An Interactive Visualization of Core Cybersecurity Concepts
InfoSec Learning Hub is a comprehensive, single-page web application designed to bridge the gap between abstract cybersecurity theory and practical application.
In traditional education, concepts like TCP/IP Handshakes, Encryption Algorithms, or Malware Propagation are often taught through static diagrams. This project replaces those static images with interactive, gamified simulations.
The platform offers a dual-layer learning experience:
- The Visual Layer: Users interact with graphical elements (e.g., spinning cipher wheels, exploding file systems) to see the "cause and effect" of security events.
- The Logic Layer: Real-time Python code snippets are displayed alongside the visuals, explaining the backend logic (loops, socket connections, bitwise operations) driving the animation.
This module visualizes Substitution Ciphers, specifically the Caesar Cipher, which is the foundation of understanding encryption keys.
- Visuals: Features an interactive "Shift Wheel" where users can rotate the alphabet ring to see how Plaintext maps to Ciphertext.
- Logic: Demonstrates the mathematical formula
(x + n) % 26, showing how ASCII values are shifted and wrapped around the alphabet. - Key Takeaway: Understanding how keys transform data and the vulnerability of simple substitution methods.
A complete simulation of the Client-Server-Database lifecycle, demystifying how the internet works "under the hood."
- Visuals: Animated packets travel across a digital wire, changing state as they move from the Client to the Web Server, trigger an internal SQL Query to the Database, and return a JSON response.
- Logic: Displays Python Socket Programming concepts, explaining how
socket.send()andsocket.recv()handle reliable data delivery. - Key Takeaway: Visualizing the Multi-Tier Architecture and the reliability mechanisms of the TCP protocol.
A gamified demonstration of how malware infects a system and the specific mechanics of a Logic Bomb.
- Visuals: A grid-based file system where a "Bomb" is planted. A countdown timer triggers a recursive infection algorithm that corrupts files (turns them red) spreading rapidly across the grid. Ends with a "System Failure" glitch effect.
- Logic: Explains the code behind dormant triggers (time-based execution) and recursive propagation loops used in real-world malware.
- Key Takeaway: Understanding the difference between passive files and self-replicating executable malicious code.
Demystifies the art of "Security by Obscurity" by showing how data is hidden inside media files without encryption.
- Visuals: An automated "decoder" animation that peels back the layers of a cover image (a sunset) to reveal the hidden "noise" layer, and finally, the secret payload.
- Logic: detailed explanation of Least Significant Bit (LSB) manipulation, showing how binary data can be altered imperceptibly to the human eye.
- Key Takeaway: Understanding that hidden data is not the same as encrypted data.
This project utilizes a modern component-based architecture to ensure smooth performance and advanced animations.
- Frontend Framework: React.js (v18+) - Handles the complex state management for the interactive simulations.
- Styling Engine: Tailwind CSS - Used to create the responsive, dark-mode "Cyberpunk" aesthetic and handle CSS keyframe animations.
- Iconography: Lucide React - Provides the consistent, vector-based security icons.
- Build Tool: Vite - Ensures fast development and optimized production builds.
Follow these steps to run the project locally on your machine.
- Node.js (v14 or higher)
- npm or yarn
-
Clone the repository
git clone [https://github.com/your-username/infosec-learning-hub.git](https://github.com/your-username/infosec-learning-hub.git)
-
Navigate to the project directory
cd infosec-learning-hub -
Install dependencies
npm install
-
Start the development server
npm run dev
-
Open your browser Navigate to
http://localhost:5173to view the app.
Contributions are welcome! If you have ideas for new modules (e.g., RSA Encryption, SQL Injection, or XSS), please feel free to fork the repository and submit a pull request.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/NewModule) - Commit your Changes (
git commit -m 'Add new RSA module') - Push to the Branch (
git push origin feature/NewModule) - Open a Pull Request
Distributed under the MIT License. See LICENSE for more information.
Built with β€οΈ for the Open Source Security Community.