Skip to content
View TUSHAR91316's full-sized avatar
☺️
☺️
  • 19:12 (UTC +05:30)

Block or report TUSHAR91316

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
TUSHAR91316/README.md

Hi πŸ‘‹, I'm Tushar

Typing SVG

Building scalable backends β€’ Async systems β€’ Real-world products


πŸ‘¨β€πŸ’» About Me

I'm a Computer Science undergraduate specializing in backend engineering, distributed systems, and ML-powered applications. I am passionate about designing asynchronous APIs, concurrent systems, and production-ready architectures.

  • πŸ”­ I’m currently focusing on: High-performance Backend Systems, Networking, and secure protocol development.
  • πŸ”§ Core Strength: FastAPI, Async Python, REST/UDP APIs, and Systems Architecture.
  • 🐳 Infrastructure: Docker, Linux Administration, CI/CD Pipelines.
  • 🧠 Machine Learning: Feature Engineering, Model Evaluation, Data Pipelines (Scikit-learn, TensorFlow).
  • πŸ” Security Interests: Network Analysis, IDS (Intrusion Detection Systems), Encrypted Tunnels.

πŸ› οΈ Tech Stack

Category Technologies
Languages Python C++ Dart SQL
Backend FastAPI Flask REST
Tools & DevOps Docker Git Linux
Data & ML Scikit-learn TensorFlow Pandas SQLite

πŸš€ Featured Projects

Tech: Python β€’ CustomTkinter β€’ AES-256-GCM β€’ X25519 β€’ UDP Relay Support

A specialized, secure local VPN tunnel designed for maximum privacy, DPI evasion, and traffic obfuscation.

  • πŸ›‘οΈ Double Encryption: Wraps traffic in AES-256-GCM before it hits the network interface.
  • πŸ”‘ Ephemeral Keys: Utilizes X25519 for secure key exchange; keys are systematically wiped from RAM on disconnect.
  • ⚑ UDP & TCP Support: Relays both TCP and UDP traffic (like VoIP and gaming) through the secure tunnel.
  • 🚫 Strict Mode: Built-in kill switch and system-wide proxy routing for zero-leak operations.

Tech: FastAPI β€’ Flutter β€’ Docker β€’ SQLite

Designed a scalable backend for secure file processing and malware scanning.

  • ⚑ Optimization: Reduced storage usage by ~80% using efficient compression algorithms.
  • πŸ”’ Security: Integrated VirusTotal API for real-time malware scanning of all user-uploaded files.
  • 🐳 Scalability: Dockerized document pipelines to ensure resource isolation and system reliability.

Tech: Python β€’ Scikit-learn β€’ Streamlit

A robust machine learning pipeline for detecting network anomalies and malicious attacks.

  • 🎯 Accuracy: Achieved 95%+ accuracy evaluated on the comprehensive UNSW-NB15 dataset.
  • πŸ› οΈ Engineering: Extracted and engineered 15+ specialized network features directly from raw packet data.
  • πŸ“Š UI/UX: Built a real-time visualization dashboard using Streamlit for monitoring simulated traffic flows.

πŸ“Š GitHub Stats



Profile Views

Pinned Loading

  1. ShadowLink ShadowLink Public

    ShadowLink is a specialized, local-only VPN tunnel designed for maximum privacy. It wraps your traffic in AES-256-GCM encryption with ephemeral keys before it even hits your network card, creating …

    HTML

  2. ClearTerms ClearTerms Public

    ClearTerms: An AI-powered Privacy Policy Analyzer. Instantly detect risks, red flags, and hidden clauses using Multi-Model agents (Gemini/GPT/Llama). Built with Pydantic AI, FastAPI & Next.js.

    TypeScript

  3. AI-BASED-NIDS AI-BASED-NIDS Public

    Next-gen Network Intrusion Detection System using a hybrid AI engine (CNN + Autoencoder + Rules) for real-time and zero-day threat detection.

    Python

  4. TCP-IP-CHATROOM TCP-IP-CHATROOM Public

    A secure, multi-threaded TCP chat application featuring SSL/TLS encryption, anonymous login, and real-time file transfer.

    Python

  5. malware-url-detection malware-url-detection Public

    Privacy-first browser extension that uses on-device AI to instantly detect malicious and phishing URLs.

    JavaScript

  6. Fault_tolrent_storage Fault_tolrent_storage Public

    Fault-Tolerant File Storage System is a distributed, Dockerized storage solution that ensures high availability and data reliability using triple replication across independent nodes, allowing the …

    Python