Z Z

Nihal Awasthi

Software Development Engineer

I'm a Software Developer and Cybersecurity Specialist with expertise in scalable backend systems, encryption technologies, and web application security.

Nihal Awasthi - Cybersecurity Expert and Full Stack Developer

About Me

terminal@nihal:~

(user㉿Nyx)-[~] $ whoami
Nihal Awasthi

(user㉿Nyx)-[~] $ cat Bio.txt
Currently pursuing Integrated M.Tech in Computer Science (Cyber Security) at VIT Bhopal.
Building real-world experience through professional roles in software development.

$

Education

Vellore Institute of Technology, Bhopal, India

Integrated M.Tech - Computer Science Engineering

Specialization in Cyber Security

Expected 2027

nihalawasthi498@gmail.com
+91 6350 486 317
0

Projects Led

0

Years Experience

0

Professional Roles

0

Workshops Organized

Extracurricular Achievement

  • Led a 15-member technical team at Cyber Warrior Club, organizing 8+ workshops on ethical hacking.
  • Top 0.005% globally — Ranked #47/1M+ participants in Advent of Code 2024.
  • Served as a judge for two 36-hour hackathons hosted by Eureka Club VITB and Cyber Warrior Club VITB.

Work Experience

Aug 2024 – May 2025

Software Development Engineer

MyResQR.life

  • Promoted from Intern to Part-Time SDE after a successful internship (6-month + 1-month extension).
  • Engineered scalable backend infrastructure using Python, Django, and RESTful APIs; deployed applications over AWS EC2.
  • Achieved 99.9% uptime for critical services during peak traffic.
Python Django RESTful APIs AWS EC2
Mar 2024 – Dec 2024

Full Stack Developer

Operation Smile Foundation, Delhi

Charity Work

  • Designed and developed a responsive website, increasing user engagement by 60% and donations by 25%.
  • Led technical initiatives and mentored junior developers in best practices and modern web technologies.
  • Enhanced website performance, increasing Lighthouse scores to 98 and reducing page load times by 40%.
React JavaScript HTML/CSS Performance Optimization
Apr 2023 - Dec 2024

FrontEnd Developer

Upwan Infra Pvt. Ltd.

Project intern

  • Designed and developed a responsive website, increasing user engagement by 60% and donations by 25%.
  • Led technical initiatives and mentored junior developers in best practices and modern web technologies.
  • Enhanced website performance, increasing Lighthouse scores to 98 and reducing page load times by 40%.
JavaScript HTML CSS Responsive Design

Key Additional Roles

(12+ positions)

Projects

Explore a selection of my recent projects showcasing expertise in cybersecurity, full-stack development, and application security.

Featured Projects

ZynqOS

WebOS Wasmer Terminal ZynqPad

A web-based operating system bundling my major projects with core OS utilities: ZynqPad (custom file manager + code editor), an integrated terminal, and a Wasmer-powered application runtime.

Integrated native components:

  • Phablet: Custom hashing + encryption (AES-256 + RSA) for secure data handling.
  • Wednesday: Desktop chat assistant for local automation and contextual interactions.
  • PhantomSurf: Privacy browser with toggleable VPN and TOR routing.
  • AigesX: Inbuilt vulnerability scanner for security assessments.

Applied system-level design patterns from my project ShadeOS — a 64-bit kernel built from scratch in Rust and C — to architect process isolation, modular services, and secure runtime boundaries in ZynqOS.

Load the live ZynqOS demo on demand.

Phablet

Python Encryption

A multilayered encryption protocol with AES-256 and RSA integration. Achieved 9ms encryption/11ms decryption times for data up to 1MB (95% faster than industry benchmarks).

AES-256 RSA Python Cryptography
api.nihalawasthi.me/api/
curl -X POST https://api.nihalawasthi.me/api/signup \
-H "Content-Type: application/json" \
-d '{
"Username": "username",
"Email: "email",
"Password": "password",
}'

All Project

Kernel Rust C

ShadeOS

64-bit Kernel (Rust/C) In development

A 64-bit operating system kernel designed from scratch in Rust and C, used to explore process isolation, modular services, and secure runtime boundaries.

Kernel Rust C Systems
Project in progress 80%
Security Python

AigesX

Vulnerability Detection System Ongoing

Automated vulnerability identification using fuzzing and symbolic execution;

Fuzzing Symbolic Execution Vulnerability Analysis Python
Project in progress 50%
Privacy UI/UX

PhantomSurf

Privacy-Focused BrowserOngoing

Developed a privacy-focused browser featuring an integrated proxy, real-time packet transfer monitoring, and a modern, sleek UI.

