Skip to content
View zahanzo's full-sized avatar
๐Ÿ˜Š
Studying
๐Ÿ˜Š
Studying

Block or report zahanzo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
zahanzo/README.md

๐Ÿ‘‹ Hey! I'm Robert Souza Lages

๐ŸŽฏ System analisis & Self-Taught Low-Level Enthusiast ๐Ÿ“ Pelotas-RS, Brazil
โ˜• Fueled by coffee, logic, pink floyd on my headphone, and Tolkien's universe.


๐Ÿš€ About Me

My journey into software development was driven by a relentless curiosity to "pop the hood" and see how things work at the deepest level. Entirely self-taught, I've gone down the rabbit hole of C, C++, Reverse Engineering, and Cybersecurity, seeking the learning to interact directly with memory and the bare metal.

While I leverage Python to build modular architectures and AI frameworks, my primary focus and true passion lie in systems programming, binary analysis, and exploring hardware architecture.

I am currently pursuing a degree in Systems Analysis and Development, with plans to pursue a Master's degree in Computer Science in the future. However, my deep dive into kernel-level execution and low-level development is driven purely by my own independent studies and hands-on experimentation.

My most ambitious projects right now involve writing a Ring 0 micro-kernel from scratch and building a local-first, multimodal AI framework.


๐Ÿ› ๏ธ What I'm Working On

  • โš™๏ธ 0x00-Kernel: A bare-metal x86 real-mode micro-kernel built from scratch in Assembly, exploring Ring 0 privileges and hardware drivers.
  • ๐Ÿ” Reverse Engineering & Systems Programming: Diving deep into C/C++, binary analysis, and low-level execution for security and modding.
  • ๐Ÿค– L.I.A. (Local Intelligent Assistant): Developing a modular, multimodal AI framework utilizing Python and the MCP protocol for local automation.

๐Ÿ“ฆ Featured Repositories

Project Stack Description
0x00-Kernel Assembly x86 A minimalist Ring 0 micro-kernel with a custom bootloader and hardware drivers.
Ghost Shell C / C++ Custom shell environment for low-level system exploration and execution.
L.I.A. Framework Python / MCP Personal AI assistant with semantic memory, screen vision, and dynamic plugins.
NativaStub Gen C++20 / x64 Automated Syscall stub generator that parses ntdll.dll to extract SSNs and bypass EDR hooks via Direct Syscalls.

๐Ÿ“š Hobbies & Vibes

  • ๐Ÿ”ง Mechanics: Tearing down and maintaining my Honda CG 150 Fan engine.
  • ๐Ÿ“– Tolkien: Always ready to learn more of Middle-Earth lore.
  • ๐ŸŽฎ Gaming: RPGs and Souls-Likes, whenever the coffee permits some downtime.

๐Ÿ“ซ Let's Connect


"Great works are performed not by strength but by perseverance." โ€” Samuel Johnson

Pinned Loading

  1. lia-framework lia-framework Public

    L.I.A. (Local Intelligent Assistant) โ€” A modular, multimodal AI framework with MCP plugin support.

    Python 1

  2. 0x00-Kernel 0x00-Kernel Public

    EN: A minimalist x86 real-mode kernel operating at Ring 0. Features a custom 2-stage bootloader, VGA text-mode drivers, and PS/2 keyboard handling. PT: Micro-kernel minimalista em Assembly x86 operโ€ฆ

    Assembly

  3. GhostShell GhostShell Public

    Advanced Stealth Reverse Shell in C++20: Featuring COM-based persistence, Sandbox evasion, and Fileless C2 retrieval.

    C++

  4. NativaStub-Gen NativaStub-Gen Public

    EN: Automated C++20 tool that statically parses ntdll.dll to extract SSNs and generate Direct Syscall stubs for EDR evasion. PT: Ferramenta automatizada em C++20 que realiza o parsing estรกtico da nโ€ฆ

    C++ 2