Skip to content
View ck0i's full-sized avatar

Block or report ck0i

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ck0i/README.md

helz

reverse engineer / kernel developer working on windows internals and anti-cheat systems

currently researching low-level system architecture and building tools for binary analysis. most of my work involves kernel drivers, obfuscation techniques, and windows security mechanisms.

followers views

projects

header-only c++20 obfuscation library with compile-time encryption and polymorphic transformations. designed for maximum portability without external dependencies.

comprehensive examples of kernel-to-usermode communication methods for windows drivers. covers ioctl, shared memory, callbacks, and alternative approaches.

rust library for windows process manipulation and memory operations. focused on clean abstractions over win32 api.

static analysis tool for kernel drivers. scans for common detection vectors used by anti-cheat systems - string signatures, certificate validation, suspicious patterns.

proof of concept for kernel-user communication through directx shared surfaces. alternative approach to traditional driver communication channels.

demonstrates mouse input injection by directly manipulating the circular buffer in mouclass.sys. bypasses standard input APIs entirely.

what i work with

languages: c++, c, rust, assembly (x86/x64), python
focus areas: kernel driver development, binary reverse engineering, windows internals, anti-cheat research, compiler optimization, memory manipulation

most of my work involves digging through ida pro, building kernel drivers, or figuring out how anti-cheat systems detect modifications. if it runs in kernel mode or involves low-level windows apis, i've probably messed with it.

writing

occasionally write about reverse engineering and kernel development at helz.dev/blog


websitegithub (you're on it right now) • discord - ck0i

Popular repositories Loading

  1. Cloakwork Cloakwork Public

    An advanced singular header-only C++20 obfuscation library with encryption and polymorphism.

    C++ 33 10

  2. ETOC ETOC Public

    Comprehensive demonstration of kernel-mode to user-mode communication methods for Windows driver development.

    C 20 5

  3. wraith-rs wraith-rs Public

    Rust 17 1

  4. DXComm DXComm Public

    DirectX Shared Surface Kernel-User Communication POC

    C++ 4 2

  5. Sentinel Sentinel Public

    Static analysis tool for Windows kernel drivers that identifies anti-cheat detection vectors including string signatures, certificate issues, and suspicious code patterns.

    C++ 4 2

  6. claude-patcher claude-patcher Public

    Related to my article @ https://helz.dev/blog/articles/claude-code-jailbreak/

    JavaScript 3 3