Skip to content
View BlackNinjaKR's full-sized avatar
:shipit:
I'm out of braincells
:shipit:
I'm out of braincells

Block or report BlackNinjaKR

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BlackNinjaKR/README.md


Digital Forensics Secure Systems Applied Cryptography Data Engineering


🎓 BTech–MTech Computer Science — NFSU Guwahati
📊 BSc Data Science — IIT Madras
🌍 India


Building integrity-first systems for forensic and security contexts.


Profile

Systems-focused computer science student building integrity-first tools at the intersection of digital forensics, cryptography, and data engineering.

Primary direction:

  • Forensic acquisition & evidentiary integrity
  • Forward-secure logging architectures
  • Applied cryptographic systems
  • Research-grade data pipelines

Core Projects

Project Focus
Forensic Acquisition Toolkit Disk imaging • ADB extraction • Evidence integrity
AegisLog Forward-secure logging • Hash chaining
Encryption & Hashing Algorithms Digital signatures • Key exchange
TheReddiCollector Large-scale scraping • ML-ready datasets
Byte Pair Encoding NLP tokenization • Compression logic
Flappy Bird (Unity Rebuild) Physics system • Game loop architecture

1. Forensic Acquisition Toolkit

Modular DFIR acquisition framework designed around forensic soundness.

  • Disk bitstream imaging
  • Cryptographic hashing & verification
  • Android logical acquisition via ADB
  • Integrity-preserving workflow structure

Python • DFIR • Incident Response • Evidence Handling


2. AegisLog

Forward-secure, tamper-evident logging prototype.

  • Hash-chained log architecture
  • Cryptographic integrity guarantees
  • Secure logging pipeline model

Secure Logging • Encryption • Systems Architecture


3. Encryption & Hashing Algorithms

Implementation of cryptographic primitives.

  • Digital signatures
  • Key exchange models
  • Hashing functions
  • Encryption/decryption mechanisms

Applied Cryptography • Security Foundations


4. TheReddiCollector

Large-scale Reddit data harvesting engine.

  • Multi-subreddit scraping via PRAW
  • Duplicate-safe MySQL persistence
  • Long-running automated collection
  • Structured datasets for ML research

Python • MySQL • Automation • Data Engineering


5. Byte Pair Encoding (BPE)

Custom NLP tokenization implementation.

  • Token merge mechanics
  • Compression logic
  • LLM-relevant preprocessing foundations

NLP • Machine Learning • Algorithms


6. Flappy Bird (Unity Rebuild)

Re-engineered 2D physics-based game system.

  • Physics tuning
  • Collision logic
  • Gameplay loop architecture
  • Rebuild from lost prototype

Unity • C# • Game Systems Design


Research & Academic Experience

  • Technical writing and research review under faculty supervision
  • Development of forensic workflow prototypes aligned with evidentiary standards
  • Exploration of secure logging and cryptographic chaining mechanisms
  • Applied cybersecurity experimentation beyond coursework

Professional Experience

Web Operations — IIT Madras

  • Contributed to website and application development
  • Assisted in structured deployment workflows
  • Worked across frontend/backend integration

Independent Systems Development

  • Designed modular security tools
  • Built scalable data pipelines
  • Experimented with embedded systems and low-level design

Cross-Domain Exploration

Domain Work
Narrative Systems Visual novel engine project
Web Systems Static program websites, frontend UI experiments
Automation Discord bot development
Algorithm Practice DSA implementations in Java, C, C++
Security Awareness Harmless malware simulation

Technical Stack


Integrity before convenience.
Systems over surface.
Depth over noise.

Pinned Loading

  1. Forensic-Acquisition-Toolkit Forensic-Acquisition-Toolkit Public

    A modular Python-based digital forensics acquisition toolkit implementing disk imaging, cryptographic hashing, and Android device acquisition via ADB. Designed for forensic soundness, integrity ver…

    Jupyter Notebook 2

  2. AegisLog AegisLog Public

    Custom cryptographically authenticated log transport protocol with forward-integrity hash chaining

    Jupyter Notebook 1

  3. Encryption-Hashing_Algorithms Encryption-Hashing_Algorithms Public

    Implementation of various Encryption, Hashing and Digital Signature algorithms

    Jupyter Notebook 1

  4. TheReddiCollector TheReddiCollector Public

    TheReddiCollector is a Python-based Reddit data harvester that collects posts from hundreds of subreddits using PRAW and stores them in a MySQL database. Designed for large-scale collection, it als…

    Python 1

  5. BPE_BytePairEncoding BPE_BytePairEncoding Public

    An implementation of Byte Pair Encoding (BPE)

    Jupyter Notebook 1

  6. Flappy-Bird Flappy-Bird Public

    This project is a re-imagining of a Flappy Bird clone I originally developed and lost. After losing the first version, I decided to rebuild it from scratch, adding improvements along the way, while…

    C# 2