Browser Proxy UI/UX Privacy
Project in progress 70%
Assistant Automation

Wednesday

Personal Desktop Chat Assistant

A personal desktop chat assistant enabling local automation and contextual user interactions.

Assistant Automation Productivity
Project completed 100%
Open Source Python

Cryptographic Library

Open-source Python Library

Open-source Python library featuring over 50 encryption algorithm implementations; 5000+ views on GitHub.

Python Cryptography Library 5000+ Views
Project completed 100%
60+ Projects Completed
200+ Vulnerabilities Fixed
12 Open Source Contributions
99% Uptime Guarantee

Skills Matrix

Comprehensive technical skillset across multiple domains, with expertise in cybersecurity, programming, web development, and DevOps.

Network Security

Proficient in securing enterprise systems through firewalls, IDS/IPS, and traffic monitoring.

Wireshark Nmap Burp Suite Metasploit

Penetration Testing

Security assessments using ethical hacking tools and industry techniques.

Burp Suite Metasploit Nmap

Programming

Versatile across multiple languages with cryptography, backend, and automation expertise.

Python C C++ Java PowerShell Bash

Web Development

Built scalable web apps using modern frontend/backend stacks with responsive design.

ReactJS HTML/CSS/JS Django Flask REST APIs

Cloud & DevOps

Deployed services using cloud infrastructure and automated workflows with CI/CD.

AWS EC2 GitHub Actions PostgreSQL MySQL Git

Encryption & Cryptography

Custom-built libraries and secure protocols using hybrid encryption techniques.

AES-256 RSA Python Libs

Reverse Engineering

Analyzed software binaries and malware with static/dynamic methods and fuzzing.

Fuzzers Symbolic Execution

AI Tools

Leveraged generative AI platforms for enhanced productivity and intelligent features.

ChatGPT DeepSeek V0

Research Publications

Phablet project screenshot
Springer Nature BMC

Phablet Hashing Algorithm

This paper presents the Phablet Hashing Algorithm, a novel cryptographic hashing method designed to enhance security and efficiency.The algorithm integrates multiple encryption techniques, including block cipher and a custom encryption transformation, to provide robust protection against common cryptographic attacks.

Status: Published
ISBN: 978-3-031-87584-7

How to Cite

Awasthi, N. (2025). Phablet Hashing Algorithm. In: Musleh Al-Sartawi, A.M.A., Nour, A.I., Abdeljawad, I. (eds) Business Resilience and Business Innovation for Sustainability. Studies in Systems, Decision and Control, vol 587. Springer, Cham. https://doi.org/10.1007/978-3-031-87584-7_123

Springer Nature BMC

Data Poisoning in Large Language Models

This research underscores the importance of growing robust safety mechanisms to make sure the safety and integrity of LLMs in real-global packages. By presenting a detailed evaluation of attack strategies and mitigation strategies, we aim to make a contribution to the persevering with efforts in securing tool analyzing models towards hostile threats.

Status: Published
ISBN: 978-3-031-87584-7

How to Cite

Awasthi, N. (2025). Data Poisoning in LLMs. In: Musleh Al-Sartawi, A.M.A., Nour, A.I., Abdeljawad, I. (eds) Business Resilience and Business Innovation for Sustainability. Studies in Systems, Decision and Control, vol 587. Springer, Cham. https://doi.org/10.1007/978-3-031-87584-7_168

Phablet project screenshot
IEEE ICDCC'2024

Phablet: A Multi-Layered Encryption Protocol for Data Security

This paper introduces Phablet, an innovative multi-layered encryption protocol that combines AES-256 and RSA cryptographic algorithms to provide enhanced data security. The research demonstrates significant performance improvements, with 9ms encryption and 11ms decryption times for data up to 1MB - 95% faster than current industry standards.

Status: Under Final Review
Copyright ID: eCF Paper ID: 832712
Springer ICIoTCT 2025

Hybrid Threat Vectors in LLMs: A Study on the Intersection of Prompt Injection and Data Poisoning Attacks

This study examines hybrid attack pathways combining prompt injection and data poisoning against large language models, outlining risk factors and mitigation directions.

Status: Under Final Review
Conference: Meteor Springer via ICIoTCT 2025

<Contact/>

Secure transmission line established. Ready to receive your message.

Initiate Connection

Secure Channels

  • Email

    nihalawasthi498@gmail.com

  • Phone

    +91 (635) 048-6317

  • Location

    VIT Bhopal University

    Bhopal, MP India

System Uptime

  • Monday - Friday: 09:00 - 23:59 PST
  • Saturday: 10:00 - 23:59 PST
  • Sunday: Maintenance Mode
  • Emergency Support: 24/7/365
01001000 01100001 01100011 01101011 01100101 01110010 00100000 01000101 01110100 01101000 01101001 01100011 01110011