Anmol Singh Yadav अनमोल सिंह यादव

Security Researcher · Infrastructure Defense

I engineer the systems that find vulnerabilities before attackers do — spanning cloud-native defense, AI runtime isolation, and large-scale threat intelligence.

Anmol Singh Yadav

I think in systems. My work focuses on understanding how infrastructure fails — and building the detection and defense layers that prevent those failures from becoming breaches. I operate across cloud-native security, runtime isolation, and AI system hardening.

I approach security as an engineering discipline: systematic threat modeling, reproducible exploit research, and defense architectures that scale. My research spans container security, credential exposure analysis, and attack surface mapping through unconventional signals.

– AI Runtime Security – Cloud Native Defense – Infrastructure Security – Runtime Isolation – Threat Intelligence

FaviCreep

01

Attack surface discovery through favicon fingerprinting. Enumerates subdomains, hashes favicons via mmh3, clusters infrastructure sharing identical branding, and pivots to Shodan for internet-wide asset correlation.

AWS Key Hunter

02

Automated credential exposure scanner that monitors GitHub commits in real-time for leaked AWS keys. Detects in plaintext and base64, validates against AWS APIs, and delivers instant Discord alerts.

CVE-2007-2447 Exploit

03

Standalone exploit for the Samba "username map script" command injection vulnerability. Written in Go as a study in vulnerability research methodology — protocol-level flaws to RCE.

Researching AI runtime security boundaries — how LLM-powered agents can be isolated from host infrastructure without sacrificing execution fidelity.

Building distributed threat intelligence pipelines that aggregate, correlate, and surface credential exposure patterns across public code repositories.

Studying container escape vectors and runtime isolation models in Kubernetes environments — understanding where the boundaries actually break.