Browser-based offensive security sandbox. Runs Python 3.11 entirely client-side using WebAssembly (Pyodide).
This project runs directly in the browser as a Progressive Web App (PWA).
- Live Demo: [Insert Your App Link Here]
- Status: Active Development
| Component | Implementation | Notes |
|---|---|---|
| Runtime | Pyodide / Web Workers | Isolates code execution from the main thread |
| Shell | Virtualized Terminal | Simulates Kali Linux environment commands |
| Storage | IndexedDB | Offline persistence for user progress |
| Content | Static Modules | Dual-language (Amharic/English) curriculum |
-
Curriculum
- Python Syntax & Logic
- Network Reconnaissance (Socket programming)
- Exploit Development (Keyloggers, ARP logic)
-
CTF Arena
- Cryptography: XOR, Base64, RSA, Hashing
- Forensics: Log analysis, Hex dumps, Metadata extraction
- Web: SQLi logic, Header manipulation, Cookie tampering
-
IDE
- In-browser code editor
- Real-time syntax highlighting
- Vulnerability scanning simulation
Standard Vite project structure.
# Install dependencies
npm install
# Start local server
npm run dev
# Build for production
npm run build