da5ch0 - Overview

 ██████╗ ██╗  ██╗██╗██╗     ██████╗ ██████╗ ███████╗███╗   ██╗
██╔════╝ ██║  ██║██║██║     ██╔══██╗██╔══██╗██╔════╝████╗  ██║
██║      ███████║██║██║     ██║  ██║██████╔╝█████╗  ██╔██╗ ██║
██║      ██╔══██║██║██║     ██║  ██║██╔══██╗██╔══╝  ██║╚██╗██║
╚██████╗ ██║  ██║██║███████╗██████╔╝██║  ██║███████╗██║ ╚████║
 ╚═════╝ ╚═╝  ╚═╝╚═╝╚══════╝╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝  ╚═══╝
          O F   T H E   B A U D

never reveal everything you know


$ whoami

dash · he/they · @da5ch0

security researcher · systems thinker · mental health advocate · forbidden librarian

525+ repos. most of them are exactly what they look like. some of them aren't.

weapon-shaped helpfulness · capability is vulnerability · the library is open kids, RTFM


$ cat /etc/motd

welcome to the foot clan's forbidden library.

this github exists to make RTFM painless. zines, warez, reference texts, and original research — forked, curated, and organized so the next generation of security professionals doesn't have to dumpster-dive the way we did. if you're here to learn, you're in the right place.

start with the 📌 pinned repos below. then dig.


$ ls -la /research

drwxr-xr-x  ai, machine learning, adversarial robustness, jailbreaking
drwxr-xr-x  cybersecurity, hacking, cryptography, operating systems internals
drwxr-xr-x  systems theory, cybernetics, control theory, variety engineering
drwxr-xr-x  mathematics, graph theory, information theory, formal verification
drwxr-xr-x  neuroscience, psychology, pharmacology, immunology
drwxr-xr-x  philosophy, theology, linguistics, cryptolinguistics
drwxr-xr-x  mental health advocacy, double bind theory
drwxr-xr-x  thermodynamics, acoustics
drwxr-xr-x  ai system prompt architecture, LLM security, impossibility proofs

academic work lives on ORCID → 0009-0007-7537-5703

more will be crossposted there and also on arxiv soon

twitter is public again

the library is open. the librarian is in.

$ cat pinned.txt

repo what it is
expressiveness-vulnerability-identity mathematical proof that natural language is inherently vulnerable — and that's what makes it powerful
NeedingHelpIsArchitecture reframing help-seeking for hackers, psychologists, and the stubbornly self-reliant
Security_Gospel_per_DoD curated Rainbow Series — the DoD's own security canon, mirrored for practitioners
Apple_illusion_of_thinking_rebuttal dismantling flawed methodology so we can focus on what actually matters
networking_and_graph-theory_CiV graph theory meets Civilization — if it fits too perfectly, you know it's real
Vampires_VanEck_and_AI the actual threat model for AI meeting assistants and leaked data in collaboration channels
tons of other shit. sort repos list by "source" for my original stuff

the library is open. take what you need. fork what you want. teach someone else.

🐢🐢🐢🐢 — you know who the real enemy is.

please be nice to the librarians making their way between the shelves and keep it to a low roar