Welcome! I’m dword64, a passionate security researcher, reverse engineer, and fullstack developer with a strong track record in Windows kernel, low-level programming, web technologies, and DevOps. My mission: solve complex engineering problems, ship robust software, and help teams build secure, performant systems.
👁️
For even the gods are bound to slip.
Security Researcher & Reverse Engineer | Windows kernel, low-level dev, static analysis, obfuscation/deobfuscation, virtualization.
-
xor eax,eax
- ret
-
03:40
(UTC +02:00) - https://dword.xyz/
- @dwordxyz
Highlights
- Pro
Pinned Loading
-
Mergen
Mergen PublicForked from NaC-L/Mergen
Deobfuscation via optimization with usage of LLVM IR and parsing assembly.
C++ 3
-
-
-
Avalon-Group/Blizzard-Device-Identification-Explained
Avalon-Group/Blizzard-Device-Identification-Explained PublicThe main purpose of this repository is to explain the internal Overwatch functions of the Blizzard-Device-Identification system.
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.