Z Z

Nihal Awasthi

Software Development Engineer

I'm a Software Developer and Cybersecurity Specialist with expertise in scalable backend systems, encryption technologies, and web application security.

3D avatar of Nihal Awasthi

About Me

terminal@nihal:~

(user㉿Nyx)-[~] $ whoami
Nihal Awasthi

(user㉿Nyx)-[~] $ cat Bio.txt
Currently pursuing Integrated M.Tech in Computer Science (Cyber Security) at VIT Bhopal.
Building real-world experience through professional roles in software development.

$

Education

Vellore Institute of Technology, Bhopal, India

Integrated M.Tech - Computer Science Engineering

Specialization in Cyber Security

Expected 2027

nihalawasthi498@gmail.com
+91 6350 486 317
0

Projects Led

0

Years Experience

0

Professional Roles

0

Workshops Organized

Extracurricular Achievement

  • Led a 15-member technical team at Cyber Warrior Club, organizing 8+ workshops on ethical hacking.
  • Top 0.005% globally — Ranked #47/1M+ participants in Advent of Code 2024.
  • Served as a judge for two 36-hour hackathons hosted by Eureka Club VITB and Cyber Warrior Club VITB.

Work Experience

Aug 2024 – May 2025

Software Development Engineer

MyResQR.life

  • Promoted from Intern to Part-Time SDE after a successful internship (6-month + 1-month extension).
  • Engineered scalable backend infrastructure using Python, Django, and RESTful APIs; deployed applications over AWS EC2.
  • Achieved 99.9% uptime for critical services during peak traffic.
Python Django RESTful APIs AWS EC2
Mar 2024 – Dec 2024

Full Stack Developer

Operation Smile Foundation, Delhi

Charity Work

  • Designed and developed a responsive website, increasing user engagement by 60% and donations by 25%.
  • Led technical initiatives and mentored junior developers in best practices and modern web technologies.
  • Enhanced website performance, increasing Lighthouse scores to 98 and reducing page load times by 40%.
React JavaScript HTML/CSS Performance Optimization
Apr 2023 - Dec 2024

FrontEnd Developer

Upwan Infra Pvt. Ltd.

Project intern

  • Designed and developed a responsive website, increasing user engagement by 60% and donations by 25%.
  • Led technical initiatives and mentored junior developers in best practices and modern web technologies.
  • Enhanced website performance, increasing Lighthouse scores to 98 and reducing page load times by 40%.
JavaScript HTML CSS Responsive Design

Key Additional Roles

(12+ positions)

Projects

Explore a selection of my recent projects showcasing expertise in cybersecurity, full-stack development, and application security.

Featured Project

Phablet

Python Encryption

A multilayered encryption protocol with AES-256 and RSA integration. Achieved 9ms encryption/11ms decryption times for data up to 1MB (95% faster than industry benchmarks).

AES-256 RSA Python Cryptography
phablet.up.railway.app
curl -X POST https://phablet.up.railway.app/signup \
-H "Content-Type: application/json" \
-d '{
"Username": "username",
"Email: "email",
"Password": "password",
}'

All Project

Security Python

AigesX

Vulnerability Detection System Ongoing

Automated vulnerability identification using fuzzing and symbolic execution; reduced manual analysis time by 60% with 85% accuracy.

Fuzzing Symbolic Execution Vulnerability Analysis Python
Project in progress 50%
Privacy UI/UX

PhantomSurf

Privacy-Focused BrowserOngoing

Developed a privacy-focused browser featuring an integrated proxy, real-time packet transfer monitoring, and a modern, sleek UI.

Browser Proxy UI/UX Privacy
Project in progress 75%
Open Source Python

Cryptographic Library

Open-source Python Library

Open-source Python library featuring over 50 encryption algorithm implementations; 5000+ views on GitHub.

Python Cryptography Library 5000+ Views
Project completed 100%
35+ Projects Completed
130+ Vulnerabilities Fixed
12 Open Source Contributions
99% Uptime Guarantee

Skills Matrix

Comprehensive technical skillset across multiple domains, with expertise in cybersecurity, programming, web development, and DevOps.

Network Security

Proficient in securing enterprise systems through firewalls, IDS/IPS, and traffic monitoring.

Wireshark Nmap Burp Suite Metasploit

Penetration Testing

Security assessments using ethical hacking tools and industry techniques.

Burp Suite Metasploit Nmap

Programming

Versatile across multiple languages with cryptography, backend, and automation expertise.

Python C C++ Java PowerShell Bash

Web Development

Built scalable web apps using modern frontend/backend stacks with responsive design.

ReactJS HTML/CSS/JS Django Flask REST APIs

Cloud & DevOps

Deployed services using cloud infrastructure and automated workflows with CI/CD.

AWS EC2 GitHub Actions PostgreSQL MySQL Git

Encryption & Cryptography

Custom-built libraries and secure protocols using hybrid encryption techniques.

AES-256 RSA Python Libs

Reverse Engineering

Analyzed software binaries and malware with static/dynamic methods and fuzzing.

Fuzzers Symbolic Execution

AI Tools

Leveraged generative AI platforms for enhanced productivity and intelligent features.

ChatGPT DeepSeek V0

Research Publications

Springer Nature BMC

Phablet Hashing Algorithm

This paper presents the Phablet Hashing Algorithm, a novel cryptographic hashing method designed to enhance security and efficiency.The algorithm integrates multiple encryption techniques, including block cipher and a custom encryption transformation, to provide robust protection against common cryptographic attacks.

Status: Published
ISBN: 978-3-031-87583-0

How to Cite

Nihal Awasthi. Chapter 123 Phablet Hashing Algorithm: Studies in Systems, Decision and Control, Vol. 587, Abdalmuttaleb M. A. Musleh Al-Sartawi et al. (Eds): Business Resilience and Business Innovation for Sustainability

Springer Nature BMC

Data Poisoning in Large Language Models

This research underscores the importance of growing robust safety mechanisms to make sure the safety and integrity of LLMs in real-global packages. By presenting a detailed evaluation of attack strategies and mitigation strategies, we aim to make a contribution to the persevering with efforts in securing tool analyzing models towards hostile threats.

Status: Published
ISBN: 978-3-031-87583-0

How to Cite

Nihal Awasthi. Chapter 168 Data Poisoning in Large Language Models: Studies in Systems, Decision and Control, Vol. 587, Abdalmuttaleb M. A. Musleh Al-Sartawi et al. (Eds): Business Resilience and Business Innovation for Sustainability

IEEE ICDCC'2024

Phablet: A Multi-Layered Encryption Protocol for Data Security

This paper introduces Phablet, an innovative multi-layered encryption protocol that combines AES-256 and RSA cryptographic algorithms to provide enhanced data security. The research demonstrates significant performance improvements, with 9ms encryption and 11ms decryption times for data up to 1MB - 95% faster than current industry standards.

Status: Under Review
Copyright ID: eCF Paper ID: 832712

<Contact/>

Secure transmission line established. Ready to receive your message.

Initiate Connection

Secure Channels

  • Email

    nihalawasthi498@gmail.com

  • Phone

    +91 (635) 048-6317

  • Location

    VIT Bhopal University

    Bhopal, MP India

System Uptime

  • Monday - Friday: 09:00 - 23:59 PST
  • Saturday: 10:00 - 23:59 PST
  • Sunday: Maintenance Mode
  • Emergency Support: 24/7/365
01001000 01100001 01100011 01101011 01100101 01110010 00100000 01000101 01110100 01101000 01101001 01100011 01110011