██████╗ ██████╗ ██████╗██╗ ██╗ ██╗ ██╗ ██████╗ ███████╗
██╔══██╗██╔══██╗██╔════╝██║ ██║ ██║ ██║██╔═████╗██╔════╝
██║ ██║██████╔╝██║ ███████║ ███████║██║██╔██║███████╗
██║ ██║██╔══██╗██║ ██╔══██║ ╚════██║████╔╝██║╚════██║
██████╔╝██║ ██║╚██████╗██║ ██║ ██║╚██████╔╝███████║
╚═════╝ ╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝
{
"alias" : "drCh405",
"role" : "Red Team Operator / Exploit & Malware Developer",
"specialty" : "Turning systems into entry points",
"philosophy" : "If it runs code, it can be owned",
"status" : "Always in a shell somewhere"
}I don't knock on doors. I find the window left open. Gym by day. Exploit developer by night. I live in the space between what's intended and what's possible - that's where vulnerabilities breathe.
| Role | Description |
|---|---|
| 🎯 Penetration Tester | Network, web, and infrastructure. Authorized to break things and document every crack. |
| 🔴 Red Team Operator | Adversary simulation. Full-scope engagements. APT-style campaigns & Ransomware Simulations |
| ⚙️ Exploit Developer | 0-days, PoCs, custom payloads. Low-level exploitation and weaponization. |
| 🦠 Malware Developer | Offensive tooling, C2 frameworks, evasion techniques, and implant engineering. |
Offensive Security
Languages & Tools
Platforms & Frameworks
[ CPTS ] Certified Penetration Tester Specialist
[ CRTO ] Certified Red Team Operator
[ CRTP ] Certified Red Team Lead
[ CAPE ] Certified Active Directory Penetration Expert
[ ODPC ] Offensive Development Practitioner Certification
[ ARTOC ] Advanced Red Team Operations Certification
