Founder @ Vector 384 | CS @ NIT Rourkela
I build "hard" software—systems that must perform under adversarial pressure, high-frequency loads, or strict compliance mandates. My work bridges the gap between low-level systems programming (Rust/C) and scalable product engineering.
I don't just write code; I engineer survivability.
- Performance: If a scanner takes 10 seconds, I want to know why it can't run in 100ms.
- Safety: I prefer memory-safe languages (Rust) for infrastructure, but write C to understand the OS kernel.
- Reality: I build products, not just demos. My projects include billing systems, abuse rate-limiting, and fault-tolerant pipelines.
High-Performance Secret Scanner (Rust)
The Problem: CI/CD scanners are too slow for large monorepos and too noisy for developers.
I engineered a zero-copy secret scanner using memory mapping (memmap2) and parallel processing (Rayon) to achieve scan speeds order-of-magnitude faster than standard tools.
- Architecture: Hybrid pattern-matching engine with 66 vendor-specific validation rules.
- Enterprise Ready: Emits SARIF 2.1.0 logs for native GitHub Advanced Security integration.
- Impact: Near-zero false positives; runs fast enough to be a pre-commit hook.
2. BioStream ML
Real-Time Surgical Telemetry Engine (Python/Redis)
The Problem: Medical anomaly detection needs to be fast (real-time) and idempotent (cannot lose or duplicate data).
A fault-tolerant physiological anomaly engine processing ~3,000 events/second with sub-5ms latency.
- Resilience: Built on Redis Streams for event bus orchestration, ensuring data integrity even if worker containers crash.
- Intelligence: Uses unsupervised machine learning (Isolation Forest) to flag clinical deterioration in real-time (HR/SpO2 thresholds).
- Validation: Tested on real surgical datasets (VitalDB), not synthetic noise.
3. Proxy Server
Windows-Native Defensive Proxy (C / Win32)
The Problem: Understanding how firewalls work by building one on the metal.
A multi-threaded HTTP proxy written in ANSI C using raw Win32 sockets. It acts as a miniature perimeter firewall.
- Defense: Implements real-time packet inspection to block SQL Injection (
' OR 1=1) and Path Traversal (../) attacks. - Concurrency: Manages raw threads to handle multiple clients simultaneously, supporting both IPv4 and IPv6.
- Active Measures: Tracks per-IP behavior and automatically bans clients exceeding 50 requests/15s.
Identity Security Platform (Python/Streamlit)
The Problem: Security tools are often just scripts. I wanted a product.
A monetized security dashboard that acts as a "Personal SOC" for monitoring identity leaks.
- The Tech: Integrates HaveIBeenPwned and GitHub APIs to scan for leaked credentials, assigning a risk score (0-100) via ML anomaly detection.
- The Product: Full SaaS architecture including Stripe for billing, rate-limiting quotas to prevent abuse, and compliance-style PDF reporting.
| Domain | Technologies |
|---|---|
| Systems & Low-Level | Rust (Rayon, Memmap), C/C++ (Win32), Go |
| Security & Offensive | Metasploit, Nmap, Wireshark, Bash Scripting, Kali Linux |
| Product & Web | Python, TypeScript, React, Next.js, Tailwind, Streamlit |
| Data & ML | PostgreSQL, Redis, Pandas, TensorFlow, Scikit-learn |
| DevOps | Docker, Kubernetes, Terraform, GitHub Actions |
- Commercial/Freelance: Vector 384
- Professional Network: LinkedIn
- Security Research: TryHackMe / HackTheBox
"Clean code. Fast delivery. From concept to deploy, I ship without drama."

