Skip to content
View Lightsaber2's full-sized avatar

Block or report Lightsaber2

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Lightsaber2/README.md

πŸ‘‹ Hi, I'm Yash

πŸŽ“ Cybersecurity student | πŸ”΄πŸ”΅ Red & Blue Team Fundamentals | 🧠 Builder at heart | πŸ’» Ethical Hacker

I'm a cybersecurity student with strong fundamentals across offensive and defensive security, currently working through my CEH certification while building hands-on, Python-based security tools.

I care less about buzzwords and more about why systems fail β€” and how to design tools that surface those failures clearly.


πŸ”— Connect with me

GitHub Instagram Email


πŸ›‘οΈ Core Security Focus

Network Security Web Security Vulnerability Assessment Penetration Testing Attack Surface Analysis Ethical Hacking Threat Modeling


πŸ”­ Currently working on

  • Improving and refactoring existing Python-based security tools
  • Writing new security tools from scratch with a focus on clarity and usefulness
  • Actively preparing for and working through CEH certification labs

🌱 Currently learning

  • CI/CD fundamentals and secure deployment practices
  • Blue team concepts: logging, alerts, and monitoring
  • Deeper understanding of real-world web vulnerabilities beyond theory
  • Python project architecture and clean, maintainable code

🧰 Tech Stack

Languages

Python Java SQL SQLite


Security Tools

  • Nmap, Shodan, Nessus, OpenVAS, Nikto, Vega, Netcraft
  • Metasploit, BeEF, Mimikatz
  • Burp Suite, Wireshark, Hetty
  • John the Ripper, Hydra, Ophcrack, Cain & Abel
  • Ettercap, Bettercap, Netcat, Macof, ISB
  • Aircrack-ng

Development & OS

Git GitHub Linux Windows


🀝 Collaboration & Open Source

I’m focused on long-term open-source growth and appreciate:

  • Constructive feedback on my tools
  • Design discussions around security tooling
  • Guidance from people further along the security journey

If a project interests you, feel free to open an issue or reach out.


β€œThe best way to secure a computer is to turn it off and never power it on.”

Pinned Loading

  1. AttackSurfaceX AttackSurfaceX Public

    Nmap-powered attack surface monitor tracking network changes over time. Detects newly exposed services, assigns risk scores, stores scan history in SQLite. Built for continuous security monitoring.

    Python 1

  2. reconfox reconfox Public

    Enterprise-grade vulnerability scanner with anti-detection stealth mode. Detects SQLi, XSS, misconfigurations in <2min. Built with parallel processing, adaptive timing & modular architecture. Free,…

    Python 1

  3. password_strength_analyzer password_strength_analyzer Public

    Flask web app analyzing password strength with entropy calculation, dictionary checks, and breach verification via HaveIBeenPwned API. Real-time feedback with visual strength indicators and dark mode.

    Python 1

  4. security-checker security-checker Public

    PowerShell