sebwebneb
Kernel Security
Reverse engineering anti-cheat systems and finding critical vulnerabilities in production software.
$2,000+ earned through bug bounty programs with Epic Games and other major companies.
Solved DMA Exploitation
Achieved what the industry thought was impossible. Blocks external drivers and hardware access at the kernel level. Uses split view architecture that breaks physical memory access. The only way to bypass it is through local interference, which completely defeats the purpose of DMA. Will be open sourced eventually for my portfolio.
Surpasses Valorant's guarded regions
Zero configuration required
Blocks external drivers and hardware access
Local bypass defeats DMA purpose
Projects
byesendinput
Kernel driver for blocking synthetic input injection
- Novel IAT hooking method for SynthesizeMouseInput
- Defeats aim assistance cheats
- PatchGuard-compliant implementation
- No dangerous inline hooks required
dpcwalk
High-frequency execution monitor via DPC callbacks
- Safer alternative to NMI callbacks
- Detects unbacked kernel code execution
- HVCI and Microsoft-compliant
- Maximum compatibility architecture
Extracted from larger anti-cheat framework under development
Journey
The Beginning
Started cheating in Minecraft, didn't understand anything, got scared of BSODs
Competitive Gaming
Started playing games competitively
The Pivot
Got cheats, got banned, decided to research how they work
Deep Dive
Made own cheats (never distributed), researched anti-cheat bypassing, learned C++
Career Shift
Quit making cheats, realized anti-cheating is the way forward
Anti-Cheat Research
Heavy anti-cheat research, realized telemetry importance, stopped spoonfed bypasses on UnknownCheats
Advanced Techniques
Focused on virtualization, devirtualized with guidance from industry friends
Bug Bounty Success
Accepted reports to Epic Games and major companies. Built detection vectors, found flaws in cheater drivers.
Industry-Breaking DMA Protection
Permanently solved hardware-level DMA exploitation. Zero configuration required. Surpasses Valorant's protection. Impossible to reliably bypass. Changed the game.
About
2022. I was 12 years old when I bought my first cheat. Got banned in less than a day. Instead of giving up, I decided to understand how they worked.
Three years of building cheats, researching bypasses, constantly iterating. After all that time, I finally created an undetected driver. I distributed it for free, not for payment. It lasted exactly one month before the banwave hit.
Early 2025. The shift. I started analyzing anti-malware and anti-cheat systems from the other side. By April, my focus was clear: stop cheaters, not enable them.
Now I'm the one analyzing those exact same methods from a professional perspective. Seeing the patterns repeat. Watching developers make the same mistakes I made. The difference is, now I know how the security teams think.
Permanently solved DMA exploitation at the hardware level.
Achieved what the industry thought was impossible. Built protection that blocks DMA read/write operations without any local intervention or user configuration. The implementation uses a split view architecture that breaks physical memory access from external drivers. This surpasses Valorant's guarded regions and creates an attack surface that is impossible to reliably bypass. Zero tolerance. Zero compromise.
Independent security researcher focused on kernel-level anti-cheat systems. Submitted accepted reports to Epic Games and other major companies. Active research on detection vectors, telemetry analysis, and the technical arms race that most people don't understand.