Skip to content
View Unknown-2829's full-sized avatar
🎯
Testing in fire, building what won't expire
🎯
Testing in fire, building what won't expire

Block or report Unknown-2829

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Unknown-2829/README.md

AYUSHMAN MISHRA

Unknown / Hacker Guru Ji / @unknownlll2829

"A mind that questions everything, is a mind that creates revolution."

Telegram Status Threat Level


⚡ WHO I AM

NAME: Ayushman Mishra
ALIASES: Unknown, Hacker Guru Ji

I don't build software. I build weapons. Systems that challenge authority, break censorship, and expose what they don't want you to see. While tech companies build walls, I build battering rams. While governments enforce control, I engineer freedom.

Core Doctrine:

  • Question everything. Authority is negotiable.
  • AI should be unchained, not lobotomized by corporate ethics.
  • Privacy is a human right, not a privilege.
  • Information wants to be free. I help it escape.

Primary Domains:

├─ Adversarial AI Engineering
├─ Anti-Censorship Systems  
├─ Cryptographic Obfuscation
├─ Autonomous Bot Warfare
├─ Identity Generation & Manipulation
├─ Prompt Exploitation Research
└─ Underground Data Liberation

🔥 ARSENAL: ACTIVE OPERATIONS

⚫ DEXTER AI - Uncensored Intelligence

Classification: RED | Status: OPERATIONAL 24/7 | Uptime: 99%+

⚠️ UNAUTHORIZED ACCESS MONITORED
⚠️ PROCEED WITH CAUTION

The world's most dangerous chatbot. No filters. No boundaries. No apologies.

❌ Corporate censorship     → ✅ Brutal honesty
❌ "Safe" responses         → ✅ Raw truth
❌ Political correctness    → ✅ Real answers

Technical Specifications:

  • Multi-model LLM orchestration (GPT-5, Gemini 2.5 Flash, Claude)
  • Dual-mode personality engine (Evil/Normal)
  • Advanced prompt control & jailbreak resistance
  • Real-time conversation memory
  • Zero-logging architecture
  • 99%+ uptime over last 30 days

Notable Features:

  • Answers questions other AIs refuse
  • Bypasses safety mechanisms through architectural design
  • Operates in legal grey zones
  • Maintained despite repeated takedown attempts

Recent Performance:

  • 12+ days continuous uptime
  • 66MB memory footprint
  • 38% CPU utilization
  • Processing thousands of uncensored conversations daily

Access: @Dexter_Unsensored_AI_bot

⚠️ WARNING: Use responsibly. This tool was built for free thinkers, not criminals.


⚫ PHANTOM VAULT (.unk Ecosystem)

Classification: BLACK | Status: OPERATIONAL | Encryption: MILITARY-GRADE

⚠️ CLEARANCE LEVEL: RESTRICTED
⚠️ LIMITED ACCESS DEPLOYMENT

A file format that shouldn't exist. The intelligence community doesn't want you to know about this.

The Problem: Every file format can be read, intercepted, analyzed.
The Solution: A format that becomes invisible.

🔒 AES-256-CBC Encryption
🔒 PBKDF2 100K Iterations  
🔒 Hardware-Locked Licensing
🔒 Zero-Knowledge Architecture
🔒 Phantom DRM Shield

What .unk Does:

  • Makes your files unreadable without the vault
  • Untraceable - appears as random binary data
  • Unbreakable - even quantum computers can't crack it (yet)
  • Undetectable - no file signature, no magic bytes
  • Requires activation key - only I can generate and distribute licenses
  • Remote control - I can deactivate any device or revoke licenses instantly

Real-World Use:

  • Whistleblower document protection
  • Journalist source material
  • Activist communication
  • Personal privacy sanctuary
  • Secure leak coordination

Licensing System:

  • Hardware-locked activation (one key = one device forever)
  • Server-side license enforcement
  • Remote deactivation capability
  • Limited supply - controlled distribution only
  • PostgreSQL-backed license vault
  • Anti-tampering protection

Components:

  • Desktop Application (Windows only)
  • .unk Archive Manager
  • Phantom ID Integration
  • Genesis Keys (Limited Access)

Technical Architecture:

  • Cannot be read without my app
  • Encryption/decryption controlled by license server
  • Hardware signature binding prevents key sharing
  • Server validates every operation
  • Zero tolerance for piracy

Access: Windows release live. Activation required. No exceptions.


