Low-level enthusiast. I enjoy deconstructing complex systems to understand their inner workings, from the PE format to kernel-mode internals.
- Instruction-Level Shredder: Developing a polymorphic engine in Rust focused on instruction substitution and context preservation.
- Next milestone: Implementation of relocation handling for arbitrary shellcode (e.g., CobaltStrike beacons).
- Kernel Research: Exploring UEFI/DSE (Driver Signature Enforcement) bypasses and anticheat evasion techniques.
- Game Security: Developed a functional bypass for the FairGuard anticheat (Joymaker) in Ragnarok Online 3 (RO3) during its closed beta phase (Oct 2025). This involved analyzing Unity-specific protections and internal integrity checks.
- Automotive Engineering: Successfully reversed and bypassed licensing systems in professional vehicle diagnostic tools, including BimmerUtility and other specialized tuning software.
- Binary Analysis: Deep focus on unpacking, de-virtualization, and defeating custom license managers through static and dynamic analysis.
- Efficiency First: I believe in using AI as a force multiplier—handling boilerplate and frontend tasks so I can focus 100% on core logic, architecture, and memory manipulation.
- Continuous Learning: I value technical challenges that break my code. If it doesn't break, I'm not learning.
- Humility in Tech: The deeper you go into the stack, the more you realize how much there is to learn.
x86_64 Assembly | x86_64 Assembly | C/C++ | Python | WinAPI | Unity/C# | Rust
“Just do what u want” - if it involves breaking things, I’m in.