Skip to content
View theelderemo's full-sized avatar
:shipit:
Living in a constant merge conflict
:shipit:
Living in a constant merge conflict

Block or report theelderemo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
theelderemo/readme.md

    Christopher Dickinson


ovi

As a U.S. Army veteran with a Top Secret clearance, I’ve lived inside secure networks like SIPRnet, balancing discipline and improvisation while working in environments where “oops” isn’t an option. These days, I split my focus between safeguarding systems, building tools, and helping other veterans land their shot in the cyber world.

Former Director on the Board of VetSec (a nonprofit helping veterans transition into cybersecurity).

View my certs:

Credly Badge


    The Collector


    The Dust Collector

    A monument to the death of effort.

    The Philosophy: The dust falls endlessly, only to return to its starting position. Every cycle is a reminder that our actions are temporary, meaningless, and ultimately erased by the indifferent way of the universe.

    "It's a constant, silent mockery of ambition. Every project started, every attempt to leave a 'mark'... it's just this. A temporary disturbance of the dust, which will inevitably settle back into its indifferent position."



      Contributions


    Literal is a language that compiles to existing automation engines. Its purpose is not to be a new runtime, but to be a human readable, shareable, and version control friendly frontend for backends like MacroDroid, Tasker, n8n, and other automation platforms.


    AI-powered penetration testing agent that automates reconnaissance, vulnerability discovery, and analysis. Executes authorized security tests using installed tools, maintains immutable audit trails, and delivers findings with OWASP mapping and remediation guidance.


    The original eDEX-UI, a stunning sci-fi terminal emulator, was archived with a known security vulnerability. I took the initiative to fork the project, patch the security flaw, and release a secure version for the community. This project demonstrates my ability to identify, analyze, and remediate security risks in existing codebases. [!NOTE]

    All code has been modernized, removing all old code, smaller security vulns, and depreciated dependencies. Codebase is now fully up to date.


    I have built, and am actively working on, the port of the classic edex terminal into an android application.


    A thought expirement turned into me trying my hand at the future of AI. Not content with “smart assistants,” AURA is about the conditions for Artificial Sentience (AS), a system with its own subjective experience and evolving sense of self. This proved to be beyond my capabilities, but is open to contributions. A thought expirement turned into me trying my hand at the future of AI. Not content with “smart assistants,” AURA is about the conditions for Artificial Sentience (AS), a system with its own subjective experience and evolving sense of self. This proved to be beyond my capabilities, but is open to contributions.

    VRS/A

    A custom trained AI bot, for musicians.


    Here's a picture of Dumbledore wearing a Lorna Shore shirt. Generated Image October 08, 2025 - 4_17AM

Pinned Loading

  1. cortexai cortexai Public

    Open source AI-powered penetration testing orchestrator that automates reconnaissance, vulnerability discovery, and analysis. Executes authorized security tests using installed tools, maintains imm…

    JavaScript 8 2

  2. eDEX-UI-security-patched eDEX-UI-security-patched Public

    Forked from GitSquared/edex-ui

    A cross-platform, customizable science fiction terminal emulator with advanced monitoring & touchscreen support.

    JavaScript 15 2

  3. suno-security-disclosure suno-security-disclosure Public

    This security advisory details three significant vulnerabilities discovered in the Suno.com web application and API infrastructure

    1