AXIONARK - Real Hacker Skills Tracker š“āā ļø
A gamified progress tracker designed for aspiring hackers who want to master the complete arsenal of offensive security skills. AXIONARK helps you develop real-world hacking abilities from web applications to network pivoting, from USB attacks to zero-day research.
š Overview
AXIONARK is your personal companion for becoming a complete hacker. Track your progress from script kiddie to legendary status with a structured roadmap focused on practical hacking skills that work in CTFs, penetration tests, bug bounties, and real-world scenarios.
Key Features
- šÆ Complete Hacker Roadmap - 135+ tasks across 5 phases covering all attack vectors
- š XP & Level System - Earn experience points and level up as you master skills
- š Encrypted Journal - Document your hacking journey with AES-256-GCM encryption
- š Exploit Tracker - Log vulnerabilities, document techniques, track success
- š° Earnings Dashboard - Monitor bug bounty income and achievements
- š Achievement System - Unlock badges for mastering different hacking domains
- šØ Cyberpunk UI - Dark hacker aesthetic with modern design
- š Zero-Knowledge Architecture - Your hacking notes are encrypted client-side
š”ļø Security & Privacy
- Client-side AES-256-GCM encryption - Your sensitive data is encrypted in your browser
- Zero-knowledge architecture - We can't read your exploit notes or target details
- Firebase Authentication with secure session management
- Rate limiting and input sanitization
- Strict CSP headers for XSS protection
- No tracking - Your hacking journey is yours alone
š ļø Tech Stack
- Frontend: SvelteKit 2.0, TypeScript
- Styling: Tailwind CSS 3.0 with cyberpunk theme
- Backend: Firebase (Auth & Firestore)
- Security: Web Crypto API, DOMPurify
- Analytics: Privacy-respecting Vercel Analytics
- Icons: Heroicons & Custom hacker-themed SVGs
š Prerequisites
- Node.js 18+
- Firebase account (free tier works)
- npm or yarn
- A desire to become a real hacker š„
š¦ Quick Start
1. Clone the Repository
git clone https://github.com/Duardz/axionark.git
cd axionark
npm install
2. Firebase Setup
- Create a project at Firebase Console
- Enable Authentication (Email/Password provider)
- Create Firestore Database in production mode
- Get your config from Project Settings > General
3. Environment Configuration
Create .env
file:
cp .env.example .env
Add your Firebase config:
VITE_FIREBASE_API_KEY=your_api_key
VITE_FIREBASE_AUTH_DOMAIN=your_auth_domain
VITE_FIREBASE_PROJECT_ID=your_project_id
VITE_FIREBASE_STORAGE_BUCKET=your_storage_bucket
VITE_FIREBASE_MESSAGING_SENDER_ID=your_sender_id
VITE_FIREBASE_APP_ID=your_app_id
4. Firestore Security Rules
Replace default rules with these:
rules_version = '2';
service cloud.firestore {
match /databases/{database}/documents {
// Users can only read/write their own data
match /users/{userId} {
allow read, write: if request.auth != null && request.auth.uid == userId;
}
match /journal/{entryId} {
allow read, write: if request.auth != null &&
request.auth.uid == resource.data.uid;
allow create: if request.auth != null &&
request.auth.uid == request.resource.data.uid;
}
match /exploits/{exploitId} {
allow read, write: if request.auth != null &&
request.auth.uid == resource.data.uid;
allow create: if request.auth != null &&
request.auth.uid == request.resource.data.uid;
}
match /usernames/{username} {
allow read: if true;
allow create: if request.auth != null;
allow update, delete: if request.auth != null &&
request.auth.uid == resource.data.uid;
}
}
}
5. Run Development Server
npm run dev
Visit http://localhost:5173
and start your hacking journey!
