Petko D. Petkov

Petko D. Petkov

United Kingdom
3K followers 500+ connections

About

My professional experience encompasses leadership and technical roles in industries…

Articles by Petko

  • The Nature of Authorship in The AI Era

    The Nature of Authorship in The AI Era

    Recently, I embarked on a project to create a song as a tribute to my colleagues' exceptional work in a specific…

  • Thoughts On Zero Trust

    Thoughts On Zero Trust

    This is an extract from a larger piece of work that I have not finished yet but I thought it might be worth sharing at…

  • Zero Trust Security

    Zero Trust Security

    In episode 4 (0x03) of the cult TV-series Mr. Robot, Elliot hacks into Steel Mountain’s Data Center HVAC system…

Activity

Join now to see all activity

Experience

  • ChatBotKit Graphic

    ChatBotKit

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

  • -

    London, England, United Kingdom

Education

Publications

  • Google Hacking for Penetration Testers: vol. 2

    Elsevier

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings.

    It turns out the rumors are true-creative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the…

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings.

    It turns out the rumors are true-creative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.

    See publication
  • XSS Attacks: Cross Site Scripting Exploits and Defense

    Elsevier

    Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a…

    Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.

    • XSS Vulnerabilities exist in 8 out of 10 Web sites
    • The authors of this book are the undisputed industry leading authorities
    • Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

    See publication

Projects

  • Algo

    Algo is a conversational AI chatbot that is different from ChatGPT.

    Algo is less verbose and more attuned to the user's needs, providing helpful and meaningful insights without a lot of excess chatter.

    Algo does not use your data for further training and model fine-tuning, and it is designed to keep all communication private and secure. You can delete your data at any time. This provides a higher level of control over personal information compared to ChatGPT, which is a public…

    Algo is a conversational AI chatbot that is different from ChatGPT.

    Algo is less verbose and more attuned to the user's needs, providing helpful and meaningful insights without a lot of excess chatter.

    Algo does not use your data for further training and model fine-tuning, and it is designed to keep all communication private and secure. You can delete your data at any time. This provides a higher level of control over personal information compared to ChatGPT, which is a public system and has no provision for data deletion.

    Algo is customizable. It is easy to add domain-specific knowledge and real-time information with datasets, customize Algo's personality and behavior and even embed it into Slack or your website.

  • PeopleAI

    Experience history like never before with our AI chatbots, allowing you to converse with and learn from some of the most influential and significant figures in human history.

  • Codepal

    -

    Codepal is perhaps the first (if not one of the first) ChatGPT-based code generators. It was created soon after the release of ChatGPT out of personal interest. This project lead to another project now known as ChatBotKit (CBK).

  • ChatGPT Agents

    -

    Perhaps some of the first examples how to utilise ChatGPT to build various types of autonomous agents - from coding assistants to chrome extensions, games and much more.

  • Pown.js

    -

    Pown.js is an experimental security framework for node. It aims to be security driven with contributions via NPM package registry. The project is currently in its infancy but it is getting some powerful features constantly.

    See project
  • OpenDevSecOps

    -

    The OpenDevSecOps project mission is to provide a world-class resource for implementing complete devsecops and secops programs within organizations of any shape and size using off-the-shelf tools and access to our vibrant community.

    See project
  • ScanFoundry

    -

    ScanFoundry automatically detects security vulnerabilities so you don't have to. It is built on a universal security testing platform that integrates commercial and open source scanning tools.

    See project
  • WebReaver

    -

    The first in the world web application security scanner for iOS and macOS. Getting this published required having special permissions from Apple.

    See project
  • Foobar

    -

    Foobar is an easy to use, code experimentation, creative coding and code learning development environment for Mac OS X. With Foobar you can test your ideas, learn new programming techniques and algorithms, write small tools, utilities and scripts, all from the same place.

    See project
  • Proxy.app

    -

    Proxy.app is an intercepting web proxy for Mac OS X. The app quickly become a top selling app (Mac AppStore Too 10 Grossing) in both UK and USA. The app is now deprecated in favour of SecApps Suite.

    See project
  • HandsWarmer

    -

    In the cold winter of 2014, I found an unexpected comfort in the warmth emanating from my laptop after prolonged use of my IDE. This peculiar source of relief during the cold sparked an innovative idea. Why not create an application that harnesses the CPU’s heat to warm one’s hands? Thus, the concept of “HandsWarmer” was conceived.

    Determined to bring this idea to life, I embarked on a journey. Contrary to what one might assume, the underlying mechanism of HandsWarmer was not a complex…

    In the cold winter of 2014, I found an unexpected comfort in the warmth emanating from my laptop after prolonged use of my IDE. This peculiar source of relief during the cold sparked an innovative idea. Why not create an application that harnesses the CPU’s heat to warm one’s hands? Thus, the concept of “HandsWarmer” was conceived.

    Determined to bring this idea to life, I embarked on a journey. Contrary to what one might assume, the underlying mechanism of HandsWarmer was not a complex algorithm performing redundant calculations. Instead, its core functionality was elegantly straightforward. The app initiated an additional thread that executed an infinite loop: while(1);. This simple process ensured the CPU remained engaged, generating heat without performing meaningful computations.

    I submitted HandsWarmer to the AppStore, envisioning a world where cold hands were a thing of the past for anyone sitting at an Apple computer. However, my excitement was short-lived. The app was promptly rejected for violating the store’s terms and conditions.

  • Blogsecurify

    -

    Back in the days blogging platforms were a no match to seasoned hackers and the GNUCITIZEN team were really good at it. So we decided to fix it by creating a set of Wordpress plugins and tools to protect Wordpress blog all over the world. This as far as we know were the first security tooling made specifically to protect Wordpress installations.

    See project
  • House Of Hackers

    -

    The first and the only one hacker social network. The network was formed in May 2008 and quickly reached over 30,000 members. Due to many reasons, I had to shut it down. This is by far one of the most regretful decisions ever made by GNUCITIZEN staff.

    See project
  • Agile Hacking

    -

    The idea behind Agile Hacking was to create the first crowdsourced information security resource - essentially an alternative to all information security books combined. The project existed briefly and never materialized to anything other than a few small contributions. We have created a GitHub organization in memory of this project. Feel free to contact us if you want to take the lead.

    See project
  • Exploit Sweetshop

    -

    This was a failed attempt to create a public vulnerability acquisition program. There is more about this over here.

    See project

Languages

  • English

    Native or bilingual proficiency

  • Bulgarian

    Native or bilingual proficiency

Recommendations received

More activity by Petko

View Petko’s full profile

  • See who you know in common
  • Get introduced
  • Contact Petko directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses