This repository serves as a collection of my research notes, experiments, and tooling related to systems programming, reverse engineering, and runtime analysis.
My work focuses on understanding how large native applications behave internally β particularly around virtual machines, scripting runtimes, and binary execution pipelines.
- Reverse Engineering of Large Native Binaries (ARM64 / x86_64)
- Runtime Instrumentation and Function Interception
- Virtual Machines and Script Runtimes (Lua VM, UE4 integration)
- Program Analysis and Execution Pipelines
- Security-Oriented Systems Research
-
Blog / Research Notes
https://snapyhook.github.io/ -
UE4 Lua Runtime Analysis
An in-depth investigation into Lua VM integration and bytecode execution inside UE4-based applications.
https://github.com/SnapyHook/UE4-LuaScripting-Pipeline
- Static analysis using IDA Pro
- Runtime instrumentation with Frida
- Native hooking (xhook, A64InlineHook, MSHookFunction)
- Android NDK & native build systems
- Bytecode and VM-level analysis
This repository is intended strictly for educational and research purposes.
The content focuses on understanding system behavior and program execution, not on misuse, exploitation, or bypassing protections in real-world applications.
Aryan Prashar
- GitHub: https://github.com/SnapyHook
- LinkedIn: https://www.linkedin.com/in/prashar-aryan/