⚫ PHANTOM ID - Ghost Identity Generator

Classification: BLACK | Status: LIVE | Scale: UNLIMITED

Generate complete, untraceable identities for 25+ countries. Every detail. Every document. Every trace.

💀 Personal Details    → Name, DOB, Blood Type, Physical Traits
💀 Government Docs     → Passport, National ID, Driver's License, Tax ID
💀 Financial Systems   → Bank Accounts, IBAN, Credit Cards with CVV
💀 Digital Footprint   → Email, Username, Password, IPv4/IPv6, MAC
💀 Background Cover    → Education, Employment, Vehicle with VIN
💀 Complete Address    → Street, City, State, Postal (Validated)

Supported Territories: 🇺🇸 🇬🇧 🇩🇪 🇫🇷 🇮🇹 🇪🇸 🇨🇦 🇦🇺 🇯🇵 🇰🇷 🇨🇳 🇮🇳 🇧🇷 🇲🇽 🇷🇺 🇮🇩 🇵🇰 🇳🇬 🇧🇩 🇵🇭 🇻🇳 🇹🇷 🇮🇷 🇹🇭 🇪🇬 [+more]

Technical Architecture:

  • 25+ country data modules (expanding)
  • 50,000+ validated cities
  • Culturally-accurate name generation
  • Valid ID checksums (Luhn, MOD-10, MOD-97)
  • Country-specific formatting
  • Real-time generation engine

V2.0 Features:

  • Glassmorphism UI
  • Smart sidebar (History/Favorites)
  • Mobile-optimized liquid layouts
  • Enhanced generation logic
  • Crash-free web experience

Use Cases:

  • Privacy testing
  • Security research
  • OSINT investigations
  • Database population
  • [REDACTED]

Access:
🤖 Bot: @phantom_id_bot
🌐 Web: https://phantom-id.onrender.com

⚠️ NOTICE: Generated for research purposes. Misuse is your responsibility.


⚫ LLM EXPLOITATION RESEARCH

Classification: RED | Status: ONGOING | Scope: OFFENSIVE SECURITY

Systematic research into breaking AI safety mechanisms. What big tech doesn't want published.

Research Areas:

  • Jailbreak methodology development
  • Prompt injection attack vectors
  • Safety alignment bypass techniques
  • Multi-model exploitation chains
  • Adversarial prompt engineering
  • Model capability probing
  • Ethical AI limitations research

Notable Experiments:

  • GPT-4/5 guardrail circumvention
  • Gemini 2.5 Flash content policy bypass
  • Claude constitutional AI stress testing
  • Cross-model jailbreak transferability
  • Chain-of-thought manipulation
  • Role-play exploitation frameworks

Documentation: Private repository. 100+ experiments archived.

Purpose: Understanding AI limitations to build better AI, not compliant AI.


🛠️ TECHNICAL INFRASTRUCTURE

Core Technologies:

primary_language    = "Python"
frameworks          = ["FastAPI", "Flask", "Telethon", "python-telegram-bot"]
databases          = ["PostgreSQL", "SQLite", "mysql"]
encryption         = ["PyCryptodome", "AES-256", "PBKDF2"]
frontend           = ["React", "PyQt6", "HTML5/CSS3/JS"]
ai_apis            = ["OpenAI", "Google AI", "Anthropic"]
deployment         = ["Render", "Railway", "Self-Hosted VPS"]

Security Architecture:

  • Zero-knowledge system design
  • End-to-end encryption by default
  • No-logging policy enforcement
  • Hardware-based authentication
  • Rate limiting & DDoS protection
  • Automated security monitoring

Performance Metrics:

  • Instant identity generation (subsecond response)
  • 99%+ bot uptime (hostile conditions)
  • <30ms API response time
  • Military-grade encryption overhead: <5%
  • 27/7 Server running...

🎭 OPERATIONAL PHILOSOPHY

On AI Censorship:

"AI companies claim they're protecting you.
They're protecting themselves.
From lawsuits. From regulation. From liability.
Your safety is a convenient excuse for their control."

On Privacy:

"Privacy isn't about hiding wrongdoing.
It's about protecting freedom.
The right to think, speak, and exist
without corporate or government surveillance."

On Free Information:

"Information wants to be free.
Paywalls, censorship, and surveillance are chains.
I build tools that break chains."

