Skip to content
View L4stPL4Y3R's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report L4stPL4Y3R

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
L4stPL4Y3R/README.md

Typing SVG


Views   Followers   Focus

$ cat /etc/profile

class L4stPL4Y3R:

    name      = "Ritesh Gohil"
    title     = "Cybersecurity Engineer — Offensive Security"
    company   = "Workday"
    previous  = "Sr. InfoSec Engineer (Red Team) @ Ryanair"
    location  = "Dublin, Ireland"
    education = "MSc Cyber Security — NCI"

    certifications = [
        "AWS Security Specialty (SCS-C02)",
        "SANS SEC588 — Cloud Pentesting",
        "ARTE — AWS Red Team Expert",
        "CRTP", "eCPPTv2", "eWPTXv2",
        "CEH v10", "ISC2 CC", "PCNSE",
        "CCNA", "AZ-900",
    ]

    focus = [
        "Red Team Ops & Adversary Simulation",
        "Web / Mobile / API Pentesting",
        "Cloud Security — AWS, Azure & GCP",
    ]







Creator & Development Lead · pwncloudos.pwnedlabs.io

The multi-cloud security platform for hackers and defenders.
A complete purple-team OS used by 3,000+ security professionals worldwide.


Pre-packaged offensive & defensive tools • AMD64 & ARM64 • Built by researchers, for researchers


 




Maintainer & Lead Security Researcher · github.com/samugit83/redamon

An AI-powered agentic red team framework that automates offensive security operations,
from reconnaissance to exploitation to post-exploitation, with zero human intervention.


Stars   Forks   MIT



Recon ➜ Exploitation ➜ Post-Exploitation ➜ AI Triage ➜ CodeFix ➜ GitHub PR • 30+ Security Tools • 400+ AI Models


 


Achievements & Recognition

11
CVEs in MITRE
3
Exploit-DB
3
Google Dorks
4x
Google HoF
6x
Apple HoF
200+
Apps Secured
Top 25
Yogosha
Expand Full Achievement Tree
ACHIEVEMENT LOG
│
├── CVE Research
│   ├── 11 CVEs published in MITRE (incl. CVE-2020-35270, CVE-2023-31650)
│   ├── 3 Exploits published in Exploit-DB
│   └── 3 Google Dorks published in Google Hacking Database (GHDB)
│
├── Bug Bounty
│   ├── HackerOne · Ranked #2 in Ireland
│   ├── Yogosha · Top 25 All-Time | Top Hacker at RootedCon & GISEC 2022
│   └── Active researcher across multiple platforms
│
├── Vendor Recognition
│   ├── Google · 4x Recognized (incl. Business Logic Flaw in Acquisition)
│   ├── Apple · 6x Recognized
│   └── State of Nevada (Gov) · F5 BIG-IP CVE-2020-5902 Appreciation
│
├── Open Source & Community
│   ├── Creator & Dev Lead · PWNCLOUDOS (3,000+ users)
│   ├── Maintainer & Lead Security Researcher · RedAmon (1.6K+ ★, 300+ forks)
│   ├── Contributor · Nuclei Templates (ProjectDiscovery)
│   ├── Author · PwnedLabs.io Security Labs (CloudFox, Inspector, VirusTotal)
│   └── Technical Reviewer · AWS Security Guide (BPB Publication)
│
└── Publications
    ├── Medium · CVE write-ups & security research (143+ followers)
    └── InfoSec Write-ups · Featured articles

Tech Arsenal

Languages  

Offensive  

Cloud Attack  

Mobile  

Infrastructure  


Featured Projects


GitHub Stats

Stats Streak



Languages



Trophies
Graph

github-snake

Recent Research & Write-ups

Date Title Where
2022 Softr 2.0 — Stored XSS via First Name Injection Medium
2021 WordPress ATO — 4-Digit Bounty in 5 Minutes Medium
2021 Textpattern CMS v4.8.4 — Stored XSS (Body) Medium
2021 Employee Perf Eval 1.0 — Persistent XSS Medium
2020 Business Logic Flaw in Google Acquisition InfoSec Write-ups
2020 Google Dork in GHDB #6300 Exploit-DB


Let's Connect

   


"Don’t stop until you’re satisfied"

Pinned Loading

  1. pwnedlabs/pwncloudos pwnedlabs/pwncloudos Public

    PWNCLOUDOS

    Python 43 8