← Back

Experience

My path into security research was unconventional. I started by building game cheats, which taught me kernel-level Windows internals, anti-cheat evasion, and reverse engineering. After realizing I was more interested in understanding detection systems than bypassing them, I transitioned to defensive security research.

January 2026 - Present

Independent Security Researcher - Epic Games (H1)

Officially quit cheating and dedicated my time to legitimate security research and deobfuscation through Epic Games' HackerOne program.

  • • Deobfuscated roughly 40% of EasyAntiCheat's kernel driver through purely static analysis
  • • Reverse-engineered EasyAntiCheat's cryptographic protocol (AES-256-CBC + ECDSA-P256)
  • • Developed full bypass to EAC's NMI callbacks by spoofing the frame completely rather than redirecting or blocking
  • • Submitted multiple valid vulnerability reports to Epic Games including GPU execution and driver exploitation techniques
  • • Found vulnerability in Vanguard's vgk.sys for arbitrary code execution, responsibly disclosed via HackerOne
  • • Built mini user-mode anti-cheat with advanced detection for manual mapper exploitation (KDMapper, GDRVLoader, GhostMapper, UCMapper)
  • • Implemented telemetry collection with LLM-based behavioral analysis for cheat detection
  • • Increased understanding of MBA obfuscation by successfully tracing through EasyAntiCheat's KM Module
November 2025 - January 2026

Download Moderator - UnknownCheats

Conducted malware analysis and security verification to protect the community from malicious code.

  • • Analyzed 3-5+ user-submitted binaries daily for malware, trojans, and stealers
  • • Performed static analysis using IDA Pro and Ghidra to identify obfuscated malware
  • • Utilized dynamic analysis platforms (ANY.RUN, Triage) for runtime behavioral monitoring
  • • Successfully completed verification drills testing detection of packed executables and polymorphic malware
  • • Maintained community safety while enabling legitimate security research
January 2025 - February 2025

Data Analyst - Redacted for Privacy

Work experience placement analyzing employee data and developing automation systems.

  • • Analyzed and organized employee data across multiple departments
  • • Developed proof-of-concept AI automation systems to streamline workflows
  • • Participated in strategic meetings regarding AI integration and implementation
  • • Processed and structured large datasets for company-wide accessibility
PROFESSIONAL EXPERIENCE
April 2025 - October 2025

Head Kernel Engineer - spinbot.gg

Lead kernel engineer designing read-only kernel driver with active anti-cheat evasion. Redistributed by multiple rebranded providers in the community.

  • • Designed and maintained read-only kernel driver with active EAC evasion
  • • Redistributed by multiple rebranded providers in the community
  • • 2-3 working days/week with 24/7 emergency patch availability
  • • Developed auto-updating system using signature scanning instead of hardcoded offsets
  • • Dumped Fortnite's decrypted executable to locate and maintain offset updates
  • • Guided support members and taught them kernel concepts and how the system worked
  • • Collaborated with other developers through calls to discuss techniques and improvements
  • • Eventually detected due to usermode anomalies I wasn't aware of at the time
  • • Had no part in advertisement or sales, only developing the driver
  • • Successfully maintained for 6 months before sunsetting to focus on ethical security research

This detection was a wake-up call that shifted my focus from evasion to understanding the full detection surface.

October 2024

Cybersecurity Researcher - Virgin Media

Work experience placement researching cryptographic protocols and network security.

  • • Researched cryptographic protocols and encryption implementations in infrastructure
  • • Consulted with Virgin Media O2 security engineers on network protection strategies
  • • Authored technical documentation analyzing cryptography's role in securing enterprise telecom systems
  • • Explored professional pathways in cybersecurity and telecommunications technology
September 2024 - January 2025

Avaddon (Private Project)

Developed external driver-based cheat with a friend, combining usermode and kernel components.

  • • Built external driver with friend handling Unreal Engine while I handled kernel evasion
  • • Sold to 100+ clients and remained undetected for several months
  • • Developed custom mini mutation engine to randomize each driver build
  • • Learned assembly concepts while implementing per-build randomization
  • • Eventually detected when EAC gathered enough telemetry to block the method
December 2023 - February 2024

venus.lol (Rebranding Business)

Rebranded from Pluto Cheats. Conducted research on spoofers and sold rebrands to providers.

  • • Conducted immense research on hardware ID spoofers
  • • Sold rebrands to 10+ different providers, generating approximately $1,200
  • • Successfully bypassed EAC and BattlEye identifiers at the time
  • • Eventually went bust due to not understanding how to find new identifiers

This timeline represents my unconventional path into security research. I'm transparent about my past because the technical skills gained are genuine, regardless of how they were acquired. The right employer will value real-world kernel experience and demonstrated growth.