A comprehensive cybersecurity tools dashboard for security professionals and ethical hackers
π Live Demo β’ π Documentation β’ π Report Bug β’ β¨ Request Feature
Aryasec is a modern, web-based cybersecurity tools dashboard that provides security professionals, penetration testers, and ethical hackers with a comprehensive suite of security testing and analysis tools. Built with cutting-edge web technologies, it offers a user-friendly interface for performing various security assessments, vulnerability testing, and threat intelligence gathering.
- π Privacy-First: All processing happens locally in your browser
- π Performance: Lightning-fast, optimized for speed
- π± Responsive: Works seamlessly across all devices
- π¨ Modern UI: Clean, professional interface with dark theme
- π§ Extensible: Modular architecture for easy customization
- π Comprehensive: Complete security testing toolkit
Gather intelligence and map attack surfaces with Arya's reconnaissance tools
- Arya Subdomain Finder: Discover subdomains and attack surface
- Arya Network Mapper: Visualize network topology and devices
- Arya Port Scanner: Scan for open ports and services
Analyze configurations and security posture with comprehensive assessment tools
- Arya Header Analyzer: Analyze security headers and misconfigurations
- Arya SSL/TLS Analyzer: Test SSL/TLS configuration and certificates
- Arya Hash Analyzer: Calculate and verify file integrity hashes
- Arya CVE Dashboard: Real-time CVE monitoring and alerts
Identify and exploit security weaknesses using advanced testing methodologies
- Arya CORS Tester: Test CORS policies and identify misconfigurations
- Arya SQL Injection Tester: Test for SQL injection vulnerabilities
- Arya XSS Scanner: Scan for Cross-Site Scripting vulnerabilities
Fix vulnerabilities with guided remediation and automated security solutions
- Arya Security Solutions: Remediation guides and security fixes
Stay informed with the latest cybersecurity research and threat intelligence
- Security Intelligence Hub: Latest cybersecurity insights and research
Get Aryasec running locally in just a few minutes!
# Clone the repository
git clone https://github.com/Arya182-ui/Aryasec.git
# Navigate to project directory
cd Aryasec
# Install dependencies
npm install
# Start development server
npm run dev
# Open in browser
open http://localhost:5173Before you begin, ensure you have the following installed:
-
Clone the repository
git clone https://github.com/Arya182-ui/Aryasec.git cd Aryasec -
Install dependencies
# Using npm npm install # Using yarn yarn install
-
Environment setup
# Copy environment template (if applicable) cp .env.example .env.local -
Start development server
npm run dev
-
Open in browser Navigate to
http://localhost:5173to see the application running.
# Build for production
npm run build
# Preview production build
npm run preview
# Serve the built files
npx serve distThe optimized production files will be generated in the dist/ directory.
# Build Docker image
docker build -t aryasec .
# Run container
docker run -p 3000:3000 aryasec- Access the Dashboard: Open your browser and navigate to the running application
- Choose a Tool: Select from the comprehensive suite of security tools
- Configure Settings: Adjust tool parameters according to your testing needs
- Run Analysis: Execute security tests and analyze results
- Export Reports: Download detailed reports for documentation
Subdomain Discovery
- Enter target domain
- Select discovery techniques
- Configure scan intensity
- Review discovered subdomains
- Export results in various formats
Security Header Analysis
- Input target URL
- Initiate header scan
- Review security recommendations
- Generate compliance report
- Implement suggested fixes
Vulnerability Testing
- Define target scope
- Select test categories
- Configure test parameters
- Execute security tests
- Analyze findings and remediation steps
| Category | Technology | Version | Purpose |
|---|---|---|---|
| Framework | React | 18.3.1 | UI Library |
| Language | TypeScript | 5.5.3 | Type Safety |
| Styling | Tailwind CSS | 3.4.1 | Utility-First CSS |
| Build Tool | Vite | 5.4.2 | Fast Development |
| Icons | Lucide React | 0.344.0 | Icon Library |
| HTTP Client | Axios | 1.6.0 | API Requests |
| Linting | ESLint | 9.9.1 | Code Quality |
- π Privacy-First Design: All security analysis runs locally in your browser
- π« Zero Data Collection: No user data is transmitted to external servers
- π Secure Defaults: Built following OWASP security guidelines
- π Educational Focus: Designed for learning and ethical security testing