šÆ Real Hacker Skills Learning Path
AXIONARK features a comprehensive hacking roadmap covering ALL attack vectors:
š± Phase 1: Hacker Foundations (Months 1-6)
- System Fundamentals: Linux/Windows mastery, networking, scripting
- Web Application Hacking: HTTP, Burp Suite, XSS, SQL injection, web shells
- Network Hacking: Nmap, Metasploit, service exploitation, wireless attacks
- System Exploitation: Linux/Windows privilege escalation, reverse shells
- Essential Tools: Reconnaissance, exploitation frameworks, password cracking
- Practice & Mastery: Vulnerable machines, CTFs, first penetration test
š Phase 2: Real Hacker Skills (Months 7-12)
- Advanced Web Attacks: SSRF, XXE, SSTI, deserialization, business logic
- Network Pivoting: SSH tunneling, Chisel, multi-hop attacks, lateral movement
- Active Directory: BloodHound, Kerberos attacks, domain domination, Mimikatz
- Physical Attacks: USB attacks, lock picking, RFID cloning, social engineering
- Evasion Techniques: AV evasion, OPSEC, living off the land, steganography
- Automation: Python exploits, C2 frameworks, custom tool development
š Phase 3: Advanced Hacker (Months 13-24)
- Complex Attack Chains: Web-to-system, phishing-to-domain, multi-stage attacks
- Cloud Security: AWS/Azure/GCP exploitation, Kubernetes, serverless attacks
- Mobile Hacking: Android/iOS exploitation, mobile network attacks, malware
- Advanced Techniques: Binary exploitation, cryptographic attacks, reverse engineering
- Specialized Targets: IoT, industrial systems, automotive, blockchain, AI/ML
- Professional Skills: Red team operations, penetration testing, vulnerability research
š„ Phase 4: Elite Hacker (Years 2-5)
- Zero-Day Research: Browser, OS, hardware vulnerabilities, exploit development
- APT Simulation: Nation-state TTPs, supply chain attacks, advanced persistence
- Cutting-Edge Research: AI security, quantum cryptography, satellite security
- Industry Leadership: Conference speaking, tool creation, academic collaboration
- Mentorship: Training development, community building, knowledge sharing
- Financial Success: Six-figure exploits, million-dollar achievements
š Phase 5: Legendary Hacker (Lifetime Achievement)
- Global Impact: Internet-scale vulnerabilities, security protocol design
- Historical Significance: Paradigm shifts, legendary hacks, cybersecurity revolution
- Immortal Legacy: Hall of fame, educational institutions, billion-user impact
- Ultimate Mastery: Omniscient hacker, cyber defense revolution, god-tier status
š® How It Works
- Create Account - Sign up with email and choose your hacker alias
- Track Progress - Complete tasks from the roadmap to earn XP and level up
- Log Exploits - Record your findings, techniques, and target details
- Journal Journey - Write encrypted notes about your hacking experiences
- Monitor Stats - Watch your level, skills, and achievements grow
- Share Success - Export non-sensitive stats to showcase your skills
š Features in Detail
Complete Hacker Roadmap
- 135+ hacking-specific tasks across all domains
- XP rewards based on skill difficulty and impact
- Progression from script kiddie to legendary hacker
- Covers web, network, system, physical, wireless, and advanced techniques
Exploit Tracking
- Log vulnerability details and exploitation techniques
- Track success rates across different attack vectors
- Monitor earnings from bug bounties and penetration tests
- Categorize by severity, target type, and technique used
- Document payloads, tools, and methodologies
Encrypted Hacking Journal
- Client-side encryption for sensitive notes
- Document targets, techniques, and lessons learned
- Tag system for organizing different attack types
- Search functionality across all entries
- Export capabilities for sharing knowledge
Skills Dashboard
- Real-time XP tracking across all hacking domains
- Level progression with hacker-themed titles
- Achievement showcase for mastered techniques
- Activity timeline showing your hacking evolution
- Statistics on favorite attack vectors and success rates
š“āā ļø Hacking Domains Covered
Web Application Security
- HTTP protocol mastery, Burp Suite, XSS exploitation
- SQL injection, web shells, SSRF, XXE attacks
- Business logic flaws, API security, authentication bypass
Network Penetration
- Network scanning, service exploitation, Metasploit
- Wireless attacks, packet analysis, protocol abuse
- Network pivoting, SSH tunneling, lateral movement
System Exploitation
- Linux/Windows privilege escalation techniques
- Reverse shells, persistence methods, file transfers
- Binary exploitation, kernel attacks, rootkit development
Active Directory Attacks
- Domain enumeration, Kerberos attacks, BloodHound
- Credential dumping, lateral movement, domain domination
- Golden tickets, DCSync, advanced persistence
Physical Security
- USB attacks, lock picking, RFID cloning
- Social engineering, hardware hacking, firmware analysis
- Badge cloning, physical penetration, surveillance evasion
Advanced Techniques
- Zero-day research, exploit development, reverse engineering
- Cryptographic attacks, steganography, covert channels
- Mobile hacking, cloud security, IoT exploitation
š Deployment
Vercel (Recommended)
- Fork this repository
- Import to Vercel
- Add environment variables
- Deploy and start hacking!
