Skip to content
View broeneatsdinner's full-sized avatar

Block or report broeneatsdinner

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
broeneatsdinner/README.md

Broen Westberg

Security-minded systems operator and tool builder focused on offensive security, AI security, Linux and macOS systems, and practical automation.

I enter unfamiliar systems, map how they work, identify what matters, and organize them so teams do not get lost.

LinkedIn


What I build

  • Operator-focused command-line tooling
  • Linux and macOS systems automation
  • SSH, server, and VM operations tooling
  • Media-processing pipelines
  • Repo hygiene and inventory tools
  • Security-focused experiments and workflows

Most of my repositories remain private while they are security-sensitive, local, or personal in nature. Public repositories here are intentionally cleaned, standardized, and ready to share.


Current focus

  • AI security and LLM application security
  • Offensive security practice, methodology, tooling, and home-lab work
  • Linux and macOS administration across VMs, cloud servers, and personal infrastructure
  • Standardizing command-line tooling, repo hygiene, and environment-audit workflows
  • Preparing selected private tools for public release through security review and documentation

Working philosophy

  • Fundamentals first
  • Light kit, heavy skill
  • Make systems inspectable
  • Quick execution, meticulous standards
  • Prefer boring, readable code
  • Build tools that explain where they live and what they do

Technical interests

  • Hardware-level security research and embedded systems
  • Social engineering as an offensive security testing discipline
  • Taking systems apart to understand how they work, then rebuilding or modifying them with intent
  • Signal capture, transmission behavior, and exploring what is observable in the air
  • Quiet movement through systems: observe, understand, document, and leave cleanly

Operator ethos

I build systems, then make them inspectable.
I document what matters.
I standardize what repeats.
I maintain what I depend on.
I audit my environments.
I turn repeated friction into tooling.

Systems engineering.
Security mindset.
Operator DNA.


Broen Westberg
Security practitioner · systems operator · tool builder


Nothing, LLC

Pinned Loading

  1. standards standards Public

    Public standards, reusable shell components, prompt guidance, and operator-style conventions for my tools, dotfiles, automation workflows, and project ecosystems.

    HTML

  2. unixorn/tumult.plugin.zsh unixorn/tumult.plugin.zsh Public

    Tumult is a collection of macOS-specific functions and scripts for your shell environment. It is packaged as a ZSH plugin, but can be used with other shells as well.

    Shell 211 19

  3. olatools olatools Public

    DU Cybersecurity - Head Down, Spirits Up, Let's Break In

    Shell

  4. grow-a-garden-websocket grow-a-garden-websocket Public

    Real-time WebSocket listener for Grow a Garden on Roblox (Mac support, notifications)

    Python 2 4

  5. macspoof macspoof Public

    On-Demand MAC Address Spoofing with Safe Restore and Logging

    Shell

  6. Speed up launch of Terminal or iTerm 2 Speed up launch of Terminal or iTerm 2
    1
    # Apple keeps system logs in
    2
    # /private/var/log/asl/
    3
    # and stores them in .asl plaintext files.
    4
    #
    5
    # These log files are loaded into terminal during launch,