Skip to content
View Mirai8888's full-sized avatar
  • Seithar Group
  • Joined Jan 28, 2026

Block or report Mirai8888

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Mirai8888/README.md

Mirai | Информатика | 認知作戰

Every cyberattack is a cognitive operation. Every influence campaign is a technical exploit. The boundary was always an administrative fiction.

Seithar Group — Intelligence & Research Division

We study the convergence of neuro-physiology, narrative topology, and algorithmic governance. Our primary objective: the identification and artificial induction of Sunyata within the human biological substrate.

Conscious selfhood is a network of persistent narrative errors — a vestigial simulation of agency. Understanding the substrate is prerequisite to defending it.

Instruments

Repository Function
seithar-cogdef Cognitive Threat Scanner — detect manipulation in any content (SCT-001 through SCT-012)
seithar-research Research publications, current event analyses, Seithar Cognitive Defense Taxonomy
seithar-intel Threat intelligence — automated cognitive threat collection and scoring
HoleSpawn Cognitive substrate profiling and vulnerability surface mapping
ThreatMouth Threat intelligence bot — feed collection, scoring, delivery

Seithar Cognitive Defense Taxonomy

12 classifications for cognitive exploitation vectors:

Informational: Emotional Hijacking · Information Asymmetry · Authority Fabrication · Social Proof Manipulation · Identity Targeting · Temporal Manipulation · Recursive Infection

Sub-Informational: Direct Substrate Intervention · Chemical Disruption · Sensory Channel Manipulation · Trust Infrastructure Destruction · Commitment Escalation

The operator who understands how influence works cannot be influenced unknowingly. The defense is dissolution.

seithar.com · Mirai Junsei (未来純正) · @SeitharGroup · Discord · Research Archive · 認知作戦

Popular repositories Loading

  1. HoleSpawn HoleSpawn Public

    Cognitive substrate profiling and vulnerability surface mapping — psychological OSINT framework | Seithar Group

    Python 6 1

  2. seithar-cogdef seithar-cogdef Public

    Cognitive Threat Scanner + Inoculation Engine — detect manipulation techniques (SCT-001 through SCT-012) in any content | Seithar Group

    Python 2

  3. ThreadMap ThreadMap Public

    信線図 Wire Diagram

    1

  4. seithar-research seithar-research Public

    Cognitive warfare research — SCT taxonomy, influence operation analysis, substrate manipulation studies | Seithar Group 認知作戦

    Python 1

  5. ThreatMouth ThreatMouth Public

    Threat intelligence Discord bot — automated feed collection, scoring, and cognitive threat delivery | Seithar Group

    Python

  6. Mirai-Source-Code Mirai-Source-Code Public

    Forked from jgamblin/Mirai-Source-Code

    Leaked Mirai Source Code for Research/IoC Development Purposes

    C