An expert Systems Programmer and Reverse Engineer with deep specialization in Windows internals, game hacking, and binary obfuscation. Demonstrates mastery of modern C++ (including C++23) and extensive experience manipulating low-level system APIs, kernel drivers, and anti-cheat mechanisms.
Score Context: The score reflects exceptional depth in systems programming and reverse engineering. While some projects lack production polish, the technical complexity and specific focus demonstrate expert-level capability in the security domain.
An even funnier way to disable windows defender. (through WSC api)
PE (and elf now!) bin2bin obfuscator
capcom-like executor for any physmem driver
Tackles extremely difficult domains such as kernel drivers, AV evasion, and cryptographic analysis.
Rapid adoption of bleeding-edge language standards (C++23) in projects like 'obfuscator' and 'common'.
Inconsistent; 'defendnot' is exemplary, whereas 'nvidia-overlay-renderer' lacks basic instructions.
The entire portfolio is dedicated to security research, offensive tooling, and defensive analysis.
Demonstrates expert-level command of C++23 features, template metaprogramming, and complex memory manipulation across multiple advanced projects.
Extensive portfolio involving IDA/x64dbg plugins, shellcode analysis, opaque predicate generation, and game internal modifications.
Deep usage of undocumented WSC APIs, kernel driver development (Ring-0), and process memory manipulation.
Implemented a sophisticated PE/ELF bin2bin obfuscator using Z3 constraint solving and analyzed Spotify's DRM cryptography.
Competent usage for auxiliary tooling, bots, and IDA plugins, serving as a support language to the primary C++ work.
Get docs, diagrams, scorecards, and reviews for any repository. Understand code faster.