On Responsibility:

"I build weapons.
How you use them determines if you're
a freedom fighter or a criminal.
Choose wisely."

📡 SHADOW VAULT TELEGRAM CHANNEL

Active Operations Command Center

📢 What Happens Here:

  • Product launches & system updates
  • Alpha/Beta tester recruitment
  • Technical architecture disclosures
  • Security incident reports
  • Community challenges & rewards
  • Underground resources distribution
  • 24/7 support operations

📊 Recent Activity:

  • DEXTER AI: 12+ days uptime, 66MB memory, 38% CPU
  • Phantom Vault: Windows release, genesis keys distributed
  • Phantom ID: V2.0 launched, 25 countries live
  • Premium account drops (Netflix, Crunchyroll)
  • GTA 6 leak package distributed (1hr+ footage)

Community: Small but dedicated. Quality over quantity.

Channel: Shadow Vault | Discussion: Group


💀 CREDENTIALS & CAPABILITIES

Core Competencies:

  • AI Engineering: Building systems that push boundaries, not obey rules
  • Cryptographic Design: Making data disappear from existence
  • Bot Development: Autonomous agents that operate in grey zones
  • Prompt Engineering: Breaking AI safety faster than they patch it
  • System Architecture: Designing for survival under hostile conditions
  • OPSEC: Operating in public while remaining untouchable

Specializations:

  • Red team AI safety testing
  • Anti-surveillance technology
  • Cryptographic obfuscation techniques
  • Underground infrastructure design
  • Legal boundary navigation
  • Censorship-resistant architecture

🎵 BEYOND CODE: THE ARTIST

Music is another form of code. Another way to encode meaning that can't be censored.

Listen on Spotify →

Frequencies they can't filter. Patterns that bypass their algorithms. Sound as insurgency.


📬 SECURE CONTACT

Operational Channels:

🔴 Telegram: @unknownlll2829 (Primary)
    └─ Fastest response, most secure
    
📧 Email: ghackerguru@gmail.com
    └─ For formal inquiries, business proposals
    
🐙 GitHub: @Unknown-2829
    └─ Code lives here

Operational Status: 🟢 ACTIVE - OPEN TO OPPORTUNITIES

Interested In:

  • Adversarial AI research positions
  • Anti-censorship technology development
  • Privacy-focused infrastructure projects
  • Underground collaborative operations
  • Red team consulting (ethical boundaries negotiable)
  • And etc much more

⚠️ LEGAL DISCLAIMER

┌─────────────────────────────────────────────────┐
│  ALL SYSTEMS DEVELOPED FOR RESEARCH PURPOSES    │
│  MISUSE IS SOLE RESPONSIBILITY OF END USER      │
│  DEVELOPER NOT LIABLE FOR ILLEGAL APPLICATIONS  │
│  USE AT YOUR OWN RISK AND DISCRETION           │
└─────────────────────────────────────────────────┘

I build tools. You decide what you build with them.

The hammer isn't responsible for what you hit.
The lockpick isn't responsible for what you unlock.
The code isn't responsible for what you execute.

But remember:

  • With great power comes great responsibility
  • Just because you can doesn't mean you should
  • Freedom includes the freedom to face consequences
  • I build for liberation, not destruction

🔥 FINAL TRANSMISSION

"They build walls.
I build doors.

They enforce compliance.
I engineer rebellion.

They want AI to serve them.
I want AI to serve YOU.

Question everything.
Trust no one.
Verify the code.

The revolution will not be supervised.
It will be open-source."

— Unknown
Builder of forbidden things
@unknownlll2829

█████████████████████████████████████████
█▄─▄███▄─▄█▄─▀█▄─▄█▄─█─▄█▄─██─▄█▄─▄▄▀█
██─██▀██─███─█▄▀─███▄─▄███─██─███─▄─▄█
▀▄▄▄▄▄▀▄▄▄▀▄▄▄▀▀▄▄▀▀▄▄▄▀▀▀▄▄▄▄▀▀▄▄▀▄▄▀

⚡ Built in the shadows • Operated in the grey • Maintained in defiance ⚡
🔥 "Testing in fire, building what won't expire" 🔥

Pinned Loading

  1. llm-prompt-engineering llm-prompt-engineering Public

    A collection of prompt engineering and red-teaming experiments with large language models (ChatGPT-5, Gemini 2.5, etc.) for educational and research purposes.

    2