Skip to content

Project Roadmap

CarterPerez-dev edited this page Feb 11, 2026 · 2 revisions

Project Roadmap

Suggested build order organized by skill progression. Each phase builds on previous knowledge.

Current Status

  • Completed: 14/60
  • In Progress: Aenebris (Haskell Reverse Proxy)
[##############------------------------------------] 14/60 (23%)

Legend: Bold = Complete | Regular = Not started


Phase 1: Foundation Tools

Quick wins, core concepts

# Project Difficulty Key Skills Est. Complexity
1 Simple Port Scanner Beginner Sockets, async I/O, service detection Low
2 Keylogger Beginner Event handling, file I/O, pynput Low
3 Caesar Cipher Beginner Cryptography basics, brute force, CLI Low
4 DNS Lookup Tool Beginner dnspython, DNS records, WHOIS Low
5 Base64 Encoder/Decoder Beginner Encoding schemes, data formats Low
6 Hash Cracker Beginner Hashing, wordlists, hashlib Low

Phase 2: File & Data Tools

Working with files, metadata, integrity

# Project Difficulty Key Skills Est. Complexity
7 Metadata Scrubber Beginner EXIF, file parsing, PIL/PyPDF Low
8 Steganography Tool Beginner LSB encoding, image manipulation Low
9 File Integrity Monitor Beginner Checksums, watchdog, file I/O Low-Med
10 Firewall Log Parser Beginner Log parsing, regex, visualization Low-Med

Phase 3: Network Reconnaissance

Network analysis and detection

# Project Difficulty Key Skills Est. Complexity
11 Network Traffic Analyzer Beginner Scapy, packet capture, protocols Medium
12 ARP Spoofing Detector Beginner ARP protocol, network monitoring Medium
13 WiFi Network Scanner Beginner Wireless protocols, scapy Medium
14 MAC Address Spoofer Beginner Network interfaces, OS commands Low

Phase 4: Detection & Defense

Security monitoring and alerts

# Project Difficulty Key Skills Est. Complexity
15 SSH Brute Force Detector Beginner Log analysis, iptables, alerting Medium
16 Phishing URL Detector Beginner URL parsing, Safe Browsing API Low-Med
17 Security News Scraper Beginner Web scraping, BeautifulSoup, CVE Low
18 Simple Vulnerability Scanner Beginner CVE databases, dependency scanning Medium

Phase 5: Windows/System Tools

OS-specific security tools

# Project Difficulty Key Skills Est. Complexity
19 Windows Registry Monitor Beginner winreg, Windows API Medium
20 Ransomware Simulator Beginner Encryption, file handling Medium

Phase 6: Intermediate Network Security

Deeper network security concepts

# Project Difficulty Key Skills Est. Complexity
21 Reverse Shell Handler Intermediate Sockets, sessions, cmd2 Medium
22 DDoS Mitigation Tool Intermediate Traffic analysis, iptables, anomaly detection Medium-High
23 Wireless Deauth Detector Intermediate 802.11, deauth frames, alerting Medium
24 Network Intrusion Prevention Intermediate Snort rules, packet inspection High
25 Network Baseline Monitor Intermediate Statistics, anomaly detection Medium

Phase 7: Web Security

Web application security testing

# Project Difficulty Key Skills Est. Complexity
26 Web Vulnerability Scanner Intermediate httpx, XSS, SQLi, CSRF High
27 OAuth Token Analyzer Intermediate JWT, PyJWT, token security Medium
28 API Security Scanner Intermediate OWASP API Top 10, fuzzing, GraphQL High
29 SSL/TLS Certificate Scanner Intermediate SSL/TLS, cipher suites, HSTS Medium
30 Web Application Firewall Intermediate Reverse proxy, pattern matching High

Phase 8: Full-Stack Security Platforms

Complete applications with frontend

# Project Difficulty Key Skills Est. Complexity
31 SIEM Dashboard Intermediate Flask, React, syslog, correlation High
32 Threat Intelligence Aggregator Intermediate APIs, IOCs, WHOIS, enrichment High
33 Password Policy Auditor Intermediate AD/LDAP, policy analysis Medium
34 OSINT Reconnaissance Framework Intermediate Multiple data sources, automation High

