🛡️ Security Research Engineer 🛡️ PenTester 🛡️ Certified Ethical Hacker (CEH)
- @Linkedin:
https://www.linkedin.com/in/harshitaa-ashish-85767621a/ - @Website:
https://imharshitaa.github.io/root0zaki/ - @Medium:
https://medium.com/@imharshitaa - @Credly:
https://www.credly.com/users/harshitaa-ashish/badges#credly - @Bugcrowd:
https://bugcrowd.com/h/root0zaki
Modular security toolkit for building and integrating application security workflows
Repo: https://github.com/imharshitaa/toolkit
Stack: Security Automation, CLI Tools, Solution implementation,
Highlight: Provides reusable security utilities and modular components to accelerate security testing and tooling development
AI-assisted vulnerability detection and bug analysis system
Repo: https://github.com/imharshitaa/bugpilot
Stack: Python, LLMs, AI Security, Static Analysis
Highlight: Enhances bug discovery and triaging using AI-driven analysis to reduce manual effort and improve detection accuracy
CI/CD security scanning framework for DevSecOps pipelines
Repo: https://github.com/imharshitaa/DevSecKit
Stack: DevSecOps, GitHub Actions, SAST, SCA, Secrets, IaC, DAST, IAST
Highlight: Automates security checks and scans in pipelines with minimal setup and optimized workflow execution
Vulnerable application lab environment for security testing and exploitation practice
Repo: https://github.com/imharshitaa/playbox
Stack: Web Security, Docker, Vulnerable Apps, Pentesting Labs
Highlight: Provides controlled vulnerable scenarios for testing exploits, tools, and real-world attack techniques
AI-driven penetration testing assistant for automated security analysis
Repo: https://github.com/imharshitaa/AIvector
Stack: Python, LLMs, Offensive Security, Automation
Highlight: Uses AI to assist in attack surface analysis and vulnerability identification during penetration testing workflows
API security testing and penetration testing toolkit
Repo: https://github.com/imharshitaa/APIvector
Stack: API Security, REST, Python, Automation, OWASP API Top 10
Highlight: Focused on identifying API-specific vulnerabilities through automated testing and attack simulation techniques
- Application, API & Web Product Security
- Secure Code Development (Offensive & Defensive)
- Threat Intelligence & Research
- DevSecOps & Secure Automation workflows
- Open Source tools & Vulnerability analysis


