Skip to content
View L4stPL4Y3R's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report L4stPL4Y3R

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
L4stPL4Y3R/README.md

Typing SVG


Views   Followers   Focus

$ cat /etc/profile

class L4stPL4Y3R:

    name      = "Ritesh Gohil"
    title     = "Cybersecurity Engineer — Offensive Security"
    company   = "Workday"
    previous  = "Sr. InfoSec Engineer (Red Team) @ Ryanair"
    location  = "Dublin, Ireland"
    education = "MSc Cyber Security — NCI"

    certifications = [
        "AWS Security Specialty (SCS-C02)",
        "SANS SEC588 — Cloud Pentesting",
        "ARTE — AWS Red Team Expert",
        "CRTP", "eCPPTv2", "eWPTXv2",
        "CEH v10", "ISC2 CC", "PCNSE",
        "CCNA", "AZ-900",
    ]

    focus = [
        "Red Team Ops & Adversary Simulation",
        "Web / Mobile / API Pentesting",
        "Cloud Security — AWS, Azure & GCP",
    ]







Creator & Development Lead · pwncloudos.pwnedlabs.io

The multi-cloud security platform for hackers and defenders.
A complete purple-team OS used by 3,000+ security professionals worldwide.


Pre-packaged offensive & defensive tools • AMD64 & ARM64 • Built by researchers, for researchers


 




Maintainer & Lead Security Researcher · github.com/samugit83/redamon

An AI-powered agentic red team framework that automates offensive security operations,
from reconnaissance to exploitation to post-exploitation, with zero human intervention.


Stars   Forks   MIT



Recon ➜ Exploitation ➜ Post-Exploitation ➜ AI Triage ➜ CodeFix ➜ GitHub PR • 30+ Security Tools • 400+ AI Models


 


Achievements & Recognition

11
CVEs in MITRE
3
Exploit-DB
3
Google Dorks
4x
Google HoF
6x
Apple HoF
200+
Apps Secured
Top 25
Yogosha
Expand Full Achievement Tree
ACHIEVEMENT LOG
│
├── CVE Research
│   ├── 11 CVEs published in MITRE (incl. CVE-2020-35270, CVE-2023-31650)
│   ├── 3 Exploits published in Exploit-DB
│   └── 3 Google Dorks published in Google Hacking Database (GHDB)
│
├── Bug Bounty
│   ├── HackerOne · Ranked #2 in Ireland
│   ├── Yogosha · Top 25 All-Time | Top Hacker at RootedCon & GISEC 2022
│   └── Active researcher across multiple platforms
│
├── Vendor Recognition
│   ├── Google · 4x Recognized (incl. Business Logic Flaw in Acquisition)
│   ├── Apple · 6x Recognized
│   └── State of Nevada (Gov) · F5 BIG-IP CVE-2020-5902 Appreciation
│
├── Open Source & Community
│   ├── Creator & Dev Lead · PWNCLOUDOS (3,000+ users)
│   ├── Maintainer & Lead Security Researcher · RedAmon (1.6K+ ★, 300+ forks)
│   ├── Contributor · Nuclei Templates (ProjectDiscovery)
│   ├── Author · PwnedLabs.io Security Labs (CloudFox, Inspector, VirusTotal)
│   └── Technical Reviewer · AWS Security Guide (BPB Publication)
│
└── Publications
    ├── Medium · CVE write-ups & security research (143+ followers)
    └── InfoSec Write-ups · Featured articles

Tech Arsenal

Languages  

Offensive  

Cloud Attack  

Mobile  

Infrastructure  


Featured Projects


GitHub Stats

Stats Streak



Languages



Trophies
Graph

github-snake

Recent Research & Write-ups

Date Title Where
2022 Softr 2.0 — Stored XSS via First Name Injection Medium
2021 WordPress ATO — 4-Digit Bounty in 5 Minutes Medium
2021 Textpattern CMS v4.8.4 — Stored XSS (Body) Medium
2021 Employee Perf Eval 1.0 — Persistent XSS Medium
2020 Business Logic Flaw in Google Acquisition InfoSec Write-ups
2020 Google Dork in GHDB #6300 Exploit-DB


Let's Connect

   


"Don’t stop until you’re satisfied"

Pinned Loading

  1. pwnedlabs/pwncloudos pwnedlabs/pwncloudos Public

    PWNCLOUDOS

    Python 47 8