Skip to content
View instroyer's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report instroyer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
INSTROYER/README.md

Yash Javiya (YJ)

Offensive Security | VAPT | CTF | Red Team Tooling

Break • Exploit • Automate • Repeat


👋 About Me

I am an offensive security practitioner focused on breaking systems, understanding real-world attack paths, and building tooling to automate red-team workflows.

My work revolves around VAPT, exploitation, post-exploitation, and adversary simulation, with a strong emphasis on methodology over tools.


🧠 Core Focus Areas

  • Web & Network Penetration Testing
  • Linux & Windows Privilege Escalation
  • Post-Exploitation & Lateral Movement
  • Buffer Overflow & Memory Exploitation
  • Red Team Tradecraft & OPSEC

🧰 Toolset

Recon        : Nmap, Naabu, Subfinder, Amass, chaos, Shodan
Web Testing  : Burp Suite, SQLmap, Nikto, Nessus, Nuclei
Exploitation : Metasploit, Manual Exploitation
Post-Exploitation | Privilege Escalation | Lateral Movement

Scripting    : Python, Bash
OS           : Linux, Windows

🚀 Projects

VAJRA – Offensive Security Platform

VAJRA is my flagship offensive security project. A modular red-team–oriented platform designed to streamline:

  • Reconnaissance workflows
  • Exploitation chains
  • Automation of repetitive offensive tasks
  • Operator-focused usability

🔗 Repository: https://github.com/instroyer/VAJRA---Offensive-Security-Platform

KESTREL – Multi-layered Reconnaissance Tool

KESTREL is a modular CLI-based reconnaissance framework designed to orchestrate multi-stage intelligence gathering:

  • Automated Pipeline: Whois → Subdomains → Live Probing → Port Scanning
  • Interactive Control: Runtime interception to skip/quit modules dynamically
  • Reporting: Professional HTML reports with visual evidence

🔗 Repository: https://github.com/instroyer/KESTREL


📌 Featured Philosophy

Offensive security is not about running tools.
It is about thinking like an attacker.

🌐 Connect


VAJRA • Offensive Security • Red Team Mindset

Popular repositories Loading

  1. VAJRA VAJRA Public

    12 1

  2. KESTREL KESTREL Public

    Multi-layered Reconnissance Tool

    Python

  3. Projects Projects Public

  4. INSTROYER INSTROYER Public