Skip to content
View CompileRider's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing
  • ??
  • ??
  • 19:26 (UTC)

Block or report CompileRider

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
CompileRider/README.md

๐Ÿ‘‹ Hi there! I'm Esmil

Typing SVG

Profile Views


๐Ÿ”ฌ About Me

struct Reverser {
    char *name;
    char *tools[6];
    char *focus;
    char *fun_fact;
};

struct Reverser me = {
    .name      = "Esmil",
    .tools     = { "IDA Pro", "x64dbg", "gdb/pwndbg",
                   "Python",  "C",      "Linux"      },
    .focus     = "Reverse Engineering",
    .fun_fact  = "Started with C, ended up reading raw assembly ๐Ÿ’€"
};

Coding

  • ๐Ÿ”ฌ My focus: Reverse Engineering โ€” binaries, malware, CTFs
  • ๐Ÿ› ๏ธ Static analysis: IDA Pro is home
  • ๐Ÿ› Dynamic analysis: x64dbg on Windows, gdb/pwndbg on Linux
  • ๐Ÿ Scripting: Python for automation and exploit dev
  • ๐Ÿ“– Source reading: C โ€” when you can read source, you read faster
  • ๐Ÿง Main env: Linux, always
  • โšก Fun fact: The best documentation is the disassembly itself


๐Ÿ› ๏ธ My Toolkit

Languages

C Python Assembly

Tools

IDA Pro x64dbg gdb Linux Git Neovim


๐Ÿ“Š GitHub Stats


๐Ÿ† GitHub Trophies

Trophies


๐Ÿš€ What I'm Working On

๐Ÿ’ป Current Projects

  • Reversing binaries and understanding internals
  • CTF challenges โ€” pwn & reverse categories
  • Building RE tooling with Python

๐Ÿ“š Learning

  • Malware analysis techniques
  • Kernel internals & low-level debugging
  • Advanced IDA Pro scripting (IDAPython)

โšก The Reality

# My daily life
while True:
    binary = load_binary("unknown.exe")

    try:
        secrets = reverse(binary)
        print(f"Got it: {secrets} ๐ŸŽ‰")
    except ConfusedByObfuscation as e:
        print(f"They tried: {e}")
        drink_coffee()
        open_ida()
        continue   # back to the disassembly

    if make_sense_of_it_all():
        print("If the disassembly makes sense, the day was worth it ๐Ÿ”ฌ")

๐ŸŽฏ Real Fun Facts

  • ๐Ÿ› My debugging: Works best at 3 AM with coffee and IDA open
  • ๐Ÿ’€ Assembly: Once you read enough of it, C looks like poetry
  • ๐Ÿ” Static analysis: I read binaries the way others read books
  • โ˜• Coffee: The only dependency I don't reverse
  • ๐Ÿ”ฅ Segfaults: Old friends โ€” they always teach you something
  • ๐Ÿ“š Docs: Who needs docs when you have strings and xrefs?
  • ๐ŸŽฎ Breaks: Gaming โ€” and occasionally reversing the game itself

๐Ÿค Connect With Me

GitHub LinkedIn Email


๐Ÿ“ˆ Contribution Graph

Activity Graph


๐Ÿ’ผ Open to collaborate on RE projects, CTFs and security opportunities

Wave Footer

"The binary doesn't lie โ€” but it sure doesn't make it easy" ๐Ÿ”ฌ

RE Love Learning

Popular repositories Loading

  1. CompileRider CompileRider Public

    2

  2. nvim-config nvim-config Public

    Professional Neovim configuration with advanced plugins and Apple-style UI

    Lua 2

  3. Configs Configs Public

    Forked from Magicalbat/Configs

    Lua 1

  4. LiquidLauncher LiquidLauncher Public

    Forked from CCBlueX/LiquidLauncher

    The official Minecraft launcher for LiquidBounce

    Rust

  5. LiquidBounce LiquidBounce Public

    Forked from CCBlueX/LiquidBounce

    A free Minecraft hacked client (utility mod) for Fabric

    Kotlin