Cyber Security Undergraduate
Open for opportunities|
Who I am, what I do, and where I'm headed
Passionate Cyber Security undergraduate at SLIIT, specializing in web development and programming. I build tools to make the digital world safer — from BadUSB payloads to browser security extensions.
Real-world security research and tools
Collection of Arduino-based USB HID payloads for cybersecurity education and authorized penetration testing.
CTF challenge focused on web application security, including authentication, authorization, and data encryption.
Chrome extension finding 500+ free games using FreeToGame API with smart search and caching.
Android app to organize exams and tasks with Jetpack Compose and Room database.
ZeNeOn is an ESP32-based WiFi security assessment framework that provides deauthentication attacks, Evil Twin AP creation, beacon flooding, packet capture, and Payload Injection.
Custom wordlist generation tool for security testing and password auditing.
Insights on cybersecurity, ethical hacking, and security research
The SecureShop CTF lab is an educational cybersecurity challenge that mimics a vulnerable e-commerce web application. This walkthrough tutorial offers in-depth step-by-step procedures for the identification and exploitation of several security vulnerabilities related to the OWASP Top 10
OS command injection is also known as shell injection. It allows an attacker to execute operating system (OS) commands on the server that is running an application, and typically fully compromise the application and its data. Often, an attacker can leverage an OS command injection vulnerability to compromise other parts of the hosting infrastructure, and exploit trust relationships to pivot the attack to other systems within the organization.
File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a basic image upload function can be used to upload arbitrary and potentially dangerous files instead. This could even include server-side script files that enable remote code execution.
Path traversal, also known as directory traversal, is a type of vulnerability that occurs when an application fails to sanitize user input, allowing an attacker to access or modify files on the server. This can lead to unauthorized access to sensitive data, such as configuration files, source code, or even system files.
XXE injection is a type of attack that targets applications parsing XML input. It happens when the XML parser is configured to process external entities special references in XML that can load files or fetch resources from remote servers.
Cross-site scripting (XSS) is a type of attack that targets applications that display user input without proper validation or escaping. It allows an attacker to inject malicious scripts into a web page, which can then be executed by other users.
Let's collaborate on something amazing
Sri Lanka
Open for opportunities