security engineer focused on windows internals, anti-cheat, reverse engineering, and low-level C++.
interests
- windows kernel and usermode security
- anti-cheat and anti-tamper systems
- vulnerable drivers and BYOVD research
- binary analysis tooling
- code virtualization, mutation, and deobfuscation
work
- tower-of-flaws - tower of fantasy anti-cheat driver exploit research
- faultline - usermode thread hijacking detection via working set page fault monitoring
contact
research [at] vespalec [dot] com
