Skip to content
View otterpwn's full-sized avatar
🦦
ʕ •ᴥ•ʔ
🦦
ʕ •ᴥ•ʔ

Block or report otterpwn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
otterpwn/README.md
ʕ •ᴥ•ʔ


Hi everyone, I'm otter - I mainly play attack CTFs on HackTheBox and VulnLab and rank top 5 on both platforms.



I'm interested in red-teaming, malware development and evasion techniques

You can find me on discord as ottersec, I also have a Gitbook where I post some cool articles - check it out if you want 🦦

ʕ •ᴥ• ʔ 
U * * U  <---- he's watching
  U U

Pinned Loading

  1. blister blister Public

    A Windows rootkit that turns user-land processes into Protected Processes

    C 6 1

  2. cppRecall cppRecall Public

    Dump Microsoft Recall data and images

    C 9

  3. w32TimePersistence w32TimePersistence Public

    Windows persistence technique by adding a Time Provider

    C++ 4

  4. bound bound Public

    Blind AV solutions by setting firewall rules to block outgoing connections

    C++ 6 1

  5. RunasCpp RunasCpp Public

    As the name suggests - RunasCs... but in C++

    C++ 5 1

  6. SSHrecover SSHrecover Public

    A PoC that recovers RSA values from SSH keys.

    Go