Welcome! I’m dword64, a passionate security researcher, reverse engineer, and fullstack developer with a strong track record in Windows kernel, low-level programming, web technologies, and DevOps. My mission: solve complex engineering problems, ship robust software, and help teams build secure, performant systems.
-
xor eax,eax
- ret
-
09:01
(UTC -07:00) - https://dword.xyz/
- @dwordxyz
Highlights
- Pro
Pinned Loading
-
physmem_remapper
physmem_remapper PublicForked from LowLevelSys/physmem_remapper
Run Code in a Address Space not associated with a Process
C++
-
Mergen
Mergen PublicForked from NaC-L/Mergen
Deobfuscation via optimization with usage of LLVM IR and parsing assembly.
C++ 3
-
vtil-project/VTIL-Sandbox
vtil-project/VTIL-Sandbox PublicLocal VTIL inspection tool for visualizing blocks, CFGs, instruction metadata and editing .vtil files.
-
vtil-project/VTIL-BinaryNinja
vtil-project/VTIL-BinaryNinja PublicBinary Ninja plugin for loading VTIL routines and lifting VTIL instructions to LLIL for analysis.
-
vtil-project/VTIL-Core
vtil-project/VTIL-Core PublicVirtual-machine Translation Intermediate Language
-
Avalon-Group/Blizzard-Device-Identification-Explained
Avalon-Group/Blizzard-Device-Identification-Explained PublicThe main purpose of this repository is to explain the internal Overwatch functions of the Blizzard-Device-Identification system.
If the problem persists, check the GitHub status page or contact support.