Penetration Testing | Adversary Emulation | Secure SDLC | AppSec Automation
- Web & API security assessments aligned with OWASP (WSTG/ASVS/MASVS)
- Adversary emulation, attack path mapping, and purple-team style validation
- Tooling & automation for recon, session testing, JWT analysis, and reporting
- WSTG Session Tester — Python framework to evaluate session controls (timeout, fixation, JWT claims, CSRF, etc.).
- Recon Automator — Opinionated passive recon pipeline for authorized attack surfaces.
- Red Team Labs (Local) — Docker Compose to spin up legal practice targets (Juice Shop, DVWA).
- Report Templates — Clean, ATS-friendly pentest report and executive summary templates.
- Email: 0x52.null@gmail.com
- Website: 0x52sec.com (under construction)
- LinkedIn: https://www.linkedin.com/in/rahil-esnaashari/
Legal/Ethics: All research and code here are for learning and lawful testing with explicit authorization.