Skip to content
View anmolksachan's full-sized avatar
:atom:
Busy making exploits
:atom:
Busy making exploits

Block or report anmolksachan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
anmolksachan/README.md

FR13ND0x7F

πŸ‘‹ Hey there, I'm Anmol K Sachan (FR13ND0x7F)

I’m a seasoned Security Researcher, Penetration Tester, and Bug Bounty Hunter with a passion for uncovering vulnerabilities and securing systems. My approach to hacking is rooted in curiosity, creativity, and persistence. I believe that security isn’t just about mastering toolsβ€”it’s about understanding systems, thinking like an attacker, and crafting solutions that make a difference.


🌟 About Me

  • πŸ” Skilled Penetration Tester: Specializing in Web, Mobile, API, AI/ML, and Network Security.
  • πŸ›‘οΈ Security Advocate: Passionate about ethical hacking, vulnerability research, and contributing to a safer digital world.
  • πŸ’» Builder & Developer: Crafting custom exploits, tools, and automation scripts to solve complex problems.
  • 🧠 Lifelong Learner: Always exploring new technologies, techniques, and methodologies to stay ahead in the ever-evolving cybersecurity landscape.

πŸ† Achievements & Recognitions

  • Reported critical vulnerabilities to organizations like Nokia, Federal Communications Commission (USA Gov), Mediatek, Healthy Supplies, and Wageningen University & Research.
  • Acknowledged with Hall of Fame (HOF) entries and official recognition letters for responsible disclosures.
  • Discovered and reported multiple CVEs impacting widely-used software and systems.

πŸ› οΈ My Skillset

  • βœ”οΈ Web Application Penetration Testing
  • βœ”οΈ Mobile Application Penetration Testing
  • βœ”οΈ API Penetration Testing
  • βœ”οΈ AI/ML Penetration Testing
  • βœ”οΈ Network Pentesting
  • βœ”οΈ Attack Surface Management (ASM)
  • βœ”οΈ CTFs & Capture The Flag Challenges
  • βœ”οΈ OSINT (Open Source Intelligence)
  • βœ”οΈ Thick Client Pentesting
  • βœ”οΈ Reverse Engineering
  • βœ”οΈ Source Code Review
  • βœ”οΈ Video Editing & Content Creation
  • βœ”οΈ Community Building

πŸš€ Tools I’ve Built for the Community

These open-source tools are designed to assist pentesters, security researchers, and bug bounty hunters in their workflows:

  • The Time Machine
    GitHub stars
    A powerful recon tool leveraging Wayback Machine data to discover sensitive endpoints, subdomains, and potential vulnerabilities.

  • ThreatTracer
    GitHub stars
    A CVE checker and exploit enumerator for identifying vulnerabilities and public exploits against software components.

  • WayBackLister
    GitHub stars
    A reconnaissance tool to discover directory listings through archived URLs from the Wayback Machine.

  • WayBackup Finder
    GitHub stars
    A tool to identify backup files and sensitive data leaks via historical Wayback Machine snapshots.

  • CVE Seeker
    A utility to search for CVEs and related exploits efficiently.

  • CrossInjector
    A tool for automating Cross-Site Scripting (XSS) payload testing.

  • What The Cipher
    A cipher analysis and decryption tool for CTF challenges.

  • Project Dork
    A curated collection of Google Dorks for advanced OSINT.

  • JIRA"YA - JIRA Yet Another Vulnerability Analyzer
    A tool to analyze JIRA instances for misconfigurations and vulnerabilities.

  • DKIM Lookup
    A utility to verify DKIM records for email security assessments.

Note: These tools are intended for educational purposes only. Use responsibly and within authorized boundaries.


πŸ“œ CVEs Reported by Me

  • CVE-2021-27539
  • CVE-2022-33041
  • CVE-2021-27295
  • CVE-2021-27296
  • CVE-2021-27190
  • And more!

πŸ“„ Published Research


🌍 Connect With Me

  • Twitter – Follow me for insights, tools, and updates on security research.
  • LinkedIn – Let’s connect professionally and discuss opportunities.
  • Blog – Read my articles on cybersecurity, tools, and best practices.
  • Instagram – Sneak peeks into my hacking journey and projects.

🎯 What’s Next?

  • πŸ”­ Currently working on advanced AI-driven security tools and research.
  • 🌱 Learning more about cloud security, blockchain vulnerabilities, and quantum cryptography.
  • πŸ‘― Looking to collaborate on open-source security projects and tools.
  • πŸ€” Seeking feedback and ideas for improving existing tools.
  • πŸ’¬ Feel free to ask me about anything related to cybersecurity, tools, or research!
  • πŸ“« Reach out via Twitter DMs or LinkedIn.

⚑ Fun Fact

I once spent 48 hours straight debugging a single line of codeβ€”and yes, it was worth it! πŸ˜„


πŸ“œ License

All tools and content are released under the MIT License unless otherwise specified. Contributions are welcomeβ€”fork, modify, and submit pull requests to help improve these projects!


Pinned Loading

  1. TheTimeMachine TheTimeMachine Public

    Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not

    Python 284 40

  2. CrossInjector CrossInjector Public

    Cross Injector β€” A Python Script for Cross-Site Scripting (XSS) Detection

    Python 37 11

  3. JIRAya JIRAya Public

    JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and conducting tests.

    Python 35 5

  4. ThreatTracer ThreatTracer Public

    ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F

    Python 134 19

  5. WhatTheCipher WhatTheCipher Public

    Cipher Suite Checker

    Python 10 2

  6. CVESeeker CVESeeker Public

    Unveiling Cyber Threats: From assets to Vulnerability Insights

    Python 13 1