Skip to content
View yash2121ja's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report yash2121ja

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
yash2121ja/README.md
β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—
β•šβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
 β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘
  β•šβ–ˆβ–ˆβ•”β•  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘
   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
   β•šβ•β•   β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•

Typing SVG


LinkedIn GitHub Email


πŸ’€ About Me

β”Œβ”€β”€(yashγ‰Ώkali)-[~]
└─$ cat about.txt

> Name    : Yash
> Role    : DevOps & Security Engineer
> Focus   : Cloud Infrastructure Β· CI/CD Β· ISO 27001 Β· SOC 2
>           OSINT Β· Recon Β· DevSecOps Β· Compliance Automation
> Status  : Building AI-powered compliance tooling
> Motto   : "Know the system. Break the assumptions. Secure everything."
> OpenTo  : DevSecOps collabs Β· Security automation Β· Red team tooling

β”Œβ”€β”€(yashγ‰Ώkali)-[~]
└─$ β–ˆ

πŸ› οΈ Tech Stack

☁️ Cloud & Infrastructure

AWS Azure GCP Terraform Kubernetes Docker

πŸ”„ CI/CD & Automation

GitHub Actions Jenkins ArgoCD Ansible Helm

πŸ” Security & Compliance

ISO 27001 SOC 2 SAST Vault Snyk Trivy

πŸ“Š Monitoring & Observability

Prometheus Grafana ELK Stack

πŸ’» Languages & Scripting

Python Bash PowerShell YAML


⚑ Arsenal β€” Featured Projects

[*] Scanning target repositories... 8 found
[+] Loading payloads...

[COMPLIANCE] AI-powered ISO 27001 & SOC 2 policy framework β€” 27 policies, GROQ AI generation, auto-export to Word/PDF

  • 27 policy templates covering full ISMS documentation
  • GROQ AI integration for policy generation & editing via plain-English prompts
  • Auto-export to Word (.docx) and PDF
  • Company profile onboarding β€” all policies branded automatically
  • Control mappings across ISO 27001:2013, ISO 27001:2022, and SOC 2 TSC
# Generate a complete policy in seconds
python generate_policy.py --policy "Access Control Policy" --framework iso27001

# Edit any policy with a natural-language instruction
python edit_policy.py --policy "access_control" --instruction "add a Zero Trust section"

# Generate ALL 27 policies at once
python generate_policy.py --all

Python AI ISO27001 SOC2 MIT License

πŸ” Port-Scanner

[RECON] Python-based network recon tool for bulk IP / subnet scanning

  • Scans lists of IPs and CIDR subnets for open ports 80 & 443
  • Reverse DNS lookup β€” maps IPs back to domain names automatically
  • CSV-friendly output for reporting and triage workflows

Python Networking Recon

[OSINT] Automated subdomain enumeration via SecurityTrails API

  • Discovers all subdomains of a target domain using SecurityTrails
  • Useful for attack surface mapping and external asset inventory
  • Clean output for piping into further recon tooling

Python OSINT Recon

[OSINT] Certificate Transparency log harvester using crt.sh

  • Queries crt.sh for SSL/TLS certificate records by domain or org
  • Exports results to Excel (.xlsx) for analysis and reporting
  • Useful for discovering shadow IT, expired certs, and org exposure

Python CertTransparency Excel

πŸ›‘οΈ Security-scan

[BLUE TEAM] TypeScript-based automated security scanning toolkit

TypeScript Security

[DEVSECOPS] Production-ready GitHub Actions pipeline β€” drop into any repo for instant security scanning

  • 6-stage pipeline: Secret scanning (Gitleaks), SAST (Semgrep OWASP Top 10), SCA (Trivy), Container scan, IaC scan, Security summary
  • SARIF output uploaded to GitHub Security tab on every run
  • Full config for Semgrep custom rules, Trivy severity thresholds, Gitleaks allowlists
  • Python CLI parse_results.py for colored severity tables and CI exit-code control
# Drop into your repo β€” security scanning runs on every push
cp -r devsecops-pipeline-template/.github/workflows/ .github/workflows/
cp -r devsecops-pipeline-template/configs/ configs/

GitHub Actions Trivy Semgrep Gitleaks MIT License

[BLUE TEAM] Convert Trivy JSON scan output into an interactive HTML report with severity charts β€” zero dependencies

  • Parses Trivy JSON from filesystem, container image, or Kubernetes scans
  • Interactive severity bar charts (Chart.js), filterable CVE table, misconfiguration table
  • Auto-computed risk rating (CRITICAL / HIGH / MEDIUM / LOW) from scan results
  • Dark-theme dashboard, single self-contained HTML file output
  • Zero pip dependencies β€” pure Python stdlib + CDN Chart.js
# Scan a container and generate dashboard in one command
trivy image nginx:latest --format json --output trivy.json
python dashboard.py --input trivy.json --open

Python Trivy ChartJS Zero Deps MIT License


🎯 Core Competencies

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                                                                 β”‚
β”‚  DevOps          β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘  95%                    β”‚
β”‚  Cloud (AWS/GCP) β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘  90%                    β”‚
β”‚  Kubernetes      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  85%                    β”‚
β”‚  ISO 27001       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘  95%                    β”‚
β”‚  SOC 2           β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘  90%                    β”‚
β”‚  DevSecOps       β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘  95%                    β”‚
β”‚  IaC (Terraform) β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘  85%                    β”‚
β”‚  Python          β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘  90%                    β”‚
β”‚                                                                 β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”΄ Security Philosophy

[*] Initializing threat model...
[+] Loading attack surface...
[!] Rules of engagement:

"Know the system. Break the assumptions. Secure everything."

  • [SHIFT LEFT] β€” Security baked into every stage of the pipeline, not bolted on at the end
  • [COMPLIANCE AS CODE] β€” Policy frameworks automated, version-controlled, AI-generated
  • [ZERO TRUST] β€” Never trust, always verify, continuously validate
  • [DEFENSE IN DEPTH] β€” Layers of controls across people, process, and technology
  • [OSINT FIRST] β€” Know your attack surface before the attacker does

οΏ½ Contribution Graph

Snake animation


οΏ½πŸ“¬ Let's Connect

I'm always open to discussing DevSecOps, cloud security architecture, ISO 27001 / SOC 2 implementation, or interesting open-source collaboration.

LinkedIn GitHub


Profile Views

[+] Session established.
[+] Stay curious. Stay ethical. Keep hacking.
[*] EOF

Popular repositories Loading

  1. isms-soc2-policy-templates isms-soc2-policy-templates Public

    ISO 27001 & SOC 2 policy templates with AI-assisted generation, export to Word/PDF, and version control

    Python 1 1

  2. yash yash Public

    Java 1

  3. CRT.SH-Data-Retrieval-Tool CRT.SH-Data-Retrieval-Tool Public

    This is a Python script that retrieves data from https://crt.sh/ using a user-specified query, and saves the retrieved data to an Excel file.

    Python

  4. Port-Scanner Port-Scanner Public

    This is a Python script that scans a list of IP addresses and subnets for open ports 80 and 443. It also retrieves the domain name for each IP address.

    Python

  5. subdomain-enum subdomain-enum Public

    Forked from chaitanyakrishna/subdomain-enum

    Subdomain Enumeration using Securitytrails API

    Python

  6. yash2121ja yash2121ja Public

    GitHub profile README