ItzSomebody (Chris)

Classical Pianist

Computer Programmer

CTF with redpwn


About Me

Hey there! I am ItzSomebody! I'm a high school student who has an interest in a variety of different subjects! Check my (dead) blog at some point too!

I work with various programming languages (C, Java and Python) with my main focus being Java. Notable projects I have authored or contributed to include radare2, the Radon Java Bytecode Obfuscator and Bytecode-Viewer.

I am also an advanced piano student who has played multiple sets of repertoire from composers such as Beethoven, Bach, Debussy, Brahms, Haydn, Scriabin, Mozart, Chopin, Schubert, Scarlatti, Ginastera and Shostakovich.

My interests:

  • Piano
  • Yo-Yo'ing (Favorite style is 3A)
  • Speedcubing
  • Chess
  • Capture the Flag
  • Computer Science
  • Minecraft
  • Toontown
  • Tetris
  • Swiss Army Knives
  • Pizza

Organizations I support:


On the date of 10/12/2018, I was admitted into the redpwn CTF team. Check our website out!

redpwn is a CTF team composed primarily of High School students. A few notable and accomplished members include:

Over here, you can see some of redpwn's achievements and some of the other members.

Close Project


Mesmerized by Java bytecode and obfuscation, I decided to try to create my own Java obfuscator in the beginning of 2018 and succeeded. As I became more and more experienced with Java, I somewhat improved the codebase and used Radon to learn how Java bytecode works but not really focusing on an obfuscation aspect thus why its protection methods are not too strong. Radon is also the first publicly-available Java obfuscator to introduce virtualization-obfuscation.

Radon currently supports:

  • String encryption.
  • Method and field reference hiding via invokedynamic.
  • Number obfuscation.
  • Name obfuscation.
  • Control flow obfuscation.
  • Debugging information removal.
  • Synthetic flags.
  • Watermarking.
  • Expiration dates.
  • And a some more features I was too lazy to list.

The project is still active and can be found here.

Close Project


Java bytecode is incredibly vulnerable to attack due to its easy-to-manipulate structure. Many tools exist to instrument, modify and bend the behavior of Java to an attacker’s will. Even with commercial and enterprise level obfuscators, Java still remains a vulnerable and easy language to attack. To approach this issue, I have been working on a tool which I named JVMP (JVM Virtual Machine Protect) as an experiment to test the effectiveness of code virtualization within the platform of Java. Update 4/22/2019: This project is on hold for now.

Close Project

idk m8

blank until i figure out what to put here

Close Project


StopDecompilingMyJava is a repository I occasionally use to record certain obfuscation/hackery cases I find which mess with Java reverse-engineering tools.

The project can be found here.

Close Project


Obzcure (previous known as SpigotProtect) is a (currently dead) Java software protection solution. The project is primarily rounded at the SpigotMC plugin development community to help protect their software against pirates, leakers, and reverse-engineering. I work at Obzcure as a consultant to find and create (or recreate) obfuscation techniques to contribute to Obzcure's feature list.

During my stay at Obzcure, I have created multiple obfuscation and anti-reverse-engineering techniques which are unique to Obzcure.

Close Project


Revenact is a trade-and-sales forum which is loosely built on the Minecraft community. Revenact aims at being a better market and resource-sharing forum than currently existing ones such as MC-Market and SpigotMC. This is achieved by having hands-on and experienced staff, and providing users with the tools they need to help protect their work. Before Revenact was bought out by a user known as Ethereal, I was enlisted as a moderator to monitor resources for suspicious or malicious code before approving said resources to be publicly displayed.

I have been consulted as a developer to create the backend for Revenact's anti-piracy system to provide the tools needed for developers to protect their work against pirates, leakers and reverse-engineers.

Close Project


Unfortunately, redpwn is now big team (well over 10 members) which is an obvious problem in CTFs which have a team size cap. To solve this problem, we created a subteam known as cowpwn.

Currently, cowpwn contains the following members:

Over here, you can see some of cowpwn's achievements.

Close Project


HSCTF-6 (year 2019), was organized and provided by three teams: redpwn, Sice Squad, and the WW-P HSN Computer Science Club. Huge thanks to Ptomerty for letting me write problems!

HSCTF can be found at here and the source to the problems can be found here.

Close Project