How it works:

  • Every keystroke in the input field is logged and displayed.
     
  • Raises awareness about malicious monitoring of user input.
     

๐Ÿ“„ Code Highlights:

 

logger?.addEventListener('keydown', (e) => {

  logged.innerText += e.key + " ";

});

 

 


7. ๐Ÿ–ผ๏ธ Steganography (Simulated)

๐Ÿ“Œ Purpose: Introduce the concept of hiding messages inside files/images.

๐Ÿง  Cybersecurity Concept: Steganography is the technique of hiding data in plain sight, e.g., embedding in images.

โœ… How it works:

  • User types a secret message.
     
  • Message is Base64 encoded and simulated as embedded in an image.
     

๐Ÿ“„ Code Highlights:

 

const data = btoa(msg); // Base64 simulates hiding

img.alt = msg; // simulated storage in image metadata

 

 


8. ๐Ÿ“ฑ 2FA TOTP Simulator

๐Ÿ“Œ Purpose: Mimic Time-based One-Time Passwords (TOTP).

๐Ÿง  Cybersecurity Concept: TOTP is used in 2-Factor Authentication to add a layer of security.

โœ… How it works:

  • Generates a pseudo-random 6-digit code every 30 seconds.
     
  • Simulates time-based nature of real TOTP (like Google Authenticator).
     

๐Ÿ“„ Code Highlights:

const time = Math.floor(Date.now() / 30000);

const code = ("000000" + (time % 1000000)).slice(-6);

 

 


๐ŸŽจ UI Design Principles Applied

Feature

Description

Dark Mode

Modern look, reduces eye strain

Card Layout

Separates functionality for clarity

Responsive Grid

Adapts to mobile, tablet, and desktop

Visual Feedback

Colors and effects on input, hover, and output

Live Preview

Results update instantly after actions

 


๐Ÿงช How to Use / Run

  1. Copy the HTML code into a file named index.html.
     
  2. Open the file in a browser (Chrome, Firefox, etc.).
     
  3. Test each tool in the cards.
     
  4. Optionally, host it on GitHub Pages or Netlify for online access.
     

 


๐Ÿ’ก Learning Outcomes

By completing and using this app, learners will understand:

  • The basics of password security
     
  • Phishing red flags in emails
     
  • Symmetric encryption logic
     
  • Simple network rule enforcement
     
  • Packet structure and sniffing concepts
     
  • Dangers of keylogging
     
  • Basics of steganography
     
  • How 2FA/TOTP enhances account security
     

 


๐Ÿงฏ Disclaimer

These tools are for educational and demonstration purposes only. They simulate concepts to help users understand and practice cybersecurity fundamentals in a safe environment.


Github URL: https://github.com/brahmaputraS/cyber-security-projects.git

Demo Link: https://reactsamples-f5783.web.app/