Skip to content
View ioncodes's full-sized avatar
😴
Playing with memory regions...
😴
Playing with memory regions...

Organizations

@NVIDIAGameWorks @vtil-project @0rganizers
Block or Report

Block or report ioncodes

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ioncodes/README.md

👋 Looks like you've found my profile :) Enjoy your stay!
💣 I'm a reverse engineer and software engineer that mostly dabbles around in Rust, C++ and various Assembly languages.
👹 I spend most of my free time working on low-level projects such as but not limited to reverse engineering software (malware, anti cheats, games, ...), writing emulators, creating reversing & exploit development related tooling and implementing compiler related programs (usually for obfuscation and/or deobfuscation).
🕹️ I retired from playing CTFs after co-founding and playing alongside organizers but occasionally help out or look into challenges out of curiosity.
🔑 Most notable credentials are my teams' (through 2019 excusemewtf and 2020-2022 organizers) CTF rankings along with my personal ranking on HackTheBox (retired; peaked at global #2), along with the projects on my GitHub.
🕸️ I infrequently blog about my shenanigans over on my blog layle.me.
✉️ You can contact me on Discord via mrlayle.

Expand this to see a more exhaustive list of my work (excluding the pinned highlights)
  • vacation3-emu - An emulator that deobfuscates and decrypts VAC3 anticheat modules
  • long_night - A collection of themes based on pastel colors, created for reverse engineers
  • RACEAC - Proof of concept code for an EasyAntiCheat race condition that allowed you to tamper resource data
  • rw - A kernel driver exposing read/write capabilities to usermode
  • dlsym_hook - Rewrites a binary statically by lifting the instructions to LLVM, hooking a function and compiling it back
  • DeadByDaylight - Dead by Daylight research material gathered while reverse engineering the game
  • gg - WIP GameGear emulator that's able to run some games well
  • FallGuys - FallGuys cheat that used internal functions present in one of the first published releases of the game
  • NonlethalCompany - Lethal Company cheat that uses Harmony to change various aspects of the game (infinite sprint, no death, etc)
  • Clicker Heroes - Clicker Heroes cheat that allows you to use self created redemption codes to unlock items by emulating the server response
  • Maze - Cheats for "Maze", LiveOverflow's game hacking challenge
  • docker-compiler-explorer - Dockerized version of Godbolt's Compiler Explorer preconfigured with C, C++, Rust and LLVM
  • dbgmon - Reverse engineered implementation of DbgView's usermode logger
  • Curveball - Proof of concept code for CVE-2020-0601 also known as the "CryptoAPI exploit"
  • BlueGate - PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610
  • SteamManifestFixer - Patches Steam to download depot files without manifest data
  • pooldump - Allows you to dump all nonpaged BigPools from kernel
  • sbb - A commandline tool that allows you to check the public transportation connection via SBB
  • JodelAPI - A wrapper for Jodel's API

Pinned

  1. vtil-project/VTIL-Core vtil-project/VTIL-Core Public

    Virtual-machine Translation Intermediate Language

    C++ 1.3k 165

  2. idacode idacode Public

    An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.

    Python 681 76

  3. dnpatch dnpatch Public

    .NET Patcher library using dnlib

    C# 309 48

  4. CVE-2020-16938 CVE-2020-16938 Public

    Bypassing NTFS permissions to read any files as unprivileged user.

    C++ 188 40

  5. ceload ceload Public

    Loading dbk64.sys and grabbing a handle to it

    C++ 144 42

  6. llvm8 llvm8 Public

    Statically recompiling CHIP8 to Windows and macOS using LLVM

    C++ 88 4