Skip to content
View anmolksachan's full-sized avatar
:atom:
Busy making exploits
:atom:
Busy making exploits

Block or report anmolksachan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
anmolksachan/README.md

         


Sr. Security Consultant at NetSPI · Hacker Side at Black Hat India · Chapter Lead at OWASP Chandigarh

I break things for a living — responsibly. From Web and API flaws to AI/ML attack surfaces, I specialize in finding what others miss and building open-source tools that make the community sharper. I've authored multiple CVEs, been recognized across government and enterprise Hall of Fames worldwide, and published security research.


Recognition & Hall of Fame

Organization Type
🇮🇳 CERT-In (Indian Computer Emergency Response Team) Hall of Fame
📡 Federal Communications Commission — US Government Hall of Fame
📱 Nokia Hall of Fame
🔧 MediaTek Hall of Fame
🌿 Wageningen University & Research Hall of Fame
🛒 Healthy Supplies Hall of Fame
(+ more not listed here) Recognition Letters

CVEs Authored: CVE-2021-27539 · CVE-2022-33041 · CVE-2021-27295 · CVE-2021-27296 · CVE-2021-27190 · and more


Open Source Arsenal

Built because I needed them. Free because you deserve them.

🤖 AI / ML Security
Tool What it does
LLM Injector stars Burp Suite extension for automated LLM prompt injection testing — one of the first of its kind
AI/ML Pentest Roadmap stars Zero-to-practitioner curriculum for AI/ML security — structured, free, and comprehensive
🕵️ Recon & OSINT
Tool What it does
The Time Machine stars Mines Wayback Machine snapshots to surface forgotten endpoints, subdomains, and buried secrets — got me into CERT-In HOF
WayBackLister stars Discovers exposed directory listings through archived Wayback Machine URLs
WayBackup Finder stars Hunts for leaked backup files and sensitive data in historical snapshots
CloudFail v2 Finds real IPs behind Cloudflare — rebuilt from scratch because the original was broken
Project Dork Curated Google Dorks for serious OSINT operations
🔎 Vulnerability Research
Tool What it does
ThreatTracer stars Feed it a component name and version — get CVEs and public exploits back instantly
CVE Seeker Fast, clean CVE lookup and related exploit search
JIRA"YA Scans JIRA instances for misconfigurations and unauthenticated data exposure
DKIM Lookup Verifies DKIM records for email security audits
⚔️ Exploitation & CTF
Tool What it does
CrossInjector End-to-end automated XSS payload testing framework
What The Cipher Cipher identification and decryption toolkit for CTF challenges

Research & Writing

📄 "AI: Perilous Threat to Both Physical and Cyber Worlds"JETIR
Explores how AI simultaneously empowers defenders and weaponizes attackers — published before it was a trending topic.

✍️ Recent articles on Medium:


GitHub Stats


All tools are for authorized testing and educational use only · MIT License

Pinned Loading

  1. TheTimeMachine TheTimeMachine Public

    Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not

    Python 521 82

  2. CrossInjector CrossInjector Public

    Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection

    Python 41 15

  3. ThreatTracer ThreatTracer Public

    ThreatTracer - A tool to identify CVE by name & version and more by @FR13ND0x7F

    Python 147 23

  4. CVESeeker CVESeeker Public

    Unveiling Cyber Threats: From assets to Vulnerability Insights

    Python 17 1

  5. AI-ML-Free-Resources-for-Security-and-Prompt-Injection AI-ML-Free-Resources-for-Security-and-Prompt-Injection Public

    AI/ML Pentesting Roadmap for Beginners

    352 50

  6. WayBackupFinder WayBackupFinder Public

    A passive way to find backups/ sensitive information.

    Python 89 23