我的兴趣比较广:从 x86/amd64 架构设计到操作系统内核开发,从编译器前端语法分析到后端优化、以及程序混淆与反混淆,再到病毒分析、免杀技术、二进制逆向和网络安全。喜欢深入底层,也爱折腾各种对抗与防护手段。
- 写过 x64 架构的操作系统内核,熟悉从 BIOS初始化 到内存管理、中断、进程调度的基本实现
- 研究过编译器中间表示(IR)上的优化框架,比如控制流分析、SSA、数据流分析、常量传播和符号执行
- 对反射式 DLL 加载、无文件注入、免杀手法有实践经验,并用 Rust 写过辅助工具
- 逆向过一些恶意程序,也尝试分析它们的混淆和隐藏技巧
欢迎交流底层技术、安全对抗、编译原理以及任何有趣的话题。
📝 技术笔记:ccoskrnl.github.io/notes
🐙 GitHub:ccoskrnl
💬 最好通过 Issue 或邮件交流
Broad interests: x86/amd64 architecture & OS kernel development, compiler frontend parsing & backend IR optimizations, program obfuscation & deobfuscation, malware analysis, evasion techniques, binary reverse engineering, and cybersecurity. I love diving into low‑level details and tinkering with both defensive and offensive sides.
- Built an x64 hobby OS kernel – from BIOS initializing to memory management, interrupts, and basic scheduling
- Explored compiler optimization frameworks on IR: control flow analysis, SSA, dataflow analysis, constant propagation, symbolic execution
- Hands‑on experience with reflective DLL loading, fileless injection, and evasion methods; wrote a few tools in Rust as well
- Reverse‑engineered real‑world malware and studied their obfuscation & stealth tricks
Always open to discussions about low‑level programming, security, compilers, or any other interesting topics.
📝 Tech notes: ccoskrnl.github.io/notes
🐙 GitHub: ccoskrnl
💬 Best way to reach me is via GitHub Issues or email
