Professional Background
I started my journey in 2018, fascinated by the internals of game engines and anti-cheat systems. What began as analyzing memory structures in C++ quickly evolved into a passion for software protection. After seeing how easily traditional obfuscators were defeated, I shifted my focus to virtualization-based security.
Today, I specialize in designing custom instruction sets and polymorphic engines that turn readable code into abstract, chaotic bytecode. My goal is to raise the bar for reverse engineers, forcing them to spend days on what used to take minutes.
Technical Arsenal
Languages
C++, Rust, x86 ASM, Python
Specialties
VM Design, Kernel Drivers, AST Manipulation
Tools
IDA Pro, Ghidra, x64dbg