crvvdev - Overview

View crvvdev's full-sized avatar

Ricardo Carvalho crvvdev

Block or report crvvdev

About

Hello, my name is Ricardo i live in Brazil and i have huge passion for software security and i am always following the latest security technologies, specially in the game industry. I've been doing this all my life really but in the last 5+ years i had real experience, in both sides, working with anti-cheat solutions and with anti-cheat exploitating as well.

Areas

  • Software development (C/C++)
  • Assembly language
  • CI/CD, automation and more
  • Anticheat and DRM-like protection for games and general software
  • Reverse engineering (static analysis and live debugging)
  • Windows exploitation (kernel and usermode)
  • Windows kernel driver development
  • And much more things related to software security (packers, debuggers, virtual machines and etc.)

Popular Projects

  • MasterHide - Abusing Kaspersky Hypervisor to hook Windows syscalls (SSDT like)

Other Projects

  • titancf - A project that i had in 2019 for CrossFire, an (ex)popular FPS game here in Brazil.
  • iw4mp - Call of Duty: Modern Warfare 2 (2009) cheat code base
  • Intraceptor - Intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.
  • VAC kernel-mode bypass - Bypass for Valve Anti-cheat in kernel-mode (ring 0)
  • Loader Client and Server - A skeleton project for a cheat loader client and server
  • jm-xorstr decrypt IDA script - A IDA script to (try) decrypt jm-xorstr statically
  • lazy_importer_ex - lazy_importer is a tool to make reverse engineering harder by inline parsing and obtaining imports, this is a improved version with kernel-mode support.
  • EMACLAB Anticheat Reversal - The first and only reverse engineered IDA database of EMACLAB Anticheat, often called GamersClub Anticheat.

Contact

Check out my blog!

LinkedIn Twitter Telegram Email me

Pinned Loading

  1. A x64 Windows Rootkit using SSDT or Hypervisor hook

    C++ 567 120

  2. Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.

    C++ 32 4

  3. C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows

    C++ 19 8