reverse engineer / kernel developer working on windows internals and anti-cheat systems
currently researching low-level system architecture and building tools for binary analysis. most of my work involves kernel drivers, obfuscation techniques, and windows security mechanisms.
header-only c++20 obfuscation library with compile-time encryption and polymorphic transformations. designed for maximum portability without external dependencies.
comprehensive examples of kernel-to-usermode communication methods for windows drivers. covers ioctl, shared memory, callbacks, and alternative approaches.
rust library for windows process manipulation and memory operations. focused on clean abstractions over win32 api.
static analysis tool for kernel drivers. scans for common detection vectors used by anti-cheat systems - string signatures, certificate validation, suspicious patterns.
proof of concept for kernel-user communication through directx shared surfaces. alternative approach to traditional driver communication channels.
demonstrates mouse input injection by directly manipulating the circular buffer in mouclass.sys. bypasses standard input APIs entirely.
languages: c++, c, rust, assembly (x86/x64), python
focus areas: kernel driver development, binary reverse engineering, windows internals, anti-cheat research, compiler optimization, memory manipulation
most of my work involves digging through ida pro, building kernel drivers, or figuring out how anti-cheat systems detect modifications. if it runs in kernel mode or involves low-level windows apis, i've probably messed with it.
occasionally write about reverse engineering and kernel development at helz.dev/blog
website • github (you're on it right now) • discord - ck0i


