Skip to content
View Invalid-ptr's full-sized avatar
:shipit:
IOMMU Defeated
:shipit:
IOMMU Defeated

Block or report Invalid-ptr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Invalid-ptr/README.md

👋 Hello, I'm ! Invalid Pointer

🔐 Security Research & Engineering

Computer Science Engineering Student (Year 2) passionate about offensive and defensive cybersecurity research. I specialize in advanced threat simulation, evasion techniques, and system security.

🎯 Research Focus Areas

🔍 Advanced Persistent Threat (APT) Development
🛡️ EDR/AV Evasion & Sandbox Detection
🔧 Kernel-Level Security Research (Ring 0)
💻 Malware Analysis & Reverse Engineering
⚡ Hypervisor (Ring -1) & SMM (Ring -2)
⚡ Exploit Development & Vulnerability Research

🛠️ Technical Arsenal

Programming Languages

Python C C++ Assembly

Security Tools & Frameworks

  • Reverse Engineering: Ghidra, WinDBG, IDA Pro
  • Web Security: Burp Suite, Custom Fuzzers
  • Malware Analysis: Custom toolchain development
  • Kernel Development: Driver research, IOCTL hunting
  • Cryptography: AES encryption, XOR schemes, API hashing

🔬 Current Research Projects

🎭 Advanced Evasion Techniques

  • Sandbox Detection & Bypass: Multi-layered detection mechanisms
  • Memory Manipulation: Two-phased permissions (RW → X), in-memory execution
  • Signature Evasion: Polymorphic code generation, binary stripping

⚡ Exploit Development & Vulnerability Research

  • Audio-based Payloads: .wav file modulation for covert storage
  • **Hypervisor, bare-metal evasion of Kernel Level Anti-Cheats
  • **System Management Module (Ring -2) Motherboard Firmware Customization

⚡ Kernel Security Research

  • BYOVD Techniques: Bring Your Own Vulnerable Driver exploitation
  • Hardware Security: IOMMU bypass research, PCI manipulation
  • Anti-Virus Targeting: Research on security driver vulnerabilities

📈 Research Methodology

graph TD
    A[Initial Research] --> B[Proof of Concept]
    B --> C[Integration into FeebleDream]
    C --> D[Testing & Validation]
    D --> E[Responsible Disclosure]
    E --> F[Publication & Documentation]
Loading

🏆 Certifications & Achievements

🎓 Google Cybersecurity Certificate - Coursera
📊 VirusTotal Research: Consistently achieving 0/72 detection rates

📝 Knowledge Sharing

Recent Work

  • Advanced EDR Evasion Techniques
  • Kernel-Level Persistence Mechanisms
  • TryHackMe CTFs
  • IOMMU/VT-D Mapping
  • Vuln Stacking for higher primitives

🔄 Current Focus

class SecurityResearcher:
    def __init__(self):
        self.current_focus = [
            "Advanced Persistent Threat simulation",
            "Zero-day research and exploitation",
            "Novel evasion technique development",
            "Kernel security mechanisms"
        ]
    
    def research_philosophy(self):
        return "Understand to defend, simulate to improve"

📊 GitHub Stats

INvalid-Pointer's GitHub stats

Top Langs

🤝 Collaboration & Contact

I'm always interested in collaborating on:

  • 🔐 Security research projects
  • 🛡️ Defensive tool development
  • 📚 Educational security content
  • 🔍 Vulnerability research initiatives

📬 Let's Connect!

  • 📝 Discord: @invalidptr

"In security research, understanding the attack is the first step to building better defenses"

Profile Views

@Invalid-ptr's activity is private