Skip to content
View dyjakan's full-sized avatar
🤘
🤘

Organizations

@Bezpieczny-Kod
Block or Report

Block or report dyjakan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
dyjakan/README.md

Hi, I'm Andrzej! 👋

My cybersecurity career started over 15 years ago. During this time, I moved from hacking to securing, which has given me the perspective of both an attacker and a defender. I currently run a consulting and training company called Bezpieczny Kod. In this role, I'm empowering teams with skills and advising on best practices for securing software across the SDLC.

In recent years, I have trained hundreds of IT specialists (QA, Dev, Ops) in subjects such as Security Testing, Threat Modeling, DevSecOps, and Secure By Design. I emphasize hands-on learning in my trainings, ensuring that engineering teams can immediately put new skills to use in their day-to-day tasks.

The demand I encountered from clients during trainings led me to offer consulting services. As a Trusted Advisor, I now assist companies in establishing and enhancing security for software they're developing.

I'm also an active content creator. I'm building an open community around application security (Discord), run a YouTube channel and Podcast, and send out a weekly newsletter. I've also created an online course "Offensive Testing of Web Applications" (OTWA) and I'm already building another one (on the topic of DevSecOps). My activities are aimed at educating and creating a space for IT professionals to exchange knowledge.

Pinned

  1. osx-syscalls-list osx-syscalls-list Public

    Fish for BSD system calls and MACH traps inside of XNU ✌️

    Python 91 12

  2. interpreter-bugs interpreter-bugs Public

    Fuzzing results for various interpreters.

    Ruby 79 17

  3. conference-talks conference-talks Public

    1

  4. exploit-development-case-studies exploit-development-case-studies Public

    Exploit Development: Case Studies 🔮

    25 8

  5. dtrace-tools dtrace-tools Public

    DTrace-based tools for OS X

    DTrace 5 1

  6. egvm egvm Public

    SensePost's EGVM

    C 2 2