Pixel Poisoning: Hacking Generative AI
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumDedicated third-year BTech CSE student with expertise in Cybersecurity, VAPT, and Cryptography, backed by global certifications. Skilled in problem-solving and innovation, seeking a role to enhance organizational security through advanced assessment and defense strategies.
I am a passionate Cybersecurity professional with a strong focus on Vulnerability Assessment and Penetration Testing. My expertise extends to cryptography, secure coding practices, and network security.
Currently pursuing my BTech in Computer Science Engineering, I am constantly expanding my knowledge and skills in the rapidly evolving field of information security.
All in One Crypto Solution with a self-developed ShadowHash Algorithm, offering encryption, breach detection, password generation, hash creation, comparison and malware scanning across 28 webpages.
Robust cryptographic key generator built in Java, utilizing PBKDF2, XOR operations, and multi-layered encryption (AES, 3DES, Blowfish) to generate secure, unpredictable keys for encryption.
Adversarial image obfuscation tool that generates ghost images using noise injection, edge distortion, metadata poisoning, and watermarking to prevent unauthorized use in AI training.
A steganography tool enabling users to hide and extract secret messages from images, featuring command-line interface, interactive mode, and lightweight encoding/decoding. Available on PyPI.
Python-based reverse shell for ethical hacking and penetration testing, offering persistence, keylogging, screenshot capture, file transfer, and stealth remote control over compromised systems.
A collection of Bash and PowerShell scripts for automating AWS tasks, including CLI setup, S3, EC2, and DynamoDB management, streamlining cloud operations for Linux and Windows users.
Terraform scripts for deploying Amazon Linux 2023 and Windows Server 2019 instances on AWS, ensuring Free Tier eligibility with automated security groups, key pairs, storage setup, and web server configurations.
CGPA: 8.36
Percentage: 89.8%
Percentage: 94.8%
EC-Council
CompTIA
IIT Kanpur (Capstone Projects)
NPTEL
Qualys
Cisco NetAcad
Amazon Web Services
Postman
"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025
"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"
Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness
Secured Top 10 (Offline Category) in Hacknovate 5.0, May 2024, with Team API Alchemist at ABES IT, Ghaziabad
Ranked in the Global Top 2% on TryHackMe, showcasing expertise in cybersecurity, ethical hacking, and VAPT through solving advanced, real-world challenges
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumLearn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.
Read on MediumA comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.
Read on Medium