hypervis0r logohypervis0r
01│BLOG_POSTS02│ABOUT_ME03│GITHUB
NAVIGATION
[//]HOME[00]Fun with VirtualQuery - Reading the PEB without Segment Registers[01]GetFullPathName Directory Check Bypass
METADATA
POSTS:2
FORMAT:MARKDOWN
STATUS:ACTIVE

ABOUT

System operator information

PROFILE DATA
NAMEAUSTIN MAXWELL
ALIAShypervis0r
LOCATIONUNITED STATES
SPECIALIZATIONLOW-LEVEL ENGINEERING
BIO

Dedicated and skilled Computer Scientist with a strong foundation in software development and a focus on ensuring robust security. I bring over 5+ years of expertise in C/C++, C#, Python, and other languages, with a proven track record in application and network security.

Throughout my career, I've delved into the intricate realm of cybersecurity. My proficiency extends to reverse engineering and uncovering vulnerabilities across a spectrum of vendors, including industry giants like Microsoft, HID Global, Plex Media Server, and Epic Games.

I have a passion for Research and Development, particularly in the dynamic field of Windows Internals. This interest has fueled my ability to contribute innovative solutions to low-level problems and stay at the forefront of technological advancements.

CONTACT VECTORS
EMAILhyp3rvisor@protonmail.com→
GITHUBgithub.com/hypervis0r→
TWITTER@hypervis0r→
LINKEDINlinkedin.com/in/austin-maxwell→
TECH STACK
LANGUAGES

C/C++, C#, Python, x86 Assembly, TypeScript, Powershell, Bash

FRAMEWORKS

Windows Internals, Linux Internals, Node.JS, Next.JS, .NET, ASP.NET, Pandas

TOOLS

Docker, Visual Studio, CMake, Git, IDA Pro, WinDbg, GDB, Palantir Foundry

INTERESTS

Security Research, Systems Development, Reverse Engineering