In the ongoing battle between game developers and cheat creators, sophisticated techniques such as kernel level manipulations,
custom virtual machines, and hardware based exploits like DMA and SMM are continuously evolving. Anti cheat systems respond with
advanced kernel hooks, behavioral profiling, and side channel detection methods, creating a complex cybersecurity arms race.
Understanding these tactics not only sheds light on gaming security but also highlights broader cybersecurity challenges and innovations.
This post delves into advanced malware development and evasion techniques, providing an in depth exploration of
how malicious software can inject, obfuscate, and execute shellcode while avoiding detection from antivirus systems
and sandbox environments. It covers a comprehensive range of topics from basic shellcode execution and simple encryption
methods to sophisticated anti analysis strategies and direct syscall evasion.
This post examines how a missing bounds check in Modern Warfare 2’s network code enabled a
remote code execution vulnerability via a Huffman compression overflow, and it outlines how
tools like IDA Pro and Ghidra helped uncover the flaw, leading to safe patching techniques under
responsible disclosure practices.
Relive the nostalgia of classic PC gaming with a simple CD check patch! Follow along as I take an
old favorite from disc-based play to a hassle-free modern setup. By examining the executable in IDA The
process highlights how easily some older titles can be tweaked or modded, and opens up a world of possibilities
for further modifications, such as custom menus or cheat functionality.
Exploring the process of dissecting and reverse engineering Call of Duty’s Fast Files, highlighting the complexities,
hurdles, and discoveries along the way. Discussing data structures, compression schemes, and the potential for community-driven
mods and enhancements upon understanding the .ff format.
Exploring the journey from C++ to Rust, highlighting the strengths, challenges, and lessons learned along the way.
Discussing the benefits of Rust’s ownership model, expressive type system, and ecosystem maturity.
Introduction to my programming journey, from early days with C and reverse engineering to current work in Rust,
including ongoing projects in cybersecurity, DAW development, and USB forensics.