Skip to content
View BuildAndDestroy's full-sized avatar
  • USA

Block or report BuildAndDestroy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BuildAndDestroy/README.md

👋 Hey there, I'm Mitch O'Donnell

🚨 Offensive Security Engineer | 🛡️ Product & Application Security | ☁️ Cloud Security Specialist
📍 Based in the U.S. | 🧠 Think Red, Act Strategic | 🧰 Golang + Python + Kubernetes + AWS

Welcome to my GitHub! I work at the intersection of offensive security and product resilience—where breaking things makes the product better. My experience spans vulnerability research, Red Team operations, AppSec, Cloud Security, and PSIRT advisory.

I design and execute adversary simulations, develop custom malware and C2 infrastructure, and deliver technical risk insights that guide product teams and engineering leadership. My work often involves:

  • 🔬 Building custom payloads in Go, Python, PowerShell, and C++
  • ☁️ Running ops in AWS, Azure, and Kubernetes
  • 📦 Containerizing exploits and automation with Docker
  • 🛠️ Automating reporting with Ghostwriter, Vectr, and internal tooling
  • 📊 Contributing to PSIRT and threat modeling workflows

You’ll find a mix of PoCs, tools, and research on here - some personal, some from past or sanitized work projects.

🔗 Links


📫 Let’s connect

Whether you're into red teaming, offensive security, cloud infrastructure, or open-source collaboration, feel free to reach out.

"Oof"

Popular repositories Loading

  1. container_toolkit container_toolkit Public

    Deploy Docker, Kubernetes, and Rancher

    Shell 16 10

  2. c2-redirectors c2-redirectors Public

    Automate c2 redirector deployments.

    Shell 11 1

  3. reaperware reaperware Public

    Threat emulation, post exploitation to test the Blue Team against encrypted systems

    Go 6 3

  4. help_pentesters help_pentesters Public

    Python 5 2

  5. ghostwriter-templates ghostwriter-templates Public

    Templates for Ghostwriter, by SpecterOps

    5

  6. powershell-empire-custom powershell-empire-custom Public

    Customize powershell-empire to exploit kubernetes

    Python 3 2