I'm a reverse engineer and low-level software developer with a focus on Windows internals, malware analysis, and tooling.
I like taking things apart โ binaries, protocols, algorithms โ and building tools that make that process faster and smarter.
Whether it's obfuscated malware, a network protocol nobody documented, or some shady packed executable โ I dive deep.
- ๐ง Reverse engineering โ x86/x64, custom loaders, obfuscated binaries
- ๐ Malware analysis โ API hashing, anti-debug tricks, unpacking, decryptors
- ๐ Exploit & tooling dev โ shellcode, memory injection, WinAPI hash resolvers
- ๐ฒ PRNG & algorithm reversing โ LCG, MT, XOR-mutation-based, encryption logic
- ๐ฎ Game hacking โ client-side logic, anti-cheat bypass, automation
- ๐ค Android automation โ ADB + CV + shell scripting, anti-fraud evasion
- ๐ Protocol reverse engineering โ WebSocket, RPC, custom binary formats
- โ๏ธ Static & dynamic analysis automation โ for scale and repeatability
- Core stack:
C++
,C
,Python
- Also touched:
JS
,Lua
,Pawn
,C#
,Java
,PHP
Curious about some of the stuff I've reversed?
Check out my public notes and writeups here:
๐ Reverse Engineering
โ ๏ธ Most of my RE-related work is private (malware tooling, automation, exploit dev, etc).
What's public here is a small part of what I've done.
It's the closest thing to solving a puzzle where the pieces fight back.
It forces you to understand exactly how something works โ not how it looks on the surface.
That's what I enjoy. That's what I do.