Modules
01 / PHISHING SIM
Educational Demo
Awareness Training
Fake Login Lab
Educational demo only. Simulates how phishing pages look — intended to raise awareness, not collect real credentials. No data is stored or transmitted.
A mock login page demonstrating how credential phishing works.
Understanding attack surfaces is the first step to defending against them.
Open Module →
02 / PROFILE
About
Context
About / Dev
Who built this, why it exists, and where things are headed.
Background, links, and the reasoning behind the lab structure.
Open Module →
03 / SECURITY TOOL · FEATURED
Live Tool
Client-Side Only
HIBP K-Anonymity
Zero Data Sent
Password Auditor
PRIVACY MODEL
Your password never leaves the browser
BREACH CHECK
HaveIBeenPwned via k-anonymity SHA-1
FEATURES
Entropy · Patterns · Generator · Score
Strength scoring, entropy calculation, pattern analysis, and breach detection.
Built using the HIBP k-anonymity model — only the first 5 chars of the SHA-1 hash
are sent in a query, your actual password stays local. Open the source to verify.
Open Tool →
Leisure Projects
L1 / VISUAL
Animation
Front-end Play
Rose Day
A creative animation experiment. Pure front-end aesthetics —
testing what can be done with CSS and canvas without a framework.
Open Module →
L2 / REFERENCE · COMING SOON
In Progress
Red Team Notes
Linux for Hackers
Attack-side Linux commands, workflows, and mindset.
Built from hands-on use — not copy-pasted from a cheatsheet.
Coming Soon →
Who
CSE student, 2nd semester. Focused on cybersecurity, Linux internals,
and building things that actually work.
Why this exists
Learning happens faster by building publicly. Everything here is a
work in progress — intentionally. This is a lab, not a portfolio.
Source & Contact
Code is open on GitHub.
Everything here can be inspected, forked, or questioned.
Build v0.3 · Static deploy.