Skip to content
View GHOryy5's full-sized avatar

Block or report GHOryy5

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
GHOryy5/README.md

👋 Hey, I'm GHOryy5

Security Researcher · computer security · AI/ML & Blockchain Threat Research

security is fun



I’m a Security Researcher exploring how emerging technologies can be both weaponized and protected.
My curiosity lives at the intersection of offensive research, cloud security, and AI-driven defense.

I believe security isn’t just a field — it’s a philosophy of curiosity, creativity, and controlled chaos.

“Real security is quiet — it just works while the noise fails.”


🧩 Focus Areas

  • ☁️ Cloud Security
  • 🧠 AI/ML Security
  • 🔗 Blockchain Security


🔬 Current Research Interests

  • AI-driven threat detection and adaptive response
  • Cloud forensics and adversarial simulation
  • Secure AI model deployment pipelines
  • Blockchain fuzzing and decentralized system hardening

🌐 Connect With Me


Pinned Loading

  1. Project-Titan Project-Titan Public

    TITAN is an warefare C2 framework that models how modern operations fuse signals, sensors, and responses in real time. It shows the big picture of connecting data across domains to cut latency and …

    Python

  2. full-scale-Threat-Intelligence-Incident-Response-System- full-scale-Threat-Intelligence-Incident-Response-System- Public

    full scale Threat Intelligence & Incident Response System

    Python

  3. PROTO-WORM PROTO-WORM Public

    Modular protocol analysis & fuzzing framework using Rust, Go, Python, ML, and gRPC. Focused on grammar-aware parsing, stateful testing, and research-safe crash analysis workflows.

    Rust

  4. riko-the-watcher riko-the-watcher Public

    A full-stack, ML-powered system for the early detection of ransomware, phishing, and extortion emails.

    Python

  5. tiny-injection tiny-injection Public

    Python

  6. file-hosting-application- file-hosting-application- Public

    A secure file vault built with React, Django, and Docker. Implements SHA256 deduplication and a Zero Trust download endpoint to prevent IDOR vulnerabilities.

    Python