Skip to content
View Aviral2642's full-sized avatar

Highlights

  • Pro

Block or report Aviral2642

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aviral2642/README.md

πŸ‘Ύ Aviral Srivastava β€” Cybersecurity Engineer | Offensive AI Researcher | Red Teamer

Cyberpunk Header

Typing SVG

---

πŸ… RSA Security Scholar 2025

Honored to be selected as a 2025 RSA Security Scholar, representing the intersection of AI, cybersecurity, and red teaming at one of the world’s premier security conferences.


🎯 Status Console

Status Access Level CPU Load Location

🧩 Expertise

  • πŸ› οΈ Offensive Security | Adversary Emulation | Red Teaming
  • πŸ” Symbolic Execution | Fuzzing | Malware Analysis
  • πŸ€– AI x Cybersecurity | Adversarial ML | Secure LLMs
  • 🧠 Cryptography | CTF Automation | Secure Coding
  • ☁️ Cloud Security | DevSecOps | Governance, Risk & Compliance (GRC)

πŸ”¬ Research Publications

  • πŸ“˜ ICLR 2025 Submission: The Fundamental Limits of LLM Unlearning: Complexity-Theoretic Barriers and Provably Optimal Protocols
  • 🧠 Crypto CTF Generation using LLMs β€” AI-powered challenge generation for security education (MS Thesis)
  • πŸ”„ D-POM (Dynamic Path Obfuscation & Monitoring) β€” Research on runtime anti-fuzzing systems

πŸš€ Projects

  • 🎯 ZeroDayForge β€” Full-spectrum adversary emulation and exploit automation tool
  • πŸ› οΈ Adversary Emulation Framework β€” Real-world attack simulation based on MITRE ATT&CK
  • πŸ”“ AI for Red Teaming β€” Automated payload crafting, recon parsing, and LLM exploitation
  • πŸ§ͺ Live Terminal CTF Engine β€” Hollywood-style hacker simulator with interactive panels

🎀 Invited Talks

  • BSidesChicago 2024
    Hacking Neural Networks: The Hidden Vulnerabilities of AI Systems

  • BSidesSLC 2025
    Filling Gaps in AI Governance: How ISO/IEC 42001 Shapes the Future of AI Risk and Compliance

  • CactusCon 13 (2025)
    Weaponizing AI: Adversarial Attacks, Hallucinations, and the Offensive Security Frontier

  • Cyphercon 2025
    Deceiving the Deceivers: Offensive Security Strategies for Adversarial AI Attacks


πŸ’Ό Experience

  • πŸ” Security Engineer – AMAZON (2025–Present)
    Red Team Automation, Application security, Secure Coding

  • πŸ§ͺ Security Internships (6x)
    Malware Reverse Engineering, Secure DevOps, GRC

  • πŸ§‘β€πŸ« Teaching Assistant – Red Teaming, CTFs
    Led offensive security labs and workshops at Penn State


πŸŽ“ Education

  • πŸŽ“ MS in Cybersecurity analytics and operations – Penn State University
    GPA:3.9 | Research Assistant | RSA Scholar
    Thesis: AI-Generated Cryptographic CTF Challenges

  • πŸŽ“ BTech in Computer Science – Amity University
    Focus: Cryptography, Secure Systems, Network Security


πŸ† Awards & Recognition

  • πŸ₯‡ RSA Security Scholar 2025
  • πŸ… Cybersecurity Innovator of the Year β€” Bsides
  • πŸŽ™οΈ Speaker: RSA, HOPE XV, CypherCon, CactusCon
  • 🌍 HackTheBox PRO HACKER β€” Global Rank: Top 200 | πŸ‡ΊπŸ‡Έ Rank: #24
    HTB Badge
    πŸ”— View HTB Profile

🧠 GitHub Stats & Cyber Widgets


πŸ‘½ Cyber-Terminal Visuals (Coming Soon)

  • ⚑ Interactive Terminal Portfolio
  • 🌐 3D Live Globe for Threat Visualization
  • πŸŽ›οΈ LLM Exploit Auto-Crafter
  • πŸ›°οΈ Recon Parser for Red Team AI Systems

πŸ’¬ β€œThe more they secure, the more we exploit. The future belongs to offensive AI.”

Popular repositories Loading

  1. kernelghost kernelghost Public

    KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hypervisor escape techniques. It enables persistent cross-VM acces…

    C 17 1

  2. AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors AI-Attack-Mind-Map-Comprehensive-AI-Security-Threats-Attack-Vectors Public

    The world’s most detailed AI Attack Mind Map covering LLMs, RAG, Agentic AI, RL, diffusion, MLOps, federated learning, and hardware side-channels.

    5

  3. Polymorphic-Shellcode-Engine Polymorphic-Shellcode-Engine Public

    A next-generation engine for generating metamorphic shellcode payloads with built-in evasion capabilities, designed for red team operations and penetration testing.

    Python 3

  4. adversary-emulation-framework adversary-emulation-framework Public

    A fully functional Adversary Emulation Framework built to simulate real-world threat actor behavior using MITRE ATT&CK techniques. Supports both real-mode execution and testing, allowing security p…

    Python 1

  5. ZeroDayForge ZeroDayForge Public

    An advanced red team exploitation framework featuring payload generation, direct syscall injection, protocol fuzzing, and memory manipulation. Built for real operators.

    Python 1

  6. FNcyber_malware_test FNcyber_malware_test Public

    C#