close

DEV Community

GnomeMan4201 profile picture

GnomeMan4201

Self taught Tool Developer who has been building and breaking things for ~6+ years. Mostly hacking, automation, and network tooling

Joined Joined on  github website
Semantic Gradient Evasion: How Embedding-Based Drift Detectors Can Be Bypassed Step by Step

Semantic Gradient Evasion: How Embedding-Based Drift Detectors Can Be Bypassed Step by Step

BERJAYA 2
Comments
10 min read

Want to connect with GnomeMan4201?

Create an account to connect with GnomeMan4201. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
LLM Agents Need a Nervous System, Not Just a Brain

LLM Agents Need a Nervous System, Not Just a Brain

BERJAYA 3
Comments
3 min read
Drift Artifact: A Method for Writing That Performs Its Own Argument

Drift Artifact: A Method for Writing That Performs Its Own Argument

BERJAYA 1
Comments
3 min read
CoderLegion Is Not a Developer Community. It’s a Growth Engine.

CoderLegion Is Not a Developer Community. It’s a Growth Engine.

BERJAYA 4
Comments
3 min read
Operating in Prompt Space: Red Teaming the Control Plane of an LLM

Operating in Prompt Space: Red Teaming the Control Plane of an LLM

BERJAYA 2
Comments
10 min read
LANimals: 7 Comics About the People Who Are Always the Vulnerability

LANimals: 7 Comics About the People Who Are Always the Vulnerability

BERJAYA BERJAYA 3
Comments 1
1 min read
Why I Keep Returning to Pop!_OS

Why I Keep Returning to Pop!_OS

BERJAYA 1
Comments 2
5 min read
Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

BERJAYA BERJAYA 3
Comments 7
13 min read
Has Anyone Else Seen a Suspicious Follower Spike Recently?

Has Anyone Else Seen a Suspicious Follower Spike Recently?

BERJAYA BERJAYA BERJAYA 15
Comments 15
2 min read
zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

zer0DAYSlater: A Modular Adversarial Simulation and Red-Team Research Framework

Comments
5 min read
Reflexive Identity — The Self-Defending AI Agent with Auth0

Auth0 for AI Agents Challenge Submission

Reflexive Identity — The Self-Defending AI Agent with Auth0

BERJAYA BERJAYA BERJAYA 12
Comments 4
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

BERJAYA 1
Comments
10 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

BERJAYA 1
Comments
4 min read
Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

Lies-in-the-Loop (LITL): Attacking (and Defending) Human-in-the-Loop AI Workflows

BERJAYA 1
Comments
4 min read
Surface Watchdog: Building a Self-Running OSINT Daemon in Termux

Surface Watchdog: Building a Self-Running OSINT Daemon in Termux

BERJAYA 1
Comments
4 min read
A Deep Dive: Statically Compiling LLVM 13 on Android with Termux

A Deep Dive: Statically Compiling LLVM 13 on Android with Termux

BERJAYA BERJAYA 2
Comments
2 min read
Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

BERJAYA 1
Comments
5 min read
The Octocat Isn’t What It Seems

The Octocat Isn’t What It Seems

Comments
4 min read
My Laptop’s in Pawn, but I’m Still Building Like I’m Funded 🫠

My Laptop’s in Pawn, but I’m Still Building Like I’m Funded 🫠

BERJAYA 1
Comments
2 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

BERJAYA 1
Comments
2 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

BERJAYA 1
Comments
4 min read
SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

SHENRON (Part 1): Designing Adaptive, Persistent Offense for the Real World

BERJAYA 1
Comments
3 min read
How I Pulled Live Chrome Tokens from Android Without Root using Termux

How I Pulled Live Chrome Tokens from Android Without Root using Termux

BERJAYA 1
Comments
3 min read
LANimals: Lightweight Open‑Source LAN toolkit for Hackers

LANimals: Lightweight Open‑Source LAN toolkit for Hackers

BERJAYA 1
Comments
2 min read
loading...