Vulnerability Demo Web App
Frontend-focused project with real-world UI patterns
Live β’ Deployed
Intermediate
Frontend
Role: Designed and developed the full frontend, focusing on performance, responsiveness, and interaction design.
Tech Stack:
HTML
CSS
JavaScript
- Demonstrates DOM-based XSS vulnerability
- Includes secure fix using safe DOM handling
- Side-by-side comparison view
- Predefined attack payload testing
- Phishing detection mini feature
- Built responsive layout using CSS Grid and Flexbox
- Implemented dark mode toggle using classList
- Added scroll reveal animations using IntersectionObserver
- Optimized layout for mobile devices
- Problem: Needed a clean way to present projects professionally
- Solution: Built a modular, responsive UI with reusable components
π Security Notes
- Static content reduces attack surface
- No user input stored or processed
- External links handled safely
- Future scope: apply Content Security Policy (CSP)
Focused on performance and clean DOM structure
Client-Side Security Tester
Frontend-focused project with real-world UI patterns
Live β’ Deployed
Intermediate
Frontend
Role: Designed and developed the full frontend, focusing on performance, responsiveness, and interaction design.
Tech Stack:
HTML
CSS
JavaScript
How Detection Works
XSS: Detects script tags, event handlers, and JavaScript URIs.
Phishing: Identifies suspicious keywords and domain patterns.
DOM Risk: Flags unsafe JavaScript functions like innerHTML and eval.
- Built responsive layout using CSS Grid and Flexbox
- Implemented dark mode toggle using classList
- Added scroll reveal animations using IntersectionObserver
- Optimized layout for mobile devices
- Problem: Needed a clean way to present projects professionally
- Solution: Built a modular, responsive UI with reusable components
π Security Notes
- Static content reduces attack surface
- No user input stored or processed
- External links handled safely
- Future scope: apply Content Security Policy (CSP)
Focused on performance and clean DOM structure
Bug Bounty Lab + Request Editor
Client-side Web Vulnerability Simulation
Live β’ Deployed
Intermediate
Security Lab
An interactive lab that simulates real-world client-side vulnerabilities
such as Cross-Site Scripting (XSS), Open Redirects, and Clickjacking,
along with a mini request editor for input-based security analysis.
Vulnerabilities Covered:
XSS
Open Redirect
Clickjacking
DOM Injection
Tech Stack:
HTML
CSS
JavaScript
- Stored XSS (vulnerable vs secure implementation)
- Open Redirect simulation with validation bypass
- Clickjacking attack simulation using hidden overlays
- Request Editor for payload testing and analysis
- Analyzing DOM-based vulnerabilities
- Crafting and testing attack payloads
- Understanding exploitation flow and mitigation techniques
π Security Breakdown
- XSS Impact: Allows execution of arbitrary JavaScript in victimβs browser
- Open Redirect Risk: Can be used for phishing and user redirection attacks
- Clickjacking: Tricks users into performing unintended actions
- Mitigation: Safe DOM handling, URL validation, and UI protection techniques
Currently under developmentπ
Authentication Vulnerability Lab
Security-focused lab simulating real-world authentication vulnerabilities
Live β’ Deployed
Intermediate
Security Lab
Interactive client-side security lab demonstrating authentication and access control flaws,
including weak login logic, insecure session storage, and direct page access bypass.
Vulnerabilities Covered:
XSS
Open Redirect
Clickjacking
DOM Injection
Tech Stack:
HTML
CSS
JavaScript
- Weak Authentication: Login validation handled entirely on client-side β bypassable via DevTools
- Session Manipulation: Authentication state stored in localStorage β can be modified manually
- Broken Access Control: Direct access to protected pages without validation
- Exploitation: Demonstrated bypass using browser console and URL access
- Analyzing DOM-based vulnerabilities
- Crafting and testing attack payloads
- Understanding exploitation flow and mitigation techniques
π Security Notes
- Client-side authentication is inherently insecure
- localStorage should not be used for sensitive session control
- Proper access control must be enforced on the server
- This project intentionally demonstrates insecure patterns for learning
Currently under developmentπ
Portfolio Website
Frontend-focused project with real-world UI patterns
Live β’ Deployed
Intermediate
Frontend
Role: Designed and developed the full frontend, focusing on performance, responsiveness, and interaction design.
Tech Stack:
HTML
CSS
JavaScript
- IntersectionObserver-based animations
- Responsive layout with Flexbox
- Dynamic modal preview system
- Built responsive layout using CSS Grid and Flexbox
- Implemented dark mode toggle using classList
- Added scroll reveal animations using IntersectionObserver
- Optimized layout for mobile devices
- Problem: Needed a clean way to present projects professionally
- Solution: Built a modular, responsive UI with reusable components
π Security Notes
- Static content reduces attack surface
- No user input stored or processed
- External links handled safely
- Future scope: apply Content Security Policy (CSP)
Focused on performance and clean DOM structure
Game Application
Frontend-focused project with real-world UI patterns
Live β’ Deployed
Intermediate
Frontend
A lightweight offline browser game focused on simple mechanics and performance.
Tech Stack:
HTML
CSS
JavaScript
- IntersectionObserver-based animations
- Responsive layout with Flexbox
- Dynamic modal preview system
- Designing basic game mechanics using JavaScript
- Handling user input and game state
- Optimizing for smooth performance on low-end devices
π Security Notes
- Runs fully client-side with no sensitive data exposure
- No authentication system β eliminates account-based risks
- Controlled input handling (no arbitrary code execution)
- Future scope: secure score storage and validation
Currently under developmentπ