Skip to content
View ioncodes's full-sized avatar
😴
Playing with memory regions...
😴
Playing with memory regions...

Organizations

@NVIDIAGameWorks @vtil-project @0rganizers

Block or report ioncodes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ioncodes/README.md

About Me

  • Reverse Engineer & Software Engineer during the night
  • Penetration Tester & Vulnerability Researcher during the day
  • Working on low-level projects such as emulators, game-cheats, compilers and exploits. Anything low-level really
  • Currently learning hardware related topics such as FPGAs
  • Used to play a lot of CTFs. I founded & co-founded:
  • Used to play a lot on HackTheBox (peaked at global #2)
  • Discord: layle22
Expand this to see a more exhaustive list of a bunch of highlights (excluding the pinned ones)

Game Hacking

  • DeadByDaylight - Dead by Daylight research material gathered while reverse engineering the game
  • FallGuys - FallGuys cheat that used internal functions present in one of the first published releases of the game
  • RACEAC - Proof of concept code for an EasyAntiCheat race condition that allowed you to tamper resource data
  • NonlethalCompany - Lethal Company cheat that uses Harmony to change various aspects of the game (infinite sprint, no death, etc)
  • ESP-It - Witch It ESP cheat
  • vacation3-emu - An emulator that deobfuscates and decrypts VAC3 anticheat modules
  • Maze - Cheats for "Maze", LiveOverflow's game hacking challenge
  • Clicker Heroes - Clicker Heroes cheat that allows you to use self created redemption codes to unlock items by emulating the server response

Research

  • Curveball - Proof of concept code for CVE-2020-0601 also known as the "CryptoAPI exploit"
  • BlueGate - PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610
  • dbgmon - Reverse engineered implementation of DbgView's usermode logger

Emulation

  • gg - GameGear emulator
  • ayyboy - GameBoy and GameBoy Color emulator, featuring rumble pak support for Lovense sex toys
  • llvm8 - Statically recompiling CHIP8 to Windows and macOS using LLVM

Misc

  • rw - A kernel driver exposing read/write capabilities to usermode
  • pooldump - Allows you to dump all nonpaged BigPools from kernel
  • dlsym_hook - Rewrites a binary statically by lifting the instructions to LLVM, hooking a function and compiling it back
  • long_night - A collection of themes based on pastel colors, created for reverse engineers
  • docker-compiler-explorer - Dockerized version of Godbolt's Compiler Explorer preconfigured with C, C++, Rust and LLVM
  • SteamManifestFixer - Patches Steam to download depot files without manifest data
  • sbb - A commandline tool that allows you to check the public transportation connection via SBB
  • JodelAPI - A wrapper for Jodel's API

Pinned Loading

  1. vtil-project/VTIL-Core vtil-project/VTIL-Core Public

    Virtual-machine Translation Intermediate Language

    C++ 1.4k 163

  2. idacode idacode Public

    An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.

    Python 735 77

  3. dnpatch dnpatch Public

    .NET Patcher library using dnlib

    C# 315 49

  4. CVE-2020-16938 CVE-2020-16938 Public

    Bypassing NTFS permissions to read any files as unprivileged user.

    C++ 187 40

  5. ceload ceload Public

    BYOVD: Loading dbk64.sys and grabbing a handle to it

    C++ 149 42

  6. SilentLoad SilentLoad Public

    "Service-less" driver loading

    C++ 145 20