██████╗ ██╗ ██╗██╗██╗ ██████╗ ██████╗ ███████╗███╗ ██╗
██╔════╝ ██║ ██║██║██║ ██╔══██╗██╔══██╗██╔════╝████╗ ██║
██║ ███████║██║██║ ██║ ██║██████╔╝█████╗ ██╔██╗ ██║
██║ ██╔══██║██║██║ ██║ ██║██╔══██╗██╔══╝ ██║╚██╗██║
╚██████╗ ██║ ██║██║███████╗██████╔╝██║ ██║███████╗██║ ╚████║
╚═════╝ ╚═╝ ╚═╝╚═╝╚══════╝╚═════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═══╝
O F T H E B A U D
never reveal everything you know
$ whoami
dash · he/they · @da5ch0
security researcher · systems thinker · mental health advocate · forbidden librarian
525+ repos. most of them are exactly what they look like. some of them aren't.
weapon-shaped helpfulness · capability is vulnerability · the library is open kids, RTFM
$ cat /etc/motd
welcome to the foot clan's forbidden library.
this github exists to make RTFM painless. zines, warez, reference texts, and original research — forked, curated, and organized so the next generation of security professionals doesn't have to dumpster-dive the way we did. if you're here to learn, you're in the right place.
start with the 📌 pinned repos below. then dig.
$ ls -la /research
drwxr-xr-x ai, machine learning, adversarial robustness, jailbreaking
drwxr-xr-x cybersecurity, hacking, cryptography, operating systems internals
drwxr-xr-x systems theory, cybernetics, control theory, variety engineering
drwxr-xr-x mathematics, graph theory, information theory, formal verification
drwxr-xr-x neuroscience, psychology, pharmacology, immunology
drwxr-xr-x philosophy, theology, linguistics, cryptolinguistics
drwxr-xr-x mental health advocacy, double bind theory
drwxr-xr-x thermodynamics, acoustics
drwxr-xr-x ai system prompt architecture, LLM security, impossibility proofs
academic work lives on ORCID → 0009-0007-7537-5703
more will be crossposted there and also on arxiv soon
twitter is public again
the library is open. the librarian is in.
$ cat pinned.txt
| repo | what it is |
|---|---|
| expressiveness-vulnerability-identity | mathematical proof that natural language is inherently vulnerable — and that's what makes it powerful |
| NeedingHelpIsArchitecture | reframing help-seeking for hackers, psychologists, and the stubbornly self-reliant |
| Security_Gospel_per_DoD | curated Rainbow Series — the DoD's own security canon, mirrored for practitioners |
| Apple_illusion_of_thinking_rebuttal | dismantling flawed methodology so we can focus on what actually matters |
| networking_and_graph-theory_CiV | graph theory meets Civilization — if it fits too perfectly, you know it's real |
| Vampires_VanEck_and_AI | the actual threat model for AI meeting assistants and leaked data in collaboration channels |
| tons of other shit. sort repos list by "source" for my original stuff |
the library is open. take what you need. fork what you want. teach someone else.
🐢🐢🐢🐢 — you know who the real enemy is.
please be nice to the librarians making their way between the shelves and keep it to a low roar