Skip to content
View ShettyShreyasR's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report ShettyShreyasR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ShettyShreyasR/README.md

👋 Hi, I'm Shreyas

MSc Cybersecurity Student    ·  Security Researcher ·  AI-ML


🧑‍💻 About Me I'm Shreyas, a postgraduate student pursuing an MSc in Cybersecurity at Newcastle University, UK, with a strong technical foundation spanning full-stack development, machine learning, and security engineering. My work sits at the intersection of building and breaking I'm equally comfortable architecting robust web applications as I am analysing vulnerabilities, reverse engineering binaries, or probing network protocols. My current research investigates the dynamics of hallucination propagation in multi-agent LLM collaboration, exploring how factual errors cascade and amplify across networks of cooperating language models a problem with significant implications for the trustworthiness of AI systems in high-stakes environments. My broader research interests span AI-driven threat detection, digital forensics, and the evolving landscape of offensive security techniques. I approach cybersecurity not just as a discipline but as a mindset — one that demands curiosity, rigour, and a commitment to staying ahead of an ever-changing threat environment.

  • 🔐 Passionate about offensive & defensive security, threat modelling, and secure system design
  • 🌐 Experienced in full-stack development — from APIs to polished front-end interfaces
  • 🤖 Interested in the intersection of machine learning and cybersecurity (anomaly detection, malware analysis, adversarial ML)
  • 📖 Actively involved in security research — reading papers, writing up findings, and exploring novel attack surfaces
  • 🛠️ Always building: labs, tools, write-ups, and proofs of concept

🛡️ Cybersecurity Skills

Penetration Testing       Network Security        
Vulnerability Analysis    Cryptography           
Malware Analysis          Secure Code Review          
CTF Challenges                 

Tools & Frameworks: Kali Linux Burp Suite Wireshark Metasploit Nmap


💻 Development Stack

Languages

Python JavaScript

C

Frontend

React HTML5 CSS3

Backend & DevOps

Node.js Docker Linux

Machine Learning

PyTorch scikit-learn Pandas


🔬 Research Interests

  • 🧠 AI/ML Security — adversarial attacks, model robustness, and ML-based threat detection
  • 🕵️ Digital Forensics & Incident Response — memory forensics, log analysis, artifact recovery
  • 🌐 Web & Network Security — application vulnerabilities, protocol analysis, traffic inspection
  • 🔒 Cryptography & Privacy — applied cryptographic protocols, privacy-preserving computation
  • 📡 Threat Intelligence — OSINT methodologies, attribution, and adversary profiling

📫 Get in Touch


"Security is not a product, but a process." — Bruce Schneier

Popular repositories Loading

  1. Private Private Public

    My projects

    Jupyter Notebook 1

  2. Dynamics-of-Hallucination-Propagation Dynamics-of-Hallucination-Propagation Public

    A secure multi-agent LLM collaboration framework featuring decentralized reputation scoring and tamper resistant audit logging on a local Ethereum test chain

    Jupyter Notebook 1

  3. Peojects Peojects Public

    CSS

  4. ShettyShreyasR ShettyShreyasR Public

  5. Data-Innovation-BootCamp Data-Innovation-BootCamp Public

  6. rag-observability-pro rag-observability-pro Public

    Hardened RAG pipeline with Llama 3.2 (3B) & Arize Phoenix. Features 4-bit Unsloth optimization, OpenTelemetry auditing, and a KV-cache stability patch for T4 GPUs. P99 Latency: 19.2s.

    Python