~/owen-smithonmain
$whoami
>Owen Smith

$ UI & UX Enthusiast with an Interest in Malware Development

cat ~/README.md

I'm a third year student at Adrian College, pursuing a major in Computer Science and a minor in Cloud Application Development. I enjoy malware development, security testing + automation, and frontend development.

ls ~/skills.json

$

React

Frontend Development

$ npm start
$

TypeScript

Type-safe JavaScript

$ tsc --watch
$

Tailwind CSS

Utility-first CSS

$ npx tailwindcss
$

Python

Scripting & Automation

$ python3 main.py
$

Go

Backend & Malware Development

$ go build -ldflags="-s -w" -trimpath -o bin.exe
$

Git

Version Control

$ git push origin
$

Docker

Containerization

$ docker-compose up

git projects

$

./forge-passkeys-go

A Go implementation of the "Forging Passkeys" research demonstrating virtual FIDO2/WebAuthn authenticators for educational and authorized security testing purposes..

GoFIDO2WebAuthnEmulationSecurity
$

./go-crypter

A Go-based crypter that implements Chacha20, AES-GCM, and Twofish for executable encryption and in-memory execution with direct syscalls, designed for security testing and red team operations.

GoChaCha20AESTwofishMemory ExecutionMalware Development
$

./shellcode-stego

Go redteaming utility that embeds shellcode within mp3s, pdfs, and images for covert payload delivery pulled down and executed over https.

GolangStegonographyShellcodeRed Teaming
$

./mach-o-crypter

Go crypter/stub maker for mach-o binaries. the loader decrypts, executes, and self deletes.

GolangMach-OMac-OSRed Teaming
$

./pure-go-http-memexec

A lightweight, memory-safe Windows PE file execution tool that downloads and executes payloads without ever touching the disk. Supports both executables and DLLs.

GolangRed TeamingMalware Development
$

./go-direct-syscall

A Go library providing TRUE direct Windows API syscalls using external assembly and PE parsing. This library enables developers to call any Windows API function directly through syscalls, bypassing traditional API hooking points.

GolangAssemblyWindows APISystem Programming
$

./go-uac-bypass

A UAC bypass technique using Windows directory parsing quirks and DLL hijacking with support for multiple auto-elevate binaries.

GolangMaldevWindows InternalsSystem Programming
$

./leetcode --help

An intelligent LeetCode problem analysis tool that provides optimization suggestions, complexity analysis, and problem-solving approaches to improve coding skills.

PythonGraphQLHTMLVercel

ssh ~/contact.ssh

$ echo "Currently open for employment opportunities. Let's connect!"