MSc Cybersecurity Student · Security Researcher · AI-ML
🧑💻 About Me I'm Shreyas, a postgraduate student pursuing an MSc in Cybersecurity at Newcastle University, UK, with a strong technical foundation spanning full-stack development, machine learning, and security engineering. My work sits at the intersection of building and breaking I'm equally comfortable architecting robust web applications as I am analysing vulnerabilities, reverse engineering binaries, or probing network protocols. My current research investigates the dynamics of hallucination propagation in multi-agent LLM collaboration, exploring how factual errors cascade and amplify across networks of cooperating language models a problem with significant implications for the trustworthiness of AI systems in high-stakes environments. My broader research interests span AI-driven threat detection, digital forensics, and the evolving landscape of offensive security techniques. I approach cybersecurity not just as a discipline but as a mindset — one that demands curiosity, rigour, and a commitment to staying ahead of an ever-changing threat environment.
- 🔐 Passionate about offensive & defensive security, threat modelling, and secure system design
- 🌐 Experienced in full-stack development — from APIs to polished front-end interfaces
- 🤖 Interested in the intersection of machine learning and cybersecurity (anomaly detection, malware analysis, adversarial ML)
- 📖 Actively involved in security research — reading papers, writing up findings, and exploring novel attack surfaces
- 🛠️ Always building: labs, tools, write-ups, and proofs of concept
Penetration Testing Network Security
Vulnerability Analysis Cryptography
Malware Analysis Secure Code Review
CTF Challenges
Tools & Frameworks:
Kali Linux Burp Suite Wireshark Metasploit Nmap
Languages
Frontend
Backend & DevOps
Machine Learning
- 🧠 AI/ML Security — adversarial attacks, model robustness, and ML-based threat detection
- 🕵️ Digital Forensics & Incident Response — memory forensics, log analysis, artifact recovery
- 🌐 Web & Network Security — application vulnerabilities, protocol analysis, traffic inspection
- 🔒 Cryptography & Privacy — applied cryptographic protocols, privacy-preserving computation
- 📡 Threat Intelligence — OSINT methodologies, attribution, and adversary profiling
"Security is not a product, but a process." — Bruce Schneier