Skip to content
View shrihari7396's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Block or report shrihari7396

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
shrihari7396/README.md

Typing SVG


LinkedIn GitHub Profile Views


⚑ About Me

name        : Shrihari Kulkarni
focus       : Backend Architecture Β· Security Engineering Β· Distributed Systems
currently   :
  - Building  β†’ Centralized KYC Verification System
  - Contributing β†’ Apache DolphinScheduler (Open Source)
  - Learning  β†’ Advanced Spring Security Β· Kubernetes Β· AWS/GCP Β· System Design
strengths   :
  - Core backend layers: auth, authorization, logging, monitoring, service integration
  - High-throughput, stateless, production-oriented system design
philosophy  : Architecture β†’ Implementation β†’ Deployment
highlights  :
  - CGPA        : 9.30
  - CTF Ranking : Top 7% Β· AICTE National CTF
  - DSA         : 850+ algorithmic problems solved

πŸ’» Tech Stack

πŸ”· Core Backend & Frameworks

Java Spring Boot Spring Security Hibernate Python C++

πŸ—„οΈ Distributed Systems & Databases

Apache Kafka Redis PostgreSQL MySQL Microservices

πŸ” Security & DevOps

Docker Kubernetes Git Linux JWT OAuth2


πŸš€ Featured Projects

πŸ›‘οΈ SentinelGate

Edge Security API Gateway

A stateless, high-throughput security gateway that monitors backend services in real-time, detects abnormal traffic, and enforces automated defensive measures.

Key Design Decisions:

  • Problem β†’ Low-latency request interception without blocking the main I/O thread
  • Solution β†’ Asynchronous Kafka pipeline with Redis caching for threat analysis and IP blacklisting

Highlights:

  • πŸ” Device fingerprinting & real-time anomaly detection
  • 🚫 Automated IP blocking and rate limiting
  • πŸ” RSA Cryptography for request signing

Spring Kafka Redis Docker

Consent-Driven Distributed Identity Platform Alpha 🚧

A microservices-based KYC orchestration system that eliminates redundant verification across institutions while enforcing secure, consent-based data access.

Key Design Decisions:

  • Single Source of Truth β†’ One verified identity reusable across organizations
  • Consent β†’ Explicit user authorization required before any data access
  • Event-Driven β†’ Asynchronous communication using Kafka
  • Security β†’ JWT authentication, RBAC, and encrypted data storage
  • Lifecycle β†’ Automated renewal, revocation, and update workflows

Highlights:

  • πŸ” Consent-based identity sharing with strict access control
  • ⚑ Event-driven microservices using Apache Kafka
  • πŸ›οΈ Multi-institution KYC orchestration
  • πŸ“Š Strong data governance and trust boundary enforcement

Java Spring Boot Kafka MySQL Redis Docker

Event-Driven Exam Platform

Low-latency WebSocket-based examination platform with real-time anomaly detection for large-scale concurrent sessions.

Key Design Decisions:

  • Scale β†’ Efficient session mapping for thousands of concurrent WebSocket connections
  • Detection β†’ Tab switching, focus-loss, and behavioral event monitoring

Highlights:

  • ⚑ Persistent bidirectional WebSocket connections
  • πŸ‘οΈ Multi-event anomaly detection pipeline
  • πŸ“Š Real-time session state management

Java Spring Boot React

Automated Threat Detection Pipeline

Static analysis + ML pipeline to classify polymorphic malicious payloads hidden within PDF structures.

Key Design Decisions:

  • Innovation β†’ Custom structural parsers to identify high-entropy object streams in malformed PDFs
  • Accuracy β†’ XGBoost ensemble model for classifying zero-day polymorphic variants

Highlights:

  • 🧠 XGBoost + TensorFlow classification pipeline
  • πŸ”¬ Custom PDF structure parser for malformed documents
  • πŸ“ˆ High-entropy stream detection

Python TensorFlow XGBoost


πŸ› οΈ Open Source Contributions

Apache DolphinScheduler β€” Systems Contributor

A distributed and extensible visual workflow task scheduling platform. ⭐ 11k+ GitHub Stars

Area Contribution
πŸ”§ Core Engine Engineering workflow engine modules and integration pipelines for distributed visual DAG task scheduling
πŸ§ͺ Testing Architecting fault-tolerant test suites covering edge-case timeout scenarios in Dockerized environments
βœ… Database Assertions Strengthened database assertion logic to improve test reliability across distributed execution contexts

πŸ“Š GitHub Stats



Β Β 

πŸ“ˆ Contribution Activity


"Building secure, observable, and resilient systems β€” one layer at a time."

Popular repositories Loading

  1. Anti_Plagarism_Interface Anti_Plagarism_Interface Public

    A scalable code assessment platform designed to detect plagiarism and ensure fair evaluation in coding assignments and contests. Built with a microservices architecture, it provides high performanc…

    HTML 1

  2. Pdf-Malware-Detection-System Pdf-Malware-Detection-System Public

    AI-powered PDF malware detection system combining Machine Learning, PDF structural analysis, and local LLM-generated security reports using Spring Boot, Python, and Ollama.

    Java 1 1

  3. SentientGate SentientGate Public

    SentientGate is a high-performance, behavior-aware API gateway that monitors traffic patterns, enforces real-time rate limiting, and triggers adaptive defensive actions using event-driven logging a…

    Java 1

  4. Spring-Framework Spring-Framework Public

    A comprehensive, multi-module Maven project demonstrating core Spring Framework concepts, including Dependency Injection, Bean Lifecycle, Spring JDBC, and Spring ORM with Hibernate.

    Java

  5. GRPCLearnedSotckProject GRPCLearnedSotckProject Public

    A Spring Boot client-server application demonstrating high-performance communication using gRPC and Protocol Buffers for stock trading data.

    Java

  6. Leetcode Leetcode Public

    A comprehensive collection of my LeetCode solutions, showcasing algorithmic problem-solving primarily in C++.

    C++