AI Security Engineer β’ LLM Red Teamer β’ Hardware & Telecom Security Researcher
I break things β LLMs, agents, RAG pipelines, firmware, basebands, RF systems β and help teams secure them.
My work spans AI Red Teaming, Adversarial ML, Agent Security, 5G/RAN fuzzing, and embedded exploitation.
- LLM Red Teaming: jailbreaks, prompt injection, tool-call hijacks, agent misuse
- RAG Security: embedding poisoning, retrieval hijacking, vector-db attacks
- Adversarial ML: backdoors, evasion, poisoning, model extraction
- Hardware/Telecom Security: SDR-based fuzzing, secure-boot bypass, LTE/5G protocol abuse
- Adversarial LLM Red Teaming Toolkit β Multi-model jailbreak & robustness evaluation
- Damn Vulnerable LLM/Agent Framework β RAG poisoning + agent exploitation testbed
- 5G/RAN Fuzzing Harnesses β AFL++ / LibAFL on GTP, NGAP, PFCP, O-RAN
- Evil-Boot β Secure-boot bypass for embedded devices
BITE β’ garak β’ Rebuff β’ HouYi β’ LangChain β’ LlamaIndex β’ FAISS
AFL++ β’ LibAFL β’ Scapy β’ USRP β’ BladeRF β’ Python β’ C β’ Docker β’ Linux
100x Engineers GenAI Cohort, HTB AI Red Teamer, Microsoft AI Red Teaming, NVIDIA Adversarial ML
π linkedin.com/in/amitvitekar
I break AI systems by day and hardware devices by night.
Few people do both β I enjoy being one of them.
