$ whoami
I'm Sanjok Karki π
>_ OffSec Engineer | Recon β’ Exploit Dev β’ Adversary Simulation. I move fast from signal to impact: automate recon, validate exploitability, and translate findings into fixes that stick. Since 2021, I've been recognized by Zoom, Amazon, Dell, NASA, the UN, Microsoft, and others for high-severity vulnerability disclosures.
"Companies spend millions of dollars on firewalls, encryption, and secure access devices, and it's money wasted β none of these measures address the weakest link in the security chain."β Kevin Mitnick
Effective security begins with understanding how real attackers think and operate. My approach focuses on identifying practical failure points across people, processes, and technologyβthen working with engineering teams to reduce risk through clear, actionable remediation.
VAPT
Vulnerability Assessment & Penetration Testing
End-to-end security evaluation combining automated vulnerability scanning with deep manual penetration testing.
Code Review
Security Code Review
Line-by-line analysis of your codebase to identify security flaws and logic vulnerabilities.
Red Team
Red Team Operations
Real-world adversary simulation to test your organization's defenses.
Bug Bounty
Bug Bounty Consulting
Expert assistance in setting up and managing bug bounty programs.
//Offensive Security
- βWeb Application Security Testing
- βAPI Security Assessment
- βMobile Application Security (Android / iOS)
- βNetwork & Infrastructure Security
- βCloud Security (AWS / Azure)
- βMalware & Binary Analysis
//Reconnaissance & OSINT
- βAttack Surface Management
- βPassive & Active Reconnaissance
- βAsset & Subdomain Discovery
- βCloud & GitHub Exposure Analysis
//Tooling & Arsenal
- βBurp Suite Pro, Caido, ZAP
- βPostman, Insomnia, GraphQL Playground
- βMetasploit Framework, Wireshark
- βCobalt Strike
- βNessus, Acunetix
- βFrida, Objection, MobSF, Drozer
- βGhidra, IDA Pro
//Development & Scripting
- βPython (Exploit Development & Automation)
- βBash (Recon & Workflow Automation)
- βGo (Security Tooling)
- βC / C++ (Reverse Engineering)
- βJavaScript (Client-Side & Logic Flaws)
- βPHP (Server-Side Security Testing)
Open to security consulting, research collaboration, and high-impact testing engagements.