Skip to content
View shreyash2002's full-sized avatar
🏡
Working from home
🏡
Working from home

Highlights

  • Pro

Block or report shreyash2002

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
shreyash2002/README.md

👋 Hi, I’m Shreyash Chauhan

🔐 Cybersecurity Researcher | 📡 RF & IoT Security | 🦀 Rust Developer | 🎓 M.Tech Cybersecurity

I work at the intersection of network security, IoT, RF analysis, and applied security research.
My focus is on building, breaking, and understanding real systems — not just theory.


🧠 What I’m Interested In

  • IoT & RF Security

    • Passive RF analysis of IoT devices
    • Protocol behavior fingerprinting
    • SDR-based monitoring (HackRF, ESP32, Wi-Fi, BLE)
  • Network & Protocol Security

    • DNS tunneling, DoH/DoT anomaly detection
    • HTTP/2, gRPC, QUIC abuse & fingerprinting
    • Traffic analysis and lightweight IDS concepts
  • Offensive Security & Research

    • Post-exploitation tooling concepts
    • Modular pentesting utilities
    • Threat modeling & attack simulation
  • Systems & Low-Level Work

    • Rust for security tooling
    • Custom parsers & fuzzers
    • Performance-focused design

🧪 Academic & Research Goals

  • Writing research-grade security projects
  • Publishing papers in network & IoT security
  • Preparing for PhD / research-focused roles
  • Building tools that demonstrate depth, not demos

🏋️ Beyond Tech

  • 🤸 Handstand & Calisthenics
  • 🏸Badminton & Football⚽

📫 Let’s Connect


“Understand the system deeply enough that exploitation and defense both become obvious.”

Pinned Loading

  1. threat-intel-fetcher threat-intel-fetcher Public

    The Threat Intelligence Fetching Script is a versatile Python tool designed to effortlessly retrieve threat intelligence feeds from specified URLs while ensuring security and flexibility. With rea…

    Python 1

  2. keylogger-python keylogger-python Public

    Forked from CSCult/keylogger-python

    Python

  3. blockchain-fundamentals-python blockchain-fundamentals-python Public

    Python

  4. CSCult/keylogger-python CSCult/keylogger-python Public

    Python 3

  5. email-header-analysis email-header-analysis Public

    ython script to automate email header inspection for phishing analysis. Extracts From, Reply-To, and Return-Path fields, validates SPF/DKIM alignment, and identifies suspicious forwarding chains.

    Python

  6. mini-log-correlator mini-log-correlator Public

    a log analysis script that correlates system authentication logs and web server access logs based on IP and timestamp. Helps detect staged attacks like reconnaissance followed by login attempts.

    Python