The App
Z.R.A.K. (Zone Recon & Analysis Kit) is a free Android app that turns any phone into a network security learning tool. WiFi analysis, Bluetooth scanning, threat detection — all on-device, no data sent anywhere.
Open educational resources for schools and teachers. Lab guides, hands-on simulations, and a real Android security toolkit — built around the Z.R.A.K. techno-thriller book series.
A bridge between cybersecurity fiction and real-world learning
Z.R.A.K. (Zone Recon & Analysis Kit) is a free Android app that turns any phone into a network security learning tool. WiFi analysis, Bluetooth scanning, threat detection — all on-device, no data sent anywhere.
A five-book young adult techno-thriller series by Miro Feld. Two Prague teenagers uncover wireless threats using observation, documentation, and technical skill. Fiction that teaches real security concepts.
Free lab guides, lesson plans, and hands-on simulation setups. Designed for teachers to bring network security into the classroom for students aged 16 and older. No prior cybersecurity expertise required.
Step-by-step guides to set up controlled network environments where students can safely explore WiFi reconnaissance, evil twin detection, ARP monitoring, DNS analysis, Bluetooth tracking, and more — using the Z.R.A.K. app as their primary tool.
Downloadable lesson plans, worksheets, discussion guides, and assessment templates aligned to common cybersecurity education frameworks. Ready to use in the classroom with minimal preparation.
Comprehensive guide to every feature of the Z.R.A.K. Android app. Device recommendations, permission explanations, tool descriptions, and mode walkthroughs. Everything a teacher needs to know before introducing it to students.
The Z.R.A.K. book series connects fiction to real security concepts. Each book comes with teaching focus areas that map directly to the lab exercises and app features covered on this site.
What students take away from the Z.R.A.K. curriculum
WiFi networks, Bluetooth devices, and network traffic are invisible by design. Students learn to observe the digital infrastructure that surrounds them every day.
Security starts with knowing what "normal" looks like. Baseline concepts teach students to recognize when something has changed — and when to investigate further.
Every exercise reinforces ethical boundaries. Documentation over confrontation. Evidence over suspicion. Reporting over hacking. Restraint as a security practice.
Digital attacks require physical proximity. Students learn that wireless threats have range limits, that rogue devices need to be placed, and that geography matters.
WiFi names, DNS responses, certificates, and MAC addresses can all be spoofed. Students learn that trust in networks must be earned through verification, not assumed.
Technical skill comes with ethical obligation. The more you can see, the more carefully you must act. Maturity means knowing when restraint applies.
Everything here is free and open. No accounts, no tracking, no paywalls.