Cybersecurity × ML student at KIIT.
Building intelligent security systems that don't exist yet.
Threat detection · AI forensics · Cryptography.
Also writes poetry. ✍
I built this for fun in my free time!
Full intel on ctrl-Nix — who she is, what she builds, how she thinks.
Real name: Shreyanshi Singh. Handle: ctrl-Nix. First-year B.Tech at KIIT, Bhubaneshwar — already building AI-powered security tools most seniors haven't attempted.
Operating at the intersection of cybersecurity and machine learning — threat detection, AI forensics, applied cryptography.
Built a financial forensics AI on a PDF → OCR → Gemini 2.5 Pro → anomaly report pipeline. All in the first year.
Also: she writes poetry and sketches. Because creativity and analytical thinking are the same muscle.
Deployed systems — all active, all real.
A USB device that looks innocent but secretly types commands faster than any human.
_____ / o | ~~~~~ | \_____/ | | | |USB| | |___| | [=======]
6 breadcrumbs across source code, ciphers, binary, and acrostics. Her real LinkedIn is the final flag.
Old hacker tradition — leave a flag in the HTML comments. Open DevTools. Search for "FLAG".
Her GitHub handle committed as Base64. Decode it.
Email username encrypted with Caesar cipher. Shift = length of her last name.
City encoded in binary. Each 8-bit group = one ASCII character.
University name hidden in the first letter of each paragraph.
Decode the LinkedIn slug and visit her profile. Find the keyword in the About section.
First-year. Already shipping. Open to internships, research collabs, and CTF
teams.
If you got through the CTF challenges — you're exactly the kind of
person I want to work with.