Skip to content
View whoami-pantheon's full-sized avatar
🌴
Growing...
🌴
Growing...

Block or report whoami-pantheon

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
whoami-pantheon/README.md

Bearer of Subtle Chaos

I build architectures that survive contact with the real world: real users, real incentives, real adversaries, and inform strategic decisions. I trace patterns and show the failure modes that emerge when systems "work".

  • Specialties: Adversary simulation, human attack surfaces, security strategy, systems thinking.

  • Current Engine(s):

    • BlackMorror - Hyper-realistic adversary simulation engine identifying security gaps before they manifest (A mirror of adversarial thought).
    • HASIx (Human Attack Suface Index) - A quantitative framework for measuring human attack surface at individual and organizational levels.
    • Oracle - A behavioral engine that maps public trails into the specific moment a structure’s human layer will fail.
  • Philosophy: Code like a map; Notice the gaps, trace the edges, understand how the engine folds back on itself.

Here, you'll notice the unusual is standard:

  • Commits read like scars; Each one a lesson in what the core tried to reject.

  • Architecture is memory; If you do not account for the ghost in the machine, it will eventually drive the vehicle.

  • and experiments become tools; accidents become variables to be harnessed.

Everything exists in the tension between precision and chaos. Between what works and what forces you to look twice.

If you linger here long enough, you’ll notice odd habits: the way behavior leaves fingerprints in the system, the way choices leave invisible trails, the way rules bend without breaking.

In this space, systems remember what you forget.

  • 🌍 Operating remotely from Nigeria
  • ✉️ Contact: [email protected]
  • 🤝 I'm open to collaborating on work that challenge the symmetry of power, uncovers hidden patterns, or leaves a permanent mark on the infrastructure of the real.
  • ⚡ Observing the ways human behaviour, machine intelligence, and security protocols influence one another.



Pinned Loading

  1. BlackMorror BlackMorror Public

    Hyper-realistic adversary simulation engine identifying security gaps before they manifest. Automates red team operations with AI agents, scripted payloads, and orchestrated workflows. Creates mock…

  2. The-Sovereign-AI-Framework The-Sovereign-AI-Framework Public

    Advanced architectures bridging the gap between strategic intent and secure execution. A standardized logic library transforming LLMs into specialized partners for objective reasoning, secure archi…

  3. MirrorWalk MirrorWalk Public

    Engineering systemic memory through data hermeticism. A local-first OCR engine for indexing visual artifacts and resolving the problem of information entropy.

    Python

  4. DirReaper DirReaper Public

    DirReaper: A fast, asynchronous web crawler to reap the harvest of directory traversal vulnerabilities. It also works on websites without traversal vulnerabilities.

    Python 1

  5. Kaiser-Cheatsheets Kaiser-Cheatsheets Public

    Cheatsheets I compiled for my use when pentesting & fixing issues in Linux

    1

  6. EmailThiefer EmailThiefer Public

    Weird name... I know 😉. An OSINT tool to hunt and extract all email addresses on a website and/or its sub-domains

    Python