Skip to content
View drCh405's full-sized avatar
🖥️
Offensive Security Enthusiast
🖥️
Offensive Security Enthusiast

Block or report drCh405

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
drCh405/README.md
██████╗ ██████╗  ██████╗██╗  ██╗ ██╗  ██╗ ██████╗ ███████╗
██╔══██╗██╔══██╗██╔════╝██║  ██║ ██║  ██║██╔═████╗██╔════╝
██║  ██║██████╔╝██║     ███████║ ███████║██║██╔██║███████╗
██║  ██║██╔══██╗██║     ██╔══██║ ╚════██║████╔╝██║╚════██║
██████╔╝██║  ██║╚██████╗██║  ██║      ██║╚██████╔╝███████║
╚═════╝ ╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝     ╚═╝ ╚═════╝ ╚══════╝

chaos is the vector. root is the destination.

Typing SVG


$ whoami

{
  "alias"      : "drCh405",
  "role"       : "Red Team Operator / Exploit & Malware Developer",
  "specialty"  : "Turning systems into entry points",
  "philosophy" : "If it runs code, it can be owned",
  "status"     : "Always in a shell somewhere"
}

I don't knock on doors. I find the window left open. Gym by day. Exploit developer by night. I live in the space between what's intended and what's possible - that's where vulnerabilities breathe.


$ cat roles.txt

Role Description
🎯 Penetration Tester Network, web, and infrastructure. Authorized to break things and document every crack.
🔴 Red Team Operator Adversary simulation. Full-scope engagements. APT-style campaigns & Ransomware Simulations
⚙️ Exploit Developer 0-days, PoCs, custom payloads. Low-level exploitation and weaponization.
🦠 Malware Developer Offensive tooling, C2 frameworks, evasion techniques, and implant engineering.

$ ls ./skills

Offensive Security

Penetration Testing Red Teaming Exploit Dev Malware Dev 0-Day Research APT Simulation

Languages & Tools

Python C C++ Assembly PowerShell Bash Rust

Platforms & Frameworks

Kali Linux Cobalt Strike


$ cat certifications.txt

[ CPTS  ]  Certified Penetration Tester Specialist
[ CRTO  ]  Certified Red Team Operator
[ CRTP  ]  Certified Red Team Lead
[ CAPE  ]  Certified Active Directory Penetration Expert
[ ODPC  ]  Offensive Development Practitioner Certification
[ ARTOC ]  Advanced Red Team Operations Certification
[ drCh405 — Offensive Security Expert ]
chaos is not a bug. it's the malware.

Visitor Count

Popular repositories Loading

  1. RedTeam-Tools RedTeam-Tools Public

    Forked from A-poc/RedTeam-Tools

    Tools and Techniques for Red Team / Penetration Testing

  2. mip22 mip22 Public

    Forked from makdosx/mip22

    💻 📱 mip22 is a advanced phishing tool

    Shell

  3. hackerone-reports hackerone-reports Public

    Forked from InsiderPhD/hackerone-reports

    Top disclosed reports from HackerOne

    Python

  4. toxssin toxssin Public

    Forked from t3l3machus/toxssin

    An XSS exploitation command-line interface and payload generator.

    Python

  5. RedTeam-OffensiveSecurity RedTeam-OffensiveSecurity Public

    Forked from bigb0sss/RedTeam-OffensiveSecurity

    Tools & Interesting Things for RedTeam Ops

    Python

  6. MalwareSourceCode MalwareSourceCode Public

    Forked from vxunderground/MalwareSourceCode

    Collection of malware source code for a variety of platforms in an array of different programming languages.

    Assembly