Reyyan Ahmed

About

Security engineer, full-stack builder, and open source contributor who works across domains.

Philosophy
“The best way to understand a system is to build one, and then try to break it.”

I work across cybersecurity, full-stack engineering, and AI/ML. Not to spread thin, but because each domain strengthens the others. Security research informs how I architect. Building products deepens how I think about attack surfaces.

What drives me is building things that work in production. Systems that handle real data, serve real users, and solve meaningful problems. I care about craft and impact in equal measure.

Domains
Cybersecurity & AppSec

Vulnerability research, Android security, WebView exploitation, red team engagements, reverse engineering.

Full-Stack Engineering

Next.js, React, PostgreSQL, TypeScript. Production platforms with real users and complex system design.

AI / ML & LLM Systems

LLM fine-tuning on NVIDIA DGX hardware, competitive ML (Numerai), multi-model deliberation engines.

Open Source

Active contributor with merged PRs. GSoC 2026 candidate with gemini-cli.

Bug Bounty

HackerOne reporter. Targets include major Indian and global platforms.

Developer Tooling

CLI frameworks, npm-published packages, terminal UIs with Ink and Commander.js.

Timeline
Sep 2025 — Present
Android Security Lead, IIT Kanpur
  • ·Led a 15+ member Android security research team on a $1.5M cybersecurity project; owned the full mobile threat research vertical from platform internals to offensive tooling delivery.
  • ·Engineered a mobile data extraction system achieving 100% exfiltration (3,035/3,037 files, 7830.6 GB, 19 directories) across 3 unrooted, locked-bootloader devices spanning Android 12–16 (API 31–36) and 3 OEM stacks.
  • ·Designed and administered technical hiring assessments (red teaming, reverse engineering, OS internals) to recruit and scale the team from 0 to 15+ researchers and engineers.
  • ·Built a 50+ APT group threat intelligence database with Android-specific TTPs, malware hashes, and campaign IOCs covering nation-state actors across 7+ countries.
  • ·Authored comprehensive Android internals research covering 5 major OS generations (kernel architecture, GKI, boot chain, HAL evolution, SELinux enforcement, ART runtime).
  • ·Transitioned from research intern to Android lead; research output and delivery velocity directly contributed to securing the $1.5M project contract.
Mar 2025 — Sep 2025
Security Engineer Intern, C3iHub, IIT Kanpur

Contributed to cutting-edge cybersecurity R&D at C3i Hub. Simulated real-world attack scenarios across mobile and network attack surfaces, delivering meaningful impact in national cyber defense.

Aug 2024 — Feb 2025
Research Intern, IIT Kanpur

Worked on "Enhancing Electric Vehicle Security: AI-Powered Detection and Prevention of Cyber Attacks." Conducted reconnaissance, red teaming, and penetration testing to develop IDS/IPS for electric vehicles.

2026 — Present
GSoC 2026 Preparation, gemini-cli

5 PRs filed (1 merged, 1 reviewed, 3 pending). Building toward a Google Summer of Code proposal.

2024 — Present
Independent Builder

Shipped 7 production platforms: Nucleus, Guardian-X, 1drive.tech, QTRL, PolyMind, Jury AI, and more.

2024 — Present
Bug Bounty Hunting

4 vulnerability reports on HackerOne across major programs. Focus: Android APK analysis and WebView exploitation.

Oct 2021 — Jul 2025
Thapar Institute of Engineering & Technology

Bachelor's degree in Computer Engineering. Research focus on Android physical access vectors and application security.

2019 — Present
Android Security Research

Researching physical access red team vectors since class 10th. Threat intelligence on APT groups across nation-states.

Hardware

MacBook Pro M4 Pro · 48 GB RAM · 2 TB Storage