Skip to content
View yashkorat's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report yashkorat

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
yashkorat/README.md

Hi there, I'm Yash Korat! πŸ‘‹

Profile Views

πŸš€ About Me

I am a passionate Cyber Security Specialist with a keen interest in developing innovative automation tools for penetration testing and hacking. With extensive experience in various aspects of cybersecurity, I aim to contribute to the community by creating tools that simplify and enhance the hacking process.


πŸ› οΈ Skills

Programming Languages:
Python JavaScript Go

Technologies:
Docker Kubernetes AWS Azure

Web Development:
HTML5 CSS3 Vue.js Node.js

Penetration Testing Tools:
Nmap Burp Suite Metasploit Wireshark


πŸ”₯ Projects

πŸ“‘ IoT Hacking Scripts

Developing custom scripts for IoT device penetration testing, focusing on identifying vulnerabilities and securing IoT networks.

πŸ”Œ Browser Extension for Pentesters

Creating a browser extension to assist penetration testers with automating common tasks, such as cookie management, header manipulation, and data extraction.

πŸ€– Auto Exploiter with ChatGPT

Building an automated exploitation tool that leverages the power of ChatGPT to identify and exploit vulnerabilities in web applications. This tool aims to streamline the exploitation process, making it faster and more efficient.


πŸ“š Featured Writeups

  • Skills Required: Enumeration, Docker Knowledge, OWASP Top 10
  • Summary: Exploited a custom web application for gaining access to sensitive information and achieved privilege escalation through Docker vulnerabilities.
  • Skills Required: Web Enumeration, Go SSTI, Source Code Analysis, AWS S3 Buckets
  • Summary: Leveraged Server-Side Template Injection (SSTI) in a Go application to gain initial access and escalated privileges using AWS S3 misconfigurations.
  • Skills Required: Enumeration, Source code review, Vhost enumeration
  • Summary: Discovered and exploited a Server-Side Request Forgery (SSRF) vulnerability to access internal services and obtained root privileges through a misconfigured Python script.

πŸ“« Let's Connect!

Feel free to reach out to me if you're interested in my projects or if you'd like to collaborate on cybersecurity and automation tool development.

LinkedIn Twitter Email


Thank you for visiting my profile! Have a great day! 😊

Popular repositories Loading

  1. bugbounty-cheatsheet bugbounty-cheatsheet Public

    Forked from EdOverflow/bugbounty-cheatsheet

    A list of interesting payloads, tips and tricks for bug bounty hunters.

  2. assessment-mindset assessment-mindset Public

    Forked from dsopas/assessment-mindset

    Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.

  3. bounty-targets-data bounty-targets-data Public

    Forked from arkadiyt/bounty-targets-data

    This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/etc) that are eligible for reports

  4. Resources-for-Beginner-Bug-Bounty-Hunters Resources-for-Beginner-Bug-Bounty-Hunters Public

    Forked from nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

    A list of resources for those interested in getting started in bug bounties

  5. Penetration-Testing-Study-Notes Penetration-Testing-Study-Notes Public

    Forked from AnasAboreeda/Penetration-Testing-Study-Notes

    Penetration Testing notes, resources and scripts

    Python

  6. can-i-take-over-xyz can-i-take-over-xyz Public

    Forked from EdOverflow/can-i-take-over-xyz

    "Can I take over XYZ?" β€” a list of services and how to claim (sub)domains with dangling DNS records.