Hey. I'm crackalove β a self-taught security researcher, reverse engineer, and low-level systems programmer driven by one obsession: understanding how things really work under the hood.
It started simple β curiosity. Why does this crash? What does this binary actually do? How does the OS decide what runs and what doesn't? That curiosity turned into years of going deeper and deeper down the rabbit hole. Assembly language became readable. Disassemblers became familiar. Memory layouts stopped being scary. Now I spend most of my time in territory that most developers never touch β reading raw opcodes, analysing malware, writing exploit primitives, and building tooling to automate the dark arts.
I'm not a CTF kid farming points. I'm interested in real systems β how they're architected, where they fail, and why defenders keep losing. I study everything from heap exploitation and kernel attack surfaces to protocol analysis and network intrusion. My approach is methodical: understand the target deeply before touching it, enumerate everything, assume nothing.
My primary languages are C++ and Python. C++ for anything that needs to be fast, close to the metal, or interact with OS internals. Python for scripting, automation, quick exploit PoCs, and tooling glue. I'm comfortable in assembly (x86/x64 primarily) and can read ARM when needed. I also understand how compilers transform high-level code β which matters enormously when you're reversing something stripped of all symbols.
Beyond technical skills, I think the most important quality in this field is patience. The willingness to stare at a disassembly for three hours until the algorithm reveals itself. To run the same binary fifty times under different conditions. To read a 400-page architecture manual because one paragraph will explain the bug you found. Most people don't do that. That's why most people don't find what I find.
I'm currently going deeper on kernel exploitation, fuzzing (AFL++, libFuzzer), and malware analysis. Always building tools. Always breaking things. Always learning.
"Give a man a program, frustrate him for a day. Teach a man to program, frustrate him for a lifetime."
|
|
π³ππππππππππππ & π³ππππππππππ
π³ππππππππ
π΄π‘ππππππππππ
π΅ππ£π£πππ
π½πππ πππ & πππππππ
π±πππππ’ π°ππππ’πππ & πΌπππ
π΄ππππππππππ
if you want to talk β you know where to find me.
open to: collabs / research / interesting problems.
not open to: nonsense.

