
LANGUAGE
A hidden
place inside
every mind...
place inside
every mind...
ALWAYS IN SEARCH OF WHAT IS
« HIDDEN TO THE PUBLIC EYE » ——
THAT WHICH « ESCAPES THE USER » IS MY OBJECTIVE TO ACHIEVE. ❤
« HIDDEN TO THE PUBLIC EYE » ——
THAT WHICH « ESCAPES THE USER » IS MY OBJECTIVE TO ACHIEVE. ❤
╶ // Latest projects
{ Project: ‘Hidden communication through the kernel.’ }
Its my main project and personal brand, codenamed « C9 ».
Its an advanced ‘rootkit’, capable of staying in the shadows of the operating system in a persistent,
non-intrusive and invisible to the human eye.
It is intended as a security tool against invasions like "RATS" and attempts to leak sensitive files, processes and private documents or projects.
Its an advanced ‘rootkit’, capable of staying in the shadows of the operating system in a persistent,
non-intrusive and invisible to the human eye.
It is intended as a security tool against invasions like "RATS" and attempts to leak sensitive files, processes and private documents or projects.

{ Project: ‘Looking much further than simple records.’ }
This tool allows you to see & get all the
serials of every component, disc, etc...
Coded entirely in C++, fully native code, so no dependencies other than the system itself are
required to run smoothly.
Normally used in a combination with tools that are designed to bypass certain HWID-based security systems.
serials of every component, disc, etc...
Coded entirely in C++, fully native code, so no dependencies other than the system itself are
required to run smoothly.
Normally used in a combination with tools that are designed to bypass certain HWID-based security systems.

{ Project: ‘The honeypot trap inside a honeypot trap.’ }
Using advanced NTFS techniques, this tool
hides the real *.EXE inside a honeypot file.
Fully built into a glitched folder path that's
nearly inaccessible to most file managers.
Stored within a non-visible virtual disk,
mounted directly in the system RAM for stealth.
hides the real *.EXE inside a honeypot file.
Fully built into a glitched folder path that's
nearly inaccessible to most file managers.
Stored within a non-visible virtual disk,
mounted directly in the system RAM for stealth.

◈ C++
Developing native Windows & console apps.
(Back-End & Front-End)
◈ C#
Developing reliable Windows native & console apps.
(Back-End & Front-End)
◈ WPF C#
Building modern desktop interfaces with WPF C#.
(Back-End & Front-End)
◈ HTML
Structuring content for modern
user-friendly websites. (Front-End)
user-friendly websites. (Front-End)
◈ CSS
Creating appealing responsive designs for modern sites.
(Front-End)
◈ Powershell + Batch
Developing experimental methods to test security measures and implement protective strategies.
(Back-End)
╶// About Me
( ENTRY : 0⨯001 )
My name is Albert,
better known as Rootkit.SYS
across various corners of the internet.
I consider myself skilled in cybersecurity and forensic
data analysis, with a passion for developing unique
and revolutionary, highly complex projects.
better known as Rootkit.SYS
across various corners of the internet.
I consider myself skilled in cybersecurity and forensic
data analysis, with a passion for developing unique
and revolutionary, highly complex projects.
Professional Values
Precision and attention to detail;
Commitment to ethical practices;
Continuous learning and innovation;
Key Skills
view projects_

( ENTRY : 0⨯002 )
My goal is to create unique projects that defy traditional rules, combining creativity and technical precision to deliver distinctive and impactful solutions.
Personal Philosophy
🔍 Developing tools for invisible digital protection;
⚙️ Engineering stealth methods for advanced defense;
💡 Embedding security in unique hidden methods;
Goals
contact me_
