Skip to content
View MrCipher-X's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Block or report MrCipher-X

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
MrCipher-X/README.md
Header
Anbarasu

[ ANBARASU.T (Mr.Cipher-X) ]

>_ whoami --verbose

I am the Founder of TechieClub and a Certified Threat Hunter & Examiner [C|THE].

My operations operate at the absolute bleeding edge of Offensive Security, Digital Forensics, Artificial Intelligence, and Cyber-Physical Hardware Engineering.

"Architecting the defence systems of tomorrow."


๐Ÿ›ก๏ธ Core Competencies & Neural Stack

[>_ ARTIFICIAL INTELLIGENCE & VISION ]

[>_ CYBER OPERATIONS & FORENSICS ]

[>_ HARDWARE FORGE & IOT ]


๐Ÿ“‚ The Arsenal (Proprietary Operations)

๐Ÿ‘๏ธ CrimeNet AI
Real-time Criminal Identification & Surveillance powered by CNNs and YOLOv8.
๐Ÿ›ก๏ธ SentinAI Defence Grid
Hybrid IDS/IPS utilizing Scapy and IsolationForest ML for real-time threat neutralization.
๐Ÿ”Œ Sentinel-X
IoT Cyber-Physical Anti-Surveillance featuring EMF auditing and 802.11 Deauth sniffing.
๐Ÿ’พ SecureGate Pro
AI-enhanced Digital Forensic Kiosk with Kernel-Level Write Blockers & Threat Sterilization.
๐Ÿ›‘ spyUSB Endpoint Defence
DNN-driven USB malware detection coupled with Tokenization and CloudConceal backups.
โ›“๏ธ Photo Protector (Web3)
Blockchain & OpenCV framework for dynamic facial ROI privacy enforcement.

๐Ÿ“Š Tactical Telemetry

Trophies

GitHub Streak

Pinned Loading

  1. CrimeNet-AI-Criminal-Identification CrimeNet-AI-Criminal-Identification Public

    AI-driven criminal identification system using CNN & YOLOv8 for real-time facial recognition and threat surveillance.

  2. DFIR-Memory-Analysis DFIR-Memory-Analysis Public

    Advanced Volatile Memory (RAM) Forensics using the Volatility Framework to detect fileless malware, rootkits, and process hollowing.

  3. Live-Endpoint-Forensics Live-Endpoint-Forensics Public

    Proactive Threat Hunting & Live Incident Response using Sysinternals to unearth hidden malware and C2 beacons.

  4. Network_Traffic_Analysis Network_Traffic_Analysis Public

    Deep Packet Inspection (DPI) & Network Forensics to reconstruct malicious TCP streams, extract cleartext credentials, and detect DNS tunneling.

  5. Phishing-Analysis-Report Phishing-Analysis-Report Public

    Forensic analysis of a targeted phishing campaign, email header tracing, URL sandboxing, and IOC extraction.

  6. SOC-Log-Analysis SOC-Log-Analysis Public

    Centralized SOC Log Analysis and SIEM engineering. Writing custom correlation rules for real-time threat detection and lateral movement tracking.