#!/usr/bin/env python3
# ────────────────────────────────────────────────
# th3sanjai | D. Sanjai Kumar | @RevoltSecurities
# ────────────────────────────────────────────────
class SanjaiKumar:
IDENTITY = {
"name" : "D. Sanjai Kumar",
"alias" : "th3sanjai",
"location" : "Tamil Nadu, India 🇮🇳",
"org" : "@RevoltSecurities",
"contact" : "sanjaiz.contact@gmail.com",
}
ROLES = [
"🔍 Web Penetration Tester",
"🔐 API Security Researcher",
"🐛 Bug Bounty Hunter",
"⚡ Open Source Tool Developer",
"💀 CVE Exploit Developer",
"🏢 Founder — RevoltSecurities",
]
EXPERTISE = {
"recon" : ["Subdominator", "SubProber", "ShodanX", "Dnsbruter"],
"attack" : ["Probuster", "CVE Exploits", "Burp Suite", "FFUF"],
"languages" : ["Python 🐍", "Go 🐹", "Bash 🐚"],
"platforms" : ["Linux", "Kali", "macOS"],
}
PYPI_TOOLS = ["subdominator", "subprober", "shodanx", "probuster"]
def mission(self) -> str:
return """
⚡ Empower ethical hackers & bug bounty hunters
with cutting-edge, open-source security tools.
🛡️ Stay Ethical. Stay Sharp. Stay Ahead.
"""
me = SanjaiKumar()
print(me.mission())🏢 Founder & Lead Developer of @RevoltSecurities — building tools for ethical hackers, bug bounty hunters, and pentesters worldwide.
| Tool | Description | PyPI | Stars |
|---|---|---|---|
| Subdominator | Passive subdomain enum — 50+ sources, shell mode, reports | ||
| SubProber | Async HTTP probing — screenshots, JARM, HTTP/2 | ||
| ShodanX | Terminal Shodan OSINT — dorks, CVE mapping, geo viz | ||
| Probuster | Web pentesting — Dir / DNS / Vhost concurrent modes | ||
| Dnsbruter | Active subdomain bruteforce with wildcard detection | pip install dnsbruter |
|
| Dnsprober | Fast DNS probing — custom resolvers, AXFR checks | pip install dnsprober |
|
| Khonshu | High-performance concurrent port scanner | pip install khonshu |
| Tool | Description | Stars |
|---|---|---|
| RAI | YAML multi-agent AI framework for offensive security automation | |
| RevoltUtils | Modular Python utility library for security tooling | |
| RevoltLogger | Colorful logging library for CLI security tools | |
| GitUpdater | Lightweight GitHub release version manager |
⚠️ Developed for educational & ethical purposes only. Always obtain authorization.
| CVE | Target | Type | PoC |
|---|---|---|---|
| CVE-2024-24919 | Check Point VPN Gateway | Arbitrary File Read | |
| CVE-2024-4358 | Telerik Report Server | Auth Bypass | |
| CVE-2024-29973 | Zyxel NAS Devices | Command Injection | |
| CVE-2023-46747 | F5 BIG-IP | Pre-Auth RCE | |
| CVE-2023-4966 | Citrix Bleed (NetScaler) | Info Disclosure | |
| CVE-2023-22518 | Atlassian Confluence | Improper Authorization | |
| CVE-2023-20198 | Cisco IOS XE (Zero Day) | Privilege Escalation |
╔══════════════════════════════════════════════════════╗
║ ⚡ Stay Ethical. Stay Sharp. Stay Ahead. ║
║ — D. Sanjai Kumar | @RevoltSecurities ║
╚══════════════════════════════════════════════════════╝


