Skip to content

DevBot667/DevBot667

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

Typing SVG



Profile Views   Followers


🧬 > whoami

class DevBot667
{
public:
    const char* name     = "DevBot667";
    const char* role     = "Reverse Engineer · Low-Level Developer · Cryptographer";
    const char* focus    = "Kernel Dev | Game Modding | Post-Quantum Crypto | Android Security";
    const char* motto    = "If it runs in memory, I can reach it. If it runs in plaintext, I'll encrypt it.";

    std::vector<std::string> languages = {
        "C++", "C", "C#", "Kotlin", "Python", "ASM x64", "Java"
    };

    std::vector<std::string> lowlevel = {
        "Reverse Engineering",         "Memory R/W (Kernel + User)",
        "Driver Development (WDK)",    "ImGui Overlay / ESP / Aimbot",
        "Anti-Cheat Research",         "Binary Patching & Hooking",
        "DMA / PCILeech",              "Process Injection Techniques",
        "Thread Hiding",               "Anti-Debug / Anti-VM / Anti-Dump",
        "RTTI Reconstruction",         "Signature Scanning & Pattern Match",
    };

    std::vector<std::string> crypto = {
        "Post-Quantum Cryptography",   "PQXDH (X25519 + ML-KEM-1024)",
        "Double Ratchet + SPQR",       "AES-256-GCM / ChaCha20-Poly1305",
        "Ed25519 Signatures",          "Android E2E Messenger Dev",
        "Tor Hidden Services",         "BIP-39 Identity Backup",
    };

    const char* featured = "🌸 Fialka — Post-Quantum Android Messenger (see orgs)";
};

🛠️ Tech Stack








⚡ What I Build

🎮 Game Modding

◈ Custom mod menus
◈ ESP / Wallhack / Aimbot systems
◈ Entity scanning & bone rendering
◈ W2S (World-to-Screen) projection
◈ Overlay + stream-proof rendering
◈ Game object & pointer traversal

🔓 Reverse Engineering

◈ Binary analysis (IDA Pro / Ghidra)
◈ Runtime memory manipulation
◈ RTTI class reconstruction
◈ Signature scanning & pattern match
◈ Offset dumping & struct mapping
◈ String decryption & deobfuscation

🔧 Kernel Development

◈ Custom kernel drivers (WDK)
◈ PEB traversal & module enumeration
◈ Thread hiding (NtSetInformationThread)
◈ Anti-debug / Anti-VM / Anti-dump
◈ Memory cloaking techniques
◈ DMA attacks via PCILeech

🔐 Crypto & Android Security

◈ Post-Quantum E2E (PQXDH + SPQR)
◈ Double Ratchet with PFS + healing
◈ Android Keystore / StrongBox
◈ Tor Hidden Services (.onion)
◈ Ed25519 per-message signatures
◈ BIP-39 cryptographic identity

🌸 Featured — Fialka

Post-Quantum Android Messenger — E2E · Tor · Zero Google · GPLv3

   

📊 GitHub Stats

GitHub Stats   Top Languages



GitHub Streak

🔥 Activity Graph


📫 Connect

   

⚠️  All reverse engineering & modding projects are for educational and research purposes only.
🔐  Cryptographic work follows NIST standards and open protocols.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors