┌──(iw00tr00t㉿0day)-[~/offensive]
└─$ cat about.txt
Name : Avinash Kumar Thapa
Certs : CISSP · CCSP · OSCP (2016) · OSCE (2016)
Experience : 13+ years | 3+ in leadership
Offensive : Red Team · Adversary Emulation · Exploit Dev · EDR/AV Bypass
Domains : Web · Mobile (iOS/Android) · API · Network · Cloud · Blockchain
MITRE ATT&CK : Full TTP coverage — recon through impact
Tools Built : Claudia (Burp AI agent) · claudia-rag (262K-chunk KB) · Redis RCE (★97)
Offensive security practitioner since 2014. OSCP and OSCE since 2016 — not recently, since 2016. I run Red Teams, lead adversary emulation programs, and build the tools that do the work. Full engagement lifecycle: recon, exploitation, post-exploitation, pivot, report. I've broken web apps, mobile apps, APIs, cloud infrastructure, Active Directory, crypto exchanges, and payment systems across financial services, fintech, telecom, and government sectors.
| Domain | What I Actually Do |
|---|---|
| 🔴 Red Team & Adversary Emulation | MITRE ATT&CK-based ops · BAS campaigns · EDR/AV bypass · Post-exploitation tradecraft · Stealth persistence |
| 🌐 Web Application | OWASP Top 10 · Business logic · Auth bypasses · Deserialization · SSRF · SSTI · Race conditions |
| 📱 Mobile (iOS/Android) | Frida hooks · Binary analysis · IPA extraction (no jailbreak) · SSL pinning bypass · Runtime manipulation |
| 🔌 API Security | OWASP API Top 10 · OAuth token abuse · GraphQL injection · JWT attacks · Mass assignment · BFLA/BOLA |
| 🏗️ Network & Infrastructure | Active Directory attacks · Lateral movement · Kerberoasting · PCI DSS v4.0 assessments · Wireless |
| ☁️ Cloud Security | AWS/Azure/GCP IAM attacks · CSPM · Kubernetes escapes · Container security · Serverless security |
| ⛓️ Blockchain & Crypto | Exchange platform testing · MPC wallet security · Smart contract review · Webhook security · Key management |
| 🤖 AI/LLM Security | Prompt injection · Context contamination · Tool-chaining privilege escalation · AI agent threat modeling |
No cloud. No data leaves your machine.
|
claudia-rag — Security Knowledge Base
9 collections · 39 sources · updated nightly
|
| Tool | What It Does | Stars |
|---|---|---|
| Redis-Server-Exploit | RCE via unauthenticated Redis — shell access on misconfigured internet-facing instances | ⭐ 97 |
| pci-network-pentest-framework | 9-phase PCI DSS v4.0 network pentest framework with automation scripts and requirement mapping | — |
| ios-ipa-extractor | Extract IPAs from non-jailbroken iOS devices — no jailbreak, no MDM, 3 steps | — |
| Shell-Uploader | PHP webshell uploader for post-exploitation and CTF | ⭐ 8 |
| HFS-Http-File-Server | RCE exploit for HFS 2.3.x — remote code execution via HTTP File Server | ⭐ 3 |
| globalprotect-expired-cert-workaround | Connect GlobalProtect VPN when the gateway certificate has expired (macOS) | — |