- β CSP Compliant: Content Security Policy implementation
- π Input Validation: Comprehensive input sanitization
| Header | Purpose | Status |
|---|---|---|
| Content-Security-Policy (CSP) | XSS Protection | β Analyzed |
| Strict-Transport-Security (HSTS) | HTTPS Enforcement | β Analyzed |
| X-Frame-Options | Clickjacking Protection | β Analyzed |
| X-Content-Type-Options | MIME Type Sniffing | β Analyzed |
| X-XSS-Protection | XSS Filter | β Analyzed |
| Referrer-Policy | Referrer Information | β Analyzed |
| Permissions-Policy | Feature Policy | β Analyzed |
- β Origin Validation: Test cross-origin request policies
- β Method Restrictions: Verify allowed HTTP methods
- β Credential Handling: Check credential inclusion policies
- β Preflight Analysis: CORS preflight request validation
- β Wildcard Detection: Identify overly permissive configurations
- π― CVSS Scoring: Comprehensive vulnerability severity analysis
- π Risk Classification: Automated risk level determination
- π’ Vendor Tracking: Vendor-specific vulnerability monitoring
- π Advisory Alerts: Latest security advisory notifications
| User Type | Use Cases | Benefits |
|---|---|---|
| π Security Professionals | Comprehensive security testing toolkit | Streamlined workflow, professional reporting |
| π― Penetration Testers | Quick vulnerability assessment tools | Efficient reconnaissance, detailed analysis |
| π¨βπ» Developers | Security header validation, CORS testing | Secure development practices, compliance checking |
| π Students & Researchers | Educational cybersecurity platform | Hands-on learning, practical experience |
| π Bug Bounty Hunters | Initial reconnaissance and analysis | Fast target assessment, vulnerability discovery |
| π’ Enterprise Teams | Security posture assessment | Risk management, compliance reporting |
- π Pre-Engagement Reconnaissance: Gather intelligence before security assessments
- π‘οΈ Security Audits: Comprehensive security posture evaluation
- π Compliance Testing: Verify adherence to security standards
- π Training & Education: Hands-on cybersecurity learning platform
- π¨ Incident Response: Quick security analysis during investigations
- π Continuous Monitoring: Regular security health checks
We welcome contributions from the cybersecurity community! Here's how you can help:
- Fork the repository
- Create a feature branch:
git checkout -b feature/amazing-feature - Make your changes: Follow our coding standards
- Test thoroughly: Ensure all tests pass
- Commit changes:
git commit -m 'Add amazing feature' - Push to branch:
git push origin feature/amazing-feature - Open a Pull Request: Describe your changes
- Code Quality: Follow TypeScript best practices
- Testing: Add tests for new features
- Documentation: Update docs for any changes
- Security: Follow secure coding practices
- Compatibility: Ensure cross-browser compatibility
Found a bug? Please create an issue with:
- Clear description of the problem
- Steps to reproduce the issue
- Expected vs actual behavior
- Environment details (OS, browser, version)
Have an idea? We'd love to hear it! Open an issue with:
- Detailed description of the feature
- Use case scenarios where it would be helpful
- Mockups or examples if applicable
This project is licensed under the MIT License - see the LICENSE file for details.
- β Commercial Use: Use for commercial projects
- β Modification: Modify and distribute
- β Distribution: Share and redistribute
- β Private Use: Use in private projects
β οΈ Limitation: No liability or warranty- β Condition: Include license and copyright notice
Cybersecurity Enthusiast & Full-Stack Developer
"Building secure digital solutions for a safer cyber world"
- π Cybersecurity Specialist with expertise in penetration testing and vulnerability assessment
- π» Full-Stack Developer proficient in modern web technologies
- π Security Researcher contributing to the cybersecurity community
- π Open Source Advocate passionate about sharing knowledge and tools
- π§ AI Learning Cybersecurity with AI
If you find this project helpful, consider supporting my work:
Your support helps me:
- π§ Maintain and improve existing tools
- β¨ Develop new features and security tools
- π Create educational content for the community
- π Keep projects open source and free for everyone
Built with β€οΈ for the cybersecurity community
Perfect for security professionals, developers, and anyone interested in web application security testing and analysis.
β Star this repository if you find it helpful! It motivates me to create more awesome security tools.