ItzSomebody


Computer Programming Enthusiast

Portfolio


About Me


Hey there! I am ItzSomebody! I'm a High school student who has an interest in a variety of different things! Check my (dead) blog at some point too!

I work with various programming languages (C, Java and Python) with my main focus being Java.

My interests:

  • Classical Music
  • Piano
  • Yo-Yo'ing (Favorite style is 3A)
  • Speedcubing
  • Chess
  • CTF (Make sure to check out my team's website!)
  • Computer Science
  • Programming
  • Minecraft
  • Toontown
  • Mario and Luigi: Bowser's Inside Story
  • Tetris
  • Swiss Army Knives
  • Pizza

redpwn


On the date of 10/12/2018, I was admitted into the redpwn CTF team. Check our website out!

redpwn is a CTF team composed primarily of High School students. A few notable and accomplished members include:

Over here, you can see some of redpwn's achievements and some of the other members.

Close Project

Radon


Mesmerized by Java bytecode and obfuscation, I decided to try to create my own Java obfuscator in the beginning of 2018 and succeeded. As I became more and more experienced with Java, I somewhat improved the codebase and used Radon to learn how Java bytecode works but not really focusing on an obfuscation aspect thus why its protection methods are not too strong. Radon is also the first publicly-available Java obfuscator to introduce virtualization-obfuscation.

Radon currently supports:

  • String encryption.
  • Method and field reference hiding via invokedynamic.
  • Number obfuscation.
  • Name obfuscation.
  • Control flow obfuscation.
  • Debugging information removal.
  • Synthetic flags.
  • Watermarking.
  • Expiration dates.
  • And a some more features I was too lazy to list.

The project is still active and can be found here.

Close Project

JVMP


Java bytecode is incredibly vulnerable to attack due to its easy-to-manipulate structure. Many tools exist to instrument, modify and bend the behavior of Java to an attacker’s will. Even with commercial and enterprise level obfuscators, Java still remains a vulnerable and easy language to attack. To approach this issue, I have been working on a tool which I named JVMP (JVM Virtual Machine Protect) as an experiment to test the effectiveness of code virtualization within the platform of Java. Update 4/22/2019: This project is on hold for now.

Close Project

jvmspec


blank until i figure out what to put here

Close Project

StopDecompilingMyJava


StopDecompilingMyJava is a repository I occasionally use to record certain obfuscation/hackery cases I find which mess with Java reverse-engineering tools.

The project can be found here.

Close Project

Obzcure


Obzcure (previous known as SpigotProtect) is a (currently dead) Java software protection solution. The project is primarily rounded at the SpigotMC plugin development community to help protect their software against pirates, leakers, and reverse-engineering. I work at Obzcure as a consultant to find and create (or recreate) obfuscation techniques to contribute to Obzcure's feature list.

During my stay at Obzcure, I have created multiple obfuscation and anti-reverse-engineering techniques which are unique to Obzcure.

The project can be found here and the Discord can be found here.

Close Project

Revenact


Revenact is a trade-and-sales forum which is loosely built on the Minecraft community. Revenact aims at being a better market and resource-sharing forum than currently existing ones such as MC-Market and SpigotMC. This is achieved by having hands-on and experienced staff, and providing users with the tools they need to help protect their work. Before Revenact was bought out by a user known as Ethereal, I was enlisted as a moderator to monitor resources for suspicious or malicious code before approving said resources to be publicly displayed.

Currently, I am a consulted developer to create the backend for Revenact's anti-piracy tools to provide the tools needed for developers to protect their work against pirates, leakers and reverse-engineers.

The project can be found here.

Close Project

cowpwn


Unfortunately, redpwn is now big team (well over 10 members) which is an obvious problem in CTFs which have a team size cap. To solve this problem, we created a subteam known as cowpwn.

Currently, cowpwn contains the following members:

Over here, you can see some of cowpwn's achievements.

Close Project

HSCTF 6


HSCTF-6 (year 2019), was organized and provided by three teams: redpwn, Sice Squad, and the WW-P HSN Computer Science Club. Huge thanks to Ptomerty for letting me write problems!

HSCTF can be found at here and the source to the problems can be found here.

Close Project