Skip to content
View PipKcK's full-sized avatar
🫠
Meow
🫠
Meow

Block or report PipKcK

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
PipKcK/README.md

Welcome to my Humble Abode 👋

I'm Ujjwal — a Security Engineer who wandered into AI and decided to stay.

I spend most of my time breaking systems, understanding why they break, and then rebuilding them stronger. My work lives at the intersection of cybersecurity and applied AI, where things get interesting fast.

Right now, I’m building a (POC) Blockchain based Identity System focused on decentralized authentication and verifiable credentials. The goal is simple: make identity more secure, more private, and less dependent on centralized trust.

When I’m not working on that, I’m usually building and shipping tools:

  • A Web3 browser extension powered by yt-dlp
  • Privacy focused local file conversion utilities
  • Security and automation focused experimental projects

🤝 Volunteer Work

Alongside my personal projects, I contribute to mission driven organizations:

Sayaam For All
Hosting and maintaining GenAI endpoints on AWS Lambda. Working on scalable inference pipelines and reliable API infrastructure.

OneCommunity
Contributed to OneCommunity's codebase by identifying and fixing bugs, improving stability and maintainability.


🛠 Tech Stack

My core stack revolves around Python, Linux, and AWS.

On the security side, I work heavily with Wireshark, Burp Suite, Metasploit, Nmap, and Snort.

On the AI side, I build with Azure/AWS, Hugging Face, Ollama, and LangChain to deploy and orchestrate LLM driven systems.

I enjoy network traffic analysis, offensive testing, model deployment, and designing systems that are both intelligent and hardened.

If something can be automated, optimized, or secured properly, I’m probably already experimenting with it.


Fun facts:

  • I enjoy CTFs and reverse engineering challenges
  • I like building tools more than talking about them
  • I am statistically better than 95% of all humans at chess

Pinned Loading

  1. ChaseForage-CyberSecurity-Task3 ChaseForage-CyberSecurity-Task3 Public

    Jupyter Notebook

  2. Coder-Commands Coder-Commands Public

    Various Bash Scripts that can help a beginner programmer program faster.

    Shell

  3. FileTransferTCP-Python FileTransferTCP-Python Public

    Python program that allows for file transfer over TCP. It's a client-server architecture where the client sends a file to the server, and the server receives it and saves it under a different name.

    Python

  4. forage-jpmc-swe-task-3 forage-jpmc-swe-task-3 Public

    Forked from theforage/forage-jpmc-swe-task-3

    Starter repo for task 3 of JPMC's Forage program

    Python

  5. HashingStrings-Python HashingStrings-Python Public

    Using SHA-2 Family and hashlib to HASH a string in python

    Python

  6. Salting-Passwords Salting-Passwords Public

    This C++ Function uses Mersenne Twister 19937 (mt19937) which is a pseudorandom number generator (PRNG) included in the C++ Standard Library's <random> header. By utilizing the mt19937 generator, w…

    C++