Skip to content
View Egyan07's full-sized avatar
:electron:
On vacation
:electron:
On vacation

Block or report Egyan07

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Egyan07/README.md

Typing SVG


Profile views   GitHub followers   Tests Written   Tools Shipped   Self Taught


About Me

I design, build, test, secure, and ship production-grade security tools, automation platforms, and commercial SaaS products — entirely self-directed, without a formal engineering mandate.

By day I work in IT & Self-Assessment at Red Parrot Accounting (UK). In practice I've shipped 10+ tools that didn't exist before I built them: from SOC 2 compliance platforms to Active Directory attack detectors to TLS fingerprinting tools written in Go.

My degree is in Business Management, not CS — everything technical is self-taught. I approach security from both sides: I build the attack demo and the detector. I write 1,600+ tests because I hold myself to a standard nobody asked for.

  • Built 6 security tools covering AD, TLS, IOCs, backups, and compliance
  • 90% backend test coverage on GhostBackup (744+ tests)
  • Zero-dependency architecture wherever the stdlib is sufficient
  • Documents limitations honestly — before you find out yourself


Stats & Activity

Top Langs


GitHub Streak


Contribution Activity Graph

Tech Stack

Languages

Python TypeScript Go JavaScript C PowerShell SQL


Backend & Data

FastAPI SQLAlchemy PostgreSQL SQLite Supabase

Frontend & Desktop

React Electron Tailwind CSS Vite shadcn/ui

Security & DevOps

Docker GitHub Actions CodeQL Nginx Ed25519 AES-256-GCM


Projects

Security & Compliance

ComplianceGuard v2.9.0

SOC 2 compliance automation platform. Runs as Electron desktop app or self-hosted web app. Scores against 29 SOC 2 controls, generates PDF reports, Ed25519 offline licensing.

Tests Status

FastAPI React 18 Electron PostgreSQL Docker Ed25519

GhostBackup v3.4.0

AES-256-GCM streaming encryption, per-file nonce, HKDF salt, dual-SSD redundancy, delta detection, 7-year retention, xxhash integrity, React dashboard.

Tests Status

Python FastAPI React Electron SQLite AES-256-GCM

PhantomEye v1.3

Zero-dependency threat intelligence. 8 IOC feeds, 40,000+ indicators, O(1) lookup, firewall log scanning, DNS cache analysis, IP geolocation. CodeQL on every push.

Tests Status

Python (stdlib only) SQLite Tkinter CodeQL SAST

GhostSecure v2.1.2

Real-time Active Directory attack detection. 7 detectors: Kerberoasting, Pass-the-Hash, DCSync, Golden Ticket, LDAP Recon, AS-REP Roasting, Skeleton Key. Runs as Windows Service.

Tests Status

Python pywin32 Windows Service SQLite LDAP/GSSAPI

ViperFin v1.1.1

JA3/JA3S TLS fingerprinting in Go. Parses raw ClientHello from the wire. 22-signature threat database: Cobalt Strike, Emotet, TrickBot. GREASE filtering per RFC 8701.

Status

Go (stdlib only) TLS RFC 8701 Cross-platform

VaultSentry v1.0.1

Backup integrity monitoring. SHA-256 baseline hashing, Shannon entropy ransomware detection, snapshot diffing, restore engine, daily HTML digest email, dark-mode GUI.

Tests Status

Python SQLite Tkinter Shannon Entropy

Internal Platform & Utilities

Accounting Automation Platform (UK Accounting Firm)

Multi-module internal web platform: AI-powered bank statement converter (PDF→Excel), HMRC letter interpreter, holiday tracker with approval workflows, staff operations dashboard.

Status

React 18 Supabase Claude API Gemini TypeScript shadcn/ui

Win32 Keylogger/Detector (Educational)

Dual-program demo: 10 Win32 APIs for keyboard capture (attacker perspective) + companion detector showing how AV/EDR tools detect the technique (defender perspective). Cross-compiled from Kali Linux.

Status

C Win32 API MinGW Cross-compilation


Engineering Metrics


Philosophy

class Engineer:
    def __init__(self):
        self.tests      = "if it's not tested, it's not done"
        self.docs       = "document limitations before users find them"
        self.security   = "build the attack to understand the defense"
        self.execution  = "don't wait for a mandate — identify the risk, ship the fix"
        self.deps       = "stdlib first; every dependency is a supply chain decision"

Currently Exploring

  • Hardening Electron apps against modern attack surfaces (process isolation, CSP, update signing)
  • Building offline-first cryptographic licensing systems that don't phone home
  • Porting Windows-first security tools to macOS and Linux without losing native depth
  • Open-core SaaS pricing models for security tooling — where the line between free and paid actually sits
  • How EDR/XDR products detect the techniques I build demos for

For serious inquiries, reach out via GitHub or email.

GitHub   Email

snake animation

Pinned Loading

  1. ComplianceGuard ComplianceGuard Public

    SOC 2 Type II compliance automation that runs on your endpoint — not in the cloud. 29 controls, PDF reports, offline Electron app or self-hosted Docker. Free tier.

    Python 1

  2. GhostBackup GhostBackup Public

    Secure automated backup for Windows with AES-256-GCM encryption, dual-SSD redundancy, 7-year compliance retention, and real-time file watching. Built with Electron + React + FastAPI.

    Python 3

  3. PhantomEye PhantomEye Public

    A free Windows threat intelligence platform that checks your network activity against 40,000+ malicious IPs and domains from 8 live OSINT feeds. Features firewall log scanning, DNS cache monitoring…

    Python 1

  4. ViperFin ViperFin Public

    JA3/JA3S TLS fingerprinting tool written in Go. Identifies what software is making TLS connections by parsing raw ClientHello messages — detects browsers, scanners, pentest frameworks, and malware …

    Go 1

  5. VaultSentry VaultSentry Public

    VaultSentry monitors your backup files nightly, hashing every file, detecting tampering, ransomware encryption, corruption, missing files, and sudden size drops. Save named snapshots at any point i…

    Python 1

  6. GhostSecure GhostSecure Public

    Windows service that monitors Active Directory in real time and alerts on 8 live attack techniques — Kerberoasting, Pass-the-Hash, DCSync, Golden Ticket, LDAP Recon, AS-REP Roasting, Skeleton Key, …

    Python 2