Skip to content

DevBot667/DevBot667

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 

Repository files navigation

Typing SVG



Profile Views ย  Followers


๐Ÿงฌ > whoami

class DevBot667
{
public:
    const char* name     = "DevBot667";
    const char* role     = "Reverse Engineer ยท Low-Level Developer ยท Cryptographer";
    const char* focus    = "Kernel Dev | Game Modding | Post-Quantum Crypto | Android Security";
    const char* motto    = "If it runs in memory, I can reach it. If it runs in plaintext, I'll encrypt it.";

    std::vector<std::string> languages = {
        "C++", "C", "C#", "Kotlin", "Python", "ASM x64", "Java"
    };

    std::vector<std::string> lowlevel = {
        "Reverse Engineering",         "Memory R/W (Kernel + User)",
        "Driver Development (WDK)",    "ImGui Overlay / ESP / Aimbot",
        "Anti-Cheat Research",         "Binary Patching & Hooking",
        "DMA / PCILeech",              "Process Injection Techniques",
        "Thread Hiding",               "Anti-Debug / Anti-VM / Anti-Dump",
        "RTTI Reconstruction",         "Signature Scanning & Pattern Match",
    };

    std::vector<std::string> crypto = {
        "Post-Quantum Cryptography",   "PQXDH (X25519 + ML-KEM-1024)",
        "Double Ratchet + SPQR",       "AES-256-GCM / ChaCha20-Poly1305",
        "Ed25519 Signatures",          "Android E2E Messenger Dev",
        "Tor Hidden Services",         "BIP-39 Identity Backup",
    };

    const char* featured = "๐ŸŒธ Fialka โ€” Post-Quantum Android Messenger (see orgs)";
};

๐Ÿ› ๏ธ Tech Stack








โšก What I Build

๐ŸŽฎ Game Modding

โ—ˆ Custom mod menus
โ—ˆ ESP / Wallhack / Aimbot systems
โ—ˆ Entity scanning & bone rendering
โ—ˆ W2S (World-to-Screen) projection
โ—ˆ Overlay + stream-proof rendering
โ—ˆ Game object & pointer traversal

๐Ÿ”“ Reverse Engineering

โ—ˆ Binary analysis (IDA Pro / Ghidra)
โ—ˆ Runtime memory manipulation
โ—ˆ RTTI class reconstruction
โ—ˆ Signature scanning & pattern match
โ—ˆ Offset dumping & struct mapping
โ—ˆ String decryption & deobfuscation

๐Ÿ”ง Kernel Development

โ—ˆ Custom kernel drivers (WDK)
โ—ˆ PEB traversal & module enumeration
โ—ˆ Thread hiding (NtSetInformationThread)
โ—ˆ Anti-debug / Anti-VM / Anti-dump
โ—ˆ Memory cloaking techniques
โ—ˆ DMA attacks via PCILeech

๐Ÿ” Crypto & Android Security

โ—ˆ Post-Quantum E2E (PQXDH + SPQR)
โ—ˆ Double Ratchet with PFS + healing
โ—ˆ Android Keystore / StrongBox
โ—ˆ Tor Hidden Services (.onion)
โ—ˆ Ed25519 per-message signatures
โ—ˆ BIP-39 cryptographic identity

๐ŸŒธ Featured โ€” Fialka

Post-Quantum Android Messenger โ€” E2E ยท Tor ยท Zero Google ยท GPLv3

ย  ย 

๐Ÿ“Š GitHub Stats

GitHub Stats ย  Top Languages



GitHub Streak

๐Ÿ”ฅ Activity Graph


๐Ÿ“ซ Connect

ย  ย 

โš ๏ธ  All reverse engineering & modding projects are for educational and research purposes only.
๐Ÿ”  Cryptographic work follows NIST standards and open protocols.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors