8000 r0keb (Ö) · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View r0keb's full-sized avatar
🌑
🌑

Block or report r0keb

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
r0keb/README.md

🌑 r0keb 🌑

“The hypervisor always whispers the truth.”

I’m r0keb, a low-level explorer focused on the raw mechanics that power modern computing. I try to work as close to the metal as possible (excluding hardware hacking).

✦ What I’m into:

  • 🔧 Low-Level Engineering: Assembly, memory layouts, CPU state. Understanding the system from its foundations.

  • ⚙ Windows Kernel: I spend time with undocumented internals, reverse engineering, and kernel-mode development.

  • 💻 Exploit Development: I study vulnerability classes, build POCs, and analyze exploitation techniques, mostly on Windows.

  • ⏳ Intel Architecture: From x86 to x64 and beyond. I dissect instruction sets, CPU behavior, and architectural quirks to better understand performance and potential.

⟁ I write technical posts, notes, and deep dives into the topics above. If you’re into systems internals, low-level debugging, or kernel-level research, feel free to take a look.

⠀⠀⠀⠀⠀⠐⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⣾⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⢸⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⣈⣼⣄⣠⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠉⠑⢷⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣼⣐⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠘⡚⢧⠀⠀⠀⢠⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢃⢿⡇⠀⠀⡾⡀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⠸⣇⠀⠀⠡⣰⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠇⣿⠀⢠⣄⢿⠇⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣰⢸⡇⠜⣭⢸⡀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣼⠀⡙⣿⣿⠰⢫⠁⣇⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⢰⣽⠱⡈⠋⠋⣤⡤⠳⠉⡆⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⡜⠡⠊⠑⠄⣠⣿⠃⠀⣣⠃⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠐⣼⡠⠥⠊⡂⣼⢀⣤⠠⡲⢂⡌⡄⠀⠀⠀⠀⠀
⠀⠀⠀⠀⣀⠝⡛⢁⡴⢉⠗⠛⢰⣶⣯⢠⠺⠀⠈⢥⠰⡀⠀⠀
⠀⣠⣴⢿⣿⡟⠷⠶⣶⣵⣲⡀⣨⣿⣆⡬⠖⢛⣶⣼⡗⠈⠢⠀
⢰⣹⠭⠽⢧⠅⢂⣳⠛⢿⡽⣿⢿⡿⢟⣟⡻⢾⣿⣿⡤⢴⣶⡃

Popular repositories Loading

  1. Windows-Kernel-Shellcode Windows-Kernel-Shellcode Public

    Three different shellcode techniques on the Windows Kernel

    Assembly 7 2

  2. MunIntel MunIntel Public

    kASLR bypass technique on Intel CPUs.

    C++ 4 3

  3. toyDebugger toyDebugger Public

    Toy debugger just for learning purpose

    C 3

  4. Anchor Anchor Public

    Injectable DLL that sets hardware breakpoints on NT functions

    C 2 1

  5. Smep-Bypass Smep-Bypass Public

    Various techniques used to bypass SMEP in the Windows Kernel.

    C++ 2 1

  6. r0keb r0keb Public

    1

0