Welcome to POC Lab

A curated collection of Proof-of-Concepts, experiments, and explorations in web development, security, and UI/UX design. Each project is a small step into the "what if".

Smuggling

These projects exemplify ways that hackers can get you to mistakenly download an executable.

Cookie banner is download link

Fetches a file when user clicks Accept on cookie banner.

Mouse-over download

In this example, no click is necessary to initiate the Save As dialog.

Base64 encrypted polyglot

A base64 encrypted file hidden within the SVG image. No external executable file necessary, just the HTML page.

A "special" context menu

The right-click mouse menu is disabled, and replaced with a custom implementation that hijacks the "Save image as..." function.

Mismatched Save As dialog

Demonstrates a deceptive UI pattern where the file extension in the "Save As" dialog doesn't match the actual content type, potentially tricking users.

About this lab

This website serves as a portfolio for technical experiments. The goal is not to create polished, production-ready applications, but to explore new ideas, test the limits of web technologies, and share my findings. Many of these projects are inspired by security research, creative coding, and a desire to understand how things work under the hood.