Skip to content
View Aviral2642's full-sized avatar

Highlights

  • Pro

Block or report Aviral2642

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aviral2642/README.md

πŸ‘Ύ Aviral Srivastava β€” Cybersecurity Engineer | Offensive AI Researcher | Red Teamer

Cyberpunk Header

Typing SVG

---

πŸ… RSA Security Scholar 2025

Honored to be selected as a 2025 RSA Security Scholar, representing the intersection of AI, cybersecurity, and red teaming at one of the world’s premier security conferences.


🎯 Status Console

Status Access Level CPU Load Location

🧩 Expertise

  • πŸ› οΈ Offensive Security | Adversary Emulation | Red Teaming
  • πŸ” Symbolic Execution | Fuzzing | Malware Analysis
  • πŸ€– AI x Cybersecurity | Adversarial ML | Secure LLMs
  • 🧠 Cryptography | CTF Automation | Secure Coding
  • ☁️ Cloud Security | DevSecOps | Governance, Risk & Compliance (GRC)

πŸ”¬ Research Publications

  • πŸ“˜ ICLR 2025 Submission: The Fundamental Limits of LLM Unlearning: Complexity-Theoretic Barriers and Provably Optimal Protocols
  • 🧠 Crypto CTF Generation using LLMs β€” AI-powered challenge generation for security education (MS Thesis)
  • πŸ”„ D-POM (Dynamic Path Obfuscation & Monitoring) β€” Research on runtime anti-fuzzing systems

πŸš€ Projects

  • 🎯 ZeroDayForge β€” Full-spectrum adversary emulation and exploit automation tool
  • πŸ› οΈ Adversary Emulation Framework β€” Real-world attack simulation based on MITRE ATT&CK
  • πŸ”“ AI for Red Teaming β€” Automated payload crafting, recon parsing, and LLM exploitation
  • πŸ§ͺ Live Terminal CTF Engine β€” Hollywood-style hacker simulator with interactive panels

🎀 Invited Talks

  • BSidesChicago 2024
    Hacking Neural Networks: The Hidden Vulnerabilities of AI Systems

  • BSidesSLC 2025
    Filling Gaps in AI Governance: How ISO/IEC 42001 Shapes the Future of AI Risk and Compliance

  • CactusCon 13 (2025)
    Weaponizing AI: Adversarial Attacks, Hallucinations, and the Offensive Security Frontier

  • Cyphercon 2025
    Deceiving the Deceivers: Offensive Security Strategies for Adversarial AI Attacks


πŸ’Ό Experience

  • πŸ” Security Engineer – AMAZON (2025–Present)
    Red Team Automation, Application security, Secure Coding

  • πŸ§ͺ Security Internships (6x)
    Malware Reverse Engineering, Secure DevOps, GRC

  • πŸ§‘β€πŸ« Teaching Assistant – Red Teaming, CTFs
    Led offensive security labs and workshops at Penn State


πŸŽ“ Education

  • πŸŽ“ MS in Cybersecurity analytics and operations – Penn State University
    GPA:3.9 | Research Assistant | RSA Scholar
    Thesis: AI-Generated Cryptographic CTF Challenges

  • πŸŽ“ BTech in Computer Science – Amity University
    Focus: Cryptography, Secure Systems, Network Security


πŸ† Awards & Recognition

  • πŸ₯‡ RSA Security Scholar 2025
  • πŸ… Cybersecurity Innovator of the Year β€” Bsides
  • πŸŽ™οΈ Speaker: RSA, HOPE XV, CypherCon, CactusCon
  • 🌍 HackTheBox PRO HACKER β€” Global Rank: Top 200 | πŸ‡ΊπŸ‡Έ Rank: #24
    HTB Badge
    πŸ”— View HTB Profile

🧠 GitHub Stats & Cyber Widgets


πŸ‘½ Cyber-Terminal Visuals (Coming Soon)

  • ⚑ Interactive Terminal Portfolio
  • 🌐 3D Live Globe for Threat Visualization
  • πŸŽ›οΈ LLM Exploit Auto-Crafter
  • πŸ›°οΈ Recon Parser for Red Team AI Systems

πŸ’¬ β€œThe more they secure, the more we exploit. The future belongs to offensive AI.”

Popular repositories Loading

  1. kernelghost kernelghost Public

    KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hypervisor escape techniques. It enables persistent cross-VM acces…

    C 18

  2. AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors Public

    The world’s most detailed AI Attack Mind Map covering LLMs, RAG, Agentic AI, RL, diffusion, MLOps, federated learning, and hardware side-channels.

    5

  3. Polymorphic-Shellcode-Engine Polymorphic-Shellcode-Engine Public

    A next-generation engine for generating metamorphic shellcode payloads with built-in evasion capabilities, designed for red team operations and penetration testing.

    Python 3

  4. adversary-emulation-framework adversary-emulation-framework Public

    A fully functional Adversary Emulation Framework built to simulate real-world threat actor behavior using MITRE ATT&CK techniques. Supports both real-mode execution and testing, allowing security p…

    Python 1

  5. ZeroDayForge ZeroDayForge Public

    An advanced red team exploitation framework featuring payload generation, direct syscall injection, protocol fuzzing, and memory manipulation. Built for real operators.

    Python 1

  6. FNcyber_malware_test FNcyber_malware_test Public

    C#