Skip to content
View morchidy's full-sized avatar

Highlights

  • Pro

Block or report morchidy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
morchidy/README.md

Overview

This GitHub contains technical projects, labs, and research prototypes focused on:

  • Cybersecurity & security engineering
  • Applied cryptography and cryptanalysis
  • Machine learning for threat detection
  • Systems, protocols, and low-level implementations

Technical Domains

Security Cryptography Machine Learning Systems


Areas of Focus

  • Cryptography & Cryptanalysis

    • Discrete logarithm algorithms (Pollard Kangaroo)
    • Hash function attacks (Merkle–Damgård constructions)
    • AES internals and cryptanalytic tooling
  • Threat Detection & Security Analytics

    • Passive DNS / DNS TXT record analysis
    • Machine-learning-based malicious domain detection
    • Feature extraction and dataset engineering
  • Machine Learning (from scratch & applied)

    • Neural networks implemented without frameworks
    • ML pipelines for security use cases
  • Systems & Development

    • Low-level C implementations
    • Python tooling for large-scale data processing
    • Full-stack experimentation (auth, backend, frontend)

Selected Projects

Some representative repositories:

  • DNS-TXT-Threat-Intelligence
    ML-based detection of malicious domains using DNS TXT records.

  • Pollard-Kangaroo-DLOG
    C implementation of Pollard’s Kangaroo algorithm for discrete logarithms.

  • AES-Cryptanalysis-Toolkit
    Educational framework for understanding and experimenting with AES internals.

  • Merkle-Damgård Second Preimage Attack
    Practical exploration of structural weaknesses in hash constructions.

  • MNIST Neural Network
    Neural network implemented from scratch for educational purposes.


External

  • GitHub is used as a technical portfolio
  • LinkedIn or other professional links may reference selected projects

Pinned Loading

  1. DNS-TXT-Threat-Intelligence DNS-TXT-Threat-Intelligence Public

    AI-powered malicious domain detection through DNS TXT record analysis. Trained on 23M+ domains with 92% accuracy using Decision Tree ML model.

    Python

  2. AES-Cryptanalysis-Toolkit AES-Cryptanalysis-Toolkit Public

    Educational framework for AES cryptanalysis using the Square attack

    C

  3. Pollard-Kangaroo-DLOG Pollard-Kangaroo-DLOG Public

    A cryptographic engineering project implementing Pollard's Kangaroo (Pollard's Lambda) algorithm for computing discrete logarithms in bounded intervals. Features parameter analysis framework and pe…

    C

  4. mnist-neural-network mnist-neural-network Public

    A from-scratch neural network implementation for MNIST handwritten digit recognition using stochastic gradient descent and backpropagation

    Python

  5. YMCHAT YMCHAT Public

    Full-stack web application for managing real-time discussion groups with authentication and permission system.

    JavaScript

  6. merkle-damgard-second-preimage-attack merkle-damgard-second-preimage-attack Public

    A complete C implementation of the Kelsey-Schneier second preimage attack on Merkle-Damgård hash functions using Speck48/96 cipher and Davies-Meyer compression

    C