Skip to content
View svespalec's full-sized avatar

Block or report svespalec

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
svespalec/README.md

samuel vespalec

security engineer focused on windows internals, anti-cheat, reverse engineering, and low-level C++.

interests

  • windows kernel and usermode security
  • anti-cheat and anti-tamper systems
  • vulnerable drivers and BYOVD research
  • binary analysis tooling
  • code virtualization, mutation, and deobfuscation

work

  • tower-of-flaws - tower of fantasy anti-cheat driver exploit research
  • faultline - usermode thread hijacking detection via working set page fault monitoring

contact
research [at] vespalec [dot] com

Pinned Loading

  1. tower-of-flaws tower-of-flaws Public

    tower of fantasy anti-cheat driver exploit research

    C++ 18 2

  2. faultline faultline Public

    usermode thread hijacking detection via working set page fault monitoring

    C++ 13 1