security researcher · kernel developer · systems programmer
i break things at the lowest level to understand how they work.
i work on windows internals, anti-cheat systems, hypervisors, and anything that runs in ring 0. most of my time is spent in ida, writing kernel drivers, or figuring out how detection systems think. i also build products @ voidware studios.
projects
| Cloakwork | header-only c++20 obfuscation. compile-time encryption, polymorphic transforms, zero deps. |
| Kernelcloak | kernel driver protection and obfuscation built on c++17. |
| ETOC | comprehensive kernel-to-usermode comms. ioctl, shared memory, callbacks, and more. |
| wraith-rs | rust library for windows process manipulation. clean abstractions over win32. |
| SigmaDrift | biomechanical mouse movement algorithm. windmouse's successor. |
| claude-patcher | companion to my breaking claude code writeup. |
recent writing
sigmadrift: windmouse's successor · feb 2026
obfuscating kernel drivers without crashing · feb 2026
why anti-cheats walk your call stack · jan 2026
c++ · c · rust · x86/x64 asm · python · hlsl
kernel drivers · reverse engineering · anti-cheat · hypervisors · directx