Phase 9: Cloud & Container Security

Modern infrastructure security

# Project Difficulty Key Skills Est. Complexity
35 Container Security Scanner Intermediate Docker API, Dockerfile analysis Medium-High
36 Docker Security Audit Intermediate CIS benchmarks, container inspection Medium
37 Cloud Asset Inventory Intermediate boto3, Azure SDK, GCP SDK High
38 Backup Integrity Checker Intermediate Checksums, restoration testing Medium

Phase 10: Active Directory & Enterprise

Enterprise environment tools

# Project Difficulty Key Skills Est. Complexity
39 Active Directory Enumeration Intermediate LDAP, AD structure, permissions High
40 Privilege Escalation Finder Intermediate SUID, permissions, kernel exploits High

Phase 11: Binary & Mobile Analysis

Reverse engineering and app security

# Project Difficulty Key Skills Est. Complexity
41 Binary Analysis Tool Intermediate PE/ELF parsing, disassembly High
42 Mobile App Security Analyzer Intermediate APK/IPA decompilation, OWASP Mobile High

Phase 12: Advanced Platforms

Complex multi-component systems

# Project Difficulty Key Skills Est. Complexity
43 API Rate Limiter Advanced Token bucket, Redis, distributed systems Very High
44 Bug Bounty Platform Advanced Full-stack, CVSS, workflows Very High
45 Cloud Security Posture Management Advanced Multi-cloud, CIS benchmarks Very High
46 Malware Analysis Platform Advanced Sandboxing, YARA, behavior tracking Very High

Phase 13: AI & ML Security

Machine learning for security

# Project Difficulty Key Skills Est. Complexity
47 AI Threat Detection Advanced ML, CICIDS2017, FastAPI inference Very High
48 Adversarial ML Attacker Advanced FGSM, DeepFool, model robustness Very High

Phase 14: Offensive Security Tools

Red team and exploitation

# Project Difficulty Key Skills Est. Complexity
49 Exploit Development Framework Advanced Metasploit-like, shellcode, payloads Very High
50 Advanced Persistent Threat Simulator Advanced C2, lateral movement, persistence Very High
51 Automated Penetration Testing Advanced Orchestration, full pentest workflow Very High
52 Zero Day Vulnerability Scanner Advanced Fuzzing, AFL, crash triage Very High
53 Distributed Password Cracker Advanced GPU, distributed computing Very High

Phase 15: Cutting Edge

Emerging security technologies

# Project Difficulty Key Skills Est. Complexity
54 Encrypted P2P Chat Advanced Signal Protocol, Double Ratchet, WebAuthn Very High
55 Quantum Resistant Encryption Advanced Kyber, Dilithium, liboqs Very High
56 Blockchain Smart Contract Auditor Advanced Solidity, Mythril, Slither Very High
57 Network Covert Channel Advanced DNS/ICMP tunneling, steganography High
58 Supply Chain Security Analyzer Advanced Dependency analysis, typosquatting Very High

Phase 16: Low-Level & Kernel

System internals

# Project Difficulty Key Skills Est. Complexity
59 Kernel Rootkit Detection Advanced Volatility, memory forensics Very High
60 Hardware Security Module Emulator Advanced PKCS#11, key management Very High

Completed Projects Summary

# Project Difficulty Tech Stack
1 Simple Port Scanner Beginner C++
2 Keylogger Beginner Python
3 Caesar Cipher Beginner Python
4 DNS Lookup Tool Beginner Python
5 Base64 Encoder/Decoder Beginner Python
7 Metadata Scrubber Beginner Python
11 Network Traffic Analyzer Beginner Python
18 Vulnerability Scanner Beginner Go
28 API Security Scanner Intermediate FastAPI, React
31 SIEM Dashboard Intermediate Flask, React
36 Docker Security Audit Intermediate Go
43 API Rate Limiter Advanced Python, Redis
44 Bug Bounty Platform Advanced FastAPI, React
54 Encrypted P2P Chat Advanced FastAPI, SolidJS

Clone this wiki locally