Evan


root@Evan:~$ cat mission_statement.txt
Code is not law. It is a puzzle waiting to be solved.
We specialize in dissecting the unseen layers of software protection. From Kernel-level analysis to FPGA-based DMA solutions, we provide the tools to break the unbreakable.


TECHNICAL SKILLS

Driver Development 60%
Reverse Engineering (IDA) 80%
DMA / FPGA Logic 99%
Anti-Cheat Evasion (EAC/BE/VGK) 99%

OPERATIONS LOG

2025.Q4

SMM LC AGENT

Achieve low-level memory reading and communicate with a remote host through SMM.

2025.Q4

IOMMU HOOK FIRMWARE

Hijacking the IOMMU at the firmware level to bypass anti-cheat checks.

2025.Q4

AHCI FIRMWARE

The pure firmware simulation implements the AHCI controller and hard disk simulation, achieving 100% disk emulation.

2025.Q3

PCILEECH MCP SERVER

The AI MCP server, further advancing the PCILEECH project community.The project has been open-sourced.

2025.Q3

DMA UNBLOCKER

By reverse engineering the anti-cheat driver, the anti-cheat protection was bypassed.

2025.Q3

DMA VTD/IOMMU DETECTED BYPASS

By hijacking ACPI, the checks on VTD/IOMMU were bypassed.

2025.Q1

FIRMWARE CUSTOM REG R/W SYSTEM

Made modifications to the PCILEECH-FPGA project to support reading and writing custom registers. The project has been open-sourced.

2025.Q1

PCILEECH FIRMWARE DMA ENGINE

Implemented a custom DMA engine read/write framework under the PCILEECH-FPGA framework.