Structured, lab-driven research on web exploitation techniques, execution mechanics, and defensive countermeasures.
All research is conducted in controlled environments (e.g., PortSwigger Web Security Academy, local test labs).
This repository focuses on:
- File upload vulnerabilities
- Remote Code Execution (RCE) primitives
- Filter bypass techniques
- Attack chain construction
- Detection signals and defensive mitigations
The goal is not payload collection, but understanding root cause, exploitation workflow, and risk impact.