Skip to content
View MoriartyPuth's full-sized avatar
:shipit:
Lock it in
:shipit:
Lock it in
  • Phnom Penh, Cambodia
  • 02:35 (UTC -12:00)

Block or report MoriartyPuth

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MoriartyPuth/README.md

✨ Hi there!

I work in the government sector and develop cybersecurity tools focused on defense, analysis, and automation.

This GitHub is used for security research, tooling, and side projects related to cyber operations and machine learning.

Hands Up Wow GIF by sillynub

💻 Tech Stack:

JavaScript Python Bash Script Java AWS Canva Affinity Designer Figma scikit-learn Scipy Pandas Matplotlib PyTorch Steam

📊 GitHub Stats:



🔥 Current Focus

  • 🤖 AI integration and training - ML models and neural networks in production
  • 💻 Cybersecurity tools and automation - Cybersecurity tools with automation
  • ⚔️ Exploitation document - Documentation of exploit

✍️ Random Dev Quote


Pinned Loading

  1. bubble-scanner bubble-scanner Public

    A lightweight, event-driven API reconnaissance and vulnerability scavenger built in Bash. Engineered for proactive threat hunting, it automates endpoint discovery, secret scavenging, and RCE/SQLi p…

    Shell 2

  2. Byzantine-Robust-Identity-Framework Byzantine-Robust-Identity-Framework Public

    A Decentralized Civil Registry Architecture leveraging Blockchain, Federated Learning, and Differential Privacy to secure National Identity Systems.

    Python

  3. bubble-siphon bubble-siphon Public

    Autonomous post-exploitation framework for tactical data scavenging and privilege escalation auditing in hardened Linux environments. Built for speed, stealth, and NIST/MITRE compliance.

    Shell 1

  4. Decentralized-Threat-Intelligence Decentralized-Threat-Intelligence Public

    A Blockchain-Integrated Framework with Byzantine-Robust Aggregation and Differential PrivacyA Blockchain-Integrated Framework with Byzantine-Robust Aggregation and Differential Privacy

    Python

  5. bubble-pop bubble-pop Public

    A high-speed API security engine for discovering hidden parameters, testing JWT integrity, and scaling IDOR probes with real-time color-coded feedback.

    Shell

  6. Bayesian-Deep-Learning-for-Smart-Grid-Intrusion-Detection Bayesian-Deep-Learning-for-Smart-Grid-Intrusion-Detection Public

    A Bayesian Deep Learning Approach With Convolutional Feature Engineering to Discriminate Cyber-Physical Intrusions in Smart Grid Systems

    Jupyter Notebook