File Upload Vulnerabilities — A Complete Step‑by‑Step Guide
The article briefly explains how insecure file upload features can be abused by attackers and highlights common file upload vulnerabilities and their security risks.
Read on Medium
A dynamic, database-driven website built for The Gallery Café in Colombo as part of the Web Application Development module at ICBT. The system enhances customer interaction with features like table reservations, pre-ordering, menu filters, and user/admin management.
An e-commerce Android app for dog owners to shop and learn about dog nutrition. Built for the Mobile App Development module (CSE5011) at ICBT, it features product listings, a cart system, educational content, and user authentication.
A web-based platform connecting blood donors, recipients, and hospitals. Developed as a group project for the Year 1 Semester 2 Internet and Web Technologies module at SLIIT. Features include appointment scheduling and an admin dashboard for managing donors and blood drives.
Comprehensive research paper on Zero Trust Architecture exploring core principles, benefits, challenges, and future trends in cybersecurity.
A hands-on project for the IE2012: Systems and Network Programming module at SLIIT. Covered Linux VM setup, network services (DHCP, DNS, NTP), server deployments (Apache, Postfix), firewall rules, secure SSH, and GDB-based debugging.
This portfolio was built using HTML5, CSS3, and JavaScript, and is hosted on GitHub Pages for reliable and fast deployment. I designed the layout with a focus on clarity, responsiveness, and a minimalist aesthetic, ensuring a smooth browsing experience across devices.
Completed a hands-on web security project assessing Deribit.com, applying ethical hacking techniques including reconnaissance, vulnerability scanning, and manual testing to identify and document security vulnerabilities.
The article briefly explains how insecure file upload features can be abused by attackers and highlights common file upload vulnerabilities and their security risks.
Read on Medium
This walkthrough covers Natas Levels 1–10, highlighting fundamental server-side web security flaws and teaching practical techniques for identifying and exploiting insecure web application logic.
Read on Medium
This walkthrough explores OverTheWire’s Bandit wargame (Levels 0–15), highlighting practical Linux commands and techniques commonly used in ethical hacking and cybersecurity.
Read on Medium