Break • Exploit • Automate • Repeat
I am an offensive security practitioner focused on breaking systems, understanding real-world attack paths, and building tooling to automate red-team workflows.
My work revolves around VAPT, exploitation, post-exploitation, and adversary simulation, with a strong emphasis on methodology over tools.
- Web & Network Penetration Testing
- Linux & Windows Privilege Escalation
- Post-Exploitation & Lateral Movement
- Buffer Overflow & Memory Exploitation
- Red Team Tradecraft & OPSEC
Recon : Nmap, Naabu, Subfinder, Amass, chaos, Shodan
Web Testing : Burp Suite, SQLmap, Nikto, Nessus, Nuclei
Exploitation : Metasploit, Manual Exploitation
Post-Exploitation | Privilege Escalation | Lateral Movement
Scripting : Python, Bash
OS : Linux, Windows
VAJRA is my flagship offensive security project. A modular red-team–oriented platform designed to streamline:
- Reconnaissance workflows
- Exploitation chains
- Automation of repetitive offensive tasks
- Operator-focused usability
🔗 Repository: https://github.com/instroyer/VAJRA---Offensive-Security-Platform
KESTREL is a modular CLI-based reconnaissance framework designed to orchestrate multi-stage intelligence gathering:
- Automated Pipeline: Whois → Subdomains → Live Probing → Port Scanning
- Interactive Control: Runtime interception to skip/quit modules dynamically
- Reporting: Professional HTML reports with visual evidence
🔗 Repository: https://github.com/instroyer/KESTREL
Offensive security is not about running tools.
It is about thinking like an attacker.
- GitHub : https://github.com/instroyer
- LinkedIn : https://www.linkedin.com/in/yash--javiya/
- Ko-fi : https://ko-fi.com/yashjaviya
VAJRA • Offensive Security • Red Team Mindset