Skip to content
View da5ch0's full-sized avatar
🏴‍☠️
sailing
🏴‍☠️
sailing

Block or report da5ch0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
da5ch0/README.md
 ██████╗ ██╗  ██╗██╗██╗     ██████╗ ██████╗ ███████╗███╗   ██╗
██╔════╝ ██║  ██║██║██║     ██╔══██╗██╔══██╗██╔════╝████╗  ██║
██║      ███████║██║██║     ██║  ██║██████╔╝█████╗  ██╔██╗ ██║
██║      ██╔══██║██║██║     ██║  ██║██╔══██╗██╔══╝  ██║╚██╗██║
╚██████╗ ██║  ██║██║███████╗██████╔╝██║  ██║███████╗██║ ╚████║
 ╚═════╝ ╚═╝  ╚═╝╚═╝╚══════╝╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝  ╚═══╝
          O F   T H E   B A U D

never reveal everything you know


$ whoami

dash · he/they · @da5ch0

security researcher · systems thinker · mental health advocate · forbidden librarian

490+ repos. most of them are exactly what they look like. some of them aren't.


$ cat /etc/motd

welcome to the foot clan's forbidden library.

this github exists to make RTFM painless. zines, warez, reference texts, and original research — forked, curated, and organized so the next generation of security professionals doesn't have to dumpster-dive the way we did. if you're here to learn, you're in the right place.

start with the 📌 pinned repos below. then dig.


$ ls -la /research

drwxr-xr-x  ai, machine learning, adversarial robustness, jailbreaking
drwxr-xr-x  cybersecurity, hacking, cryptography, operating systems internals
drwxr-xr-x  systems theory, cybernetics, control theory, variety engineering
drwxr-xr-x  mathematics, graph theory, information theory, formal verification
drwxr-xr-x  neuroscience, psychology, pharmacology, immunology
drwxr-xr-x  philosophy, theology, linguistics, cryptolinguistics
drwxr-xr-x  mental health advocacy, double bind theory
drwxr-xr-x  thermodynamics, acoustics

academic work lives on ORCID → 0009-0007-7537-5703


$ cat pinned.txt

repo what it is
expressiveness-vulnerability-identity mathematical proof that natural language is inherently vulnerable — and that's what makes it powerful
NeedingHelpIsArchitecture reframing help-seeking for hackers, psychologists, and the stubbornly self-reliant
Security_Gospel_per_DoD curated Rainbow Series — the DoD's own security canon, mirrored for practitioners
Apple_illusion_of_thinking_rebuttal dismantling flawed methodology so we can focus on what actually matters
networking_and_graph-theory_CiV graph theory meets Civilization — if it fits too perfectly, you know it's real
Vampires_VanEck_and_AI the actual threat model for AI meeting assistants and leaked data in collaboration channels

the library is open. take what you need. fork what you want. teach someone else.

🐢🐢🐢🐢 — you know who the real enemy is.

please be nice to the librarians making their way between the shelves and keep it to a low roar

Pinned Loading

  1. expressiveness-vulnerability-identity expressiveness-vulnerability-identity Public

    mathematical proof that natural language is an inherently vulnerable medium - but that this dynamic which adds vulnerability is also is what gives it unique capabilities worth exploring

    7 4

  2. NeedingHelpIsArchitecture NeedingHelpIsArchitecture Public

    a helpful reframing for psychologists, psychiatrists, and the hackers who refuse to seek them out

    2

  3. Apple_illusion_of_thinking_rebuttal Apple_illusion_of_thinking_rebuttal Public

    my takedown of the flawed methodology and also what we need to take forward from the flawed paper

    1

  4. networking_and_graph-theory_CiV networking_and_graph-theory_CiV Public

    the networking-derived angle. this one feels too easy, that's how you know it fits perfectly. mind the jokes

  5. Security_Gospel_per_DoD Security_Gospel_per_DoD Public

    a curated selection of the "rainbow series" being mirrored as a public service for practitioners to visit and revisit throughout their cyber/hacking career as needed

    2 1

  6. Vampires_VanEck_and_AI Vampires_VanEck_and_AI Public

    a description of the actual threats posed by AI meeting assistants and non-perceived but trasnmitted data in modern collaboration channels