Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View zx0CF1's full-sized avatar

Block or report zx0CF1

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
zx0CF1/README.md

Hi, I'm zx0CF1 🦀

Low-level enthusiast. I enjoy deconstructing complex systems to understand their inner workings, from the PE format to kernel-mode internals.


🛠️ Current Grind

  • Instruction-Level Shredder: Developing a polymorphic engine in Rust focused on instruction substitution and context preservation.
    • Next milestone: Implementation of relocation handling for arbitrary shellcode (e.g., CobaltStrike beacons).
  • Kernel Research: Exploring UEFI/DSE (Driver Signature Enforcement) bypasses and anticheat evasion techniques.

🔍 Experience & Research

  • Game Security: Developed a functional bypass for the FairGuard anticheat (Joymaker) in Ragnarok Online 3 (RO3) during its closed beta phase (Oct 2025). This involved analyzing Unity-specific protections and internal integrity checks.
  • Automotive Engineering: Successfully reversed and bypassed licensing systems in professional vehicle diagnostic tools, including BimmerUtility and other specialized tuning software.
  • Binary Analysis: Deep focus on unpacking, de-virtualization, and defeating custom license managers through static and dynamic analysis.

🧠 My Philosophy

  • Efficiency First: I believe in using AI as a force multiplier—handling boilerplate and frontend tasks so I can focus 100% on core logic, architecture, and memory manipulation.
  • Continuous Learning: I value technical challenges that break my code. If it doesn't break, I'm not learning.
  • Humility in Tech: The deeper you go into the stack, the more you realize how much there is to learn.

💻 Tech Stack

x86_64 Assembly | x86_64 Assembly | C/C++ | Python | WinAPI | Unity/C# | Rust


“Just do what u want” - if it involves breaking things, I’m in.

Pinned Loading

  1. shredder-rs shredder-rs Public

    A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.

    Rust 111 10