Self-Hosting
npm run build
npm run preview
Deploy the build
folder to any static host.
š Project Structure
src/
āāā routes/ # SvelteKit pages
ā āāā +page.svelte # Landing/Auth
ā āāā dashboard/ # Main hacker dashboard
ā āāā roadmap/ # Complete hacking roadmap
ā āāā tasks/ # Skill tracker
ā āāā journal/ # Encrypted hacking journal
ā āāā exploits/ # Exploit documentation
ā āāā profile/ # Hacker profile settings
āāā lib/
ā āāā components/ # Reusable UI components
ā āāā stores/ # State management
ā āāā data/ # Hacking roadmap data
ā āāā utils/ # Security utilities
ā ā āāā encryption.ts
ā ā āāā security.ts
ā āāā firebase.ts # Firebase configuration
āāā app.css # Cyberpunk styling
š¤ Contributing
We welcome contributions from the hacking community! Here's how:
- Fork the repository
- Create feature branch (
git checkout -b feature/awesome-hacking-feature
)
- Commit changes (
git commit -m 'Add awesome hacking feature'
)
- Push branch (
git push origin feature/awesome-hacking-feature
)
- Open Pull Request
Development Guidelines
- Follow existing code style and hacker aesthetic
- Add tests for new features
- Update documentation with new techniques
- Respect ethical hacking principles
- Keep user privacy and security paramount
š Bug Reports & Feature Requests
Found a bug or want a new hacking feature? Please open an issue with:
- Clear description of the problem or feature
- Steps to reproduce (for bugs)
- Expected behavior
- Screenshots or code examples
- Your current hacking level (helps with context)
š License
This project is licensed under the GNU Affero General Public License v3 (AGPLv3).
This means:
- ā
Use for any purpose (including commercial)
- ā
Modify and distribute freely
- ā
Patent protection included
- ā ļø Must open-source any modifications
- ā ļø Must disclose source code
- ā ļø Must use same license for derivatives
Perfect for the hacking community's open-source philosophy!
š Acknowledgments
- Hacking community for inspiration and knowledge sharing
- CTF organizers for creating practical challenges
- Bug bounty platforms for making ethical hacking profitable
- Red team operators for real-world techniques
- Security researchers for pushing boundaries
- Open source contributors for making tools accessible
- SvelteKit team for the amazing framework
- Firebase for backend infrastructure
- Tailwind CSS for styling system
š® Roadmap
Short Term
Medium Term
Long Term
šÆ Philosophy
"Real hackers don't just run tools - they understand systems, chain attacks, and create their own techniques."
AXIONARK is built on the philosophy that true hacking mastery comes from:
- Understanding fundamentals - not just running scripts
- Practical application - skills that work in real scenarios
- Continuous learning - staying ahead of defenses
- Ethical responsibility - using skills for good
- Community sharing - elevating the entire field
ā” Get Started
Ready to begin your journey from script kiddie to legendary hacker?
- Clone the repo and set up your environment
- Create your hacker alias and start tracking progress
- Complete your first foundation tasks
- Document your journey in the encrypted journal
- Join the community and share your achievements
ā” AXIONARK - Your complete journey to hacking mastery.
"The best hackers are made, not born. Start your transformation today."
ā ļø Legal Disclaimer
AXIONARK is designed for educational purposes and ethical hacking only. Users must:
- Only test systems you own or have explicit permission to test
- Follow responsible disclosure practices
- Comply with local laws and regulations
- Use skills for defensive and educational purposes
- Respect others' privacy and digital property
The creators of AXIONARK are not responsible for misuse of the information or tools referenced in this platform. Always hack ethically and legally.
Happy Hacking! š“āā ļø