Rudra Pratap Singh
At the intersection of code and
security
A third-year B.Tech Computer Science student with a clear mission: mastering algorithms by day and exploring cybersecurity by night. What began as curiosity about how systems are exploited quickly evolved into a deep commitment to understanding and securing them.
Kali Linux is my playground. AI tools are my force multiplier. The goal is always the same — build, break, improve.
Every tool has a purpose.
From writing algorithms to scanning networks — the stack reflects the mission.
Projects and initiatives I've worked on.
Built with intent — real problems, real deployments.
End-to-end L1/L2 SOC triage platform. Dual-source threat intel reclassification, kill-chain sequence detection, persistent anomaly baseline, real log ingestion. 43 tests passing.
Core Insight — SOC analysts drown in alerts — intelligent triage isn't optional, it's survival.
Graph-based threat visualization platform. APT kill chains mapped in Neo4j, explored in React, assessed by Gemini AI. See the attack, not the logs.
🏆 2nd Place — YNOV Campus Paris Global Hackathon · Pre-Qualifiers · Top 2 out of 91 teams
Core Insight — Logs tell you what happened. Graphs tell you how the attacker thought.
LLM privacy auditing toolkit. Three attack vectors — PII generation risk, regurgitation detection, membership inference — with weighted scoring and HTML audit reports.
Core Insight — LLMs trained on sensitive data don't forget — they just need the right prompt to remember.
Experience and continuous learning.
Certifications, internships, and self-driven practice.
Core CS fundamentals, DSA — alongside deep dives into cybersecurity, Linux systems, and AI-assisted development.
Covered modern cybersecurity — network security, cloud security fundamentals, and enterprise threat prevention frameworks used by industry leaders globally.
Hands-on ethical hacking — reconnaissance, vulnerability assessment, exploitation techniques, and responsible disclosure practices.
Let's build
something
secure.
Open to cybersecurity collaborations, internship opportunities, project discussions — or talking shop about algorithms and exploit chains.