Skip to content
View Lucid-Duck's full-sized avatar

Block or report Lucid-Duck

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Lucid-Duck/README.md

Lucid Duck

I reverse engineer the systems vendors assume no one will look at: licensing-locked firmware, undocumented drivers, proprietary bytecode formats the open-source tools can't even read. I patch whatever breaks along the way, trace bugs from user space through the kernel to the RF layer, and push the fixes upstream when the bug lives there. Four vendor-confirmed CVEs pending, plus the ones that will never see daylight. Stripped binaries, hardened targets, my goldmine.

Upstream Kernel Contributions | devinwittmayer@gmail.com


Linux Driver & Kernel Work

Upstream contributions, debugging, and reverse engineering of Linux wireless and USB drivers.

Upstream Patches

Driver Research

Focus: USB Wi-Fi driver debugging, cross-layer analysis (USB <-> kernel <-> RF), and reverse engineering undocumented hardware behaviour. Write-ups at justthetip.ca.


Reverse Engineering & Vulnerability Research

March 2026

Major Telecom -- Nation-Wide eSIM Infrastructure Exposure + SIM Hijacking. A carrier's production eSIM provisioning server -- the single system behind every eSIM activation on the network -- was exposed to the open internet with zero authentication and a full suite of management functions including profile download, deletion, and batch ops. No mutual TLS where the standard mandates it. Separately chained earlier APK research into a complete SIM port-in hijack executed end-to-end on production, auto-approved with no human review. Also bypassed the WAF with a single forged HTTP header.

SSO Desktop Authenticator. Decompiled the .NET assemblies from a widely-deployed identity provider's desktop authenticator and surfaced over a dozen distinct issues: unauthenticated command injection into a SYSTEM-level service, CORS origin reflection on a passwordless auth server, null-entropy encryption, and a race condition in the auto-updater yielding SYSTEM RCE.

Feature Flag Platform -- Security Architecture Exfiltration. Extracted a production SDK key from compiled bytecode and dumped hundreds of feature flags, employee emails, and developer device IDs -- a full map of which payment endpoints had fraud detection, which didn't, and multiple independent paths to bypass identity verification.

February 2026

Major Telecom -- Proven Webmail Account Takeover + Infrastructure Audit. Built a tool that cracked the one-time password in minutes and received a valid session token -- lockout hardcoded to zero, 2FA globally disabled, DOB validation non-functional. Any account vulnerable knowing nothing but the email address. Broader engagement also surfaced a zero-click stored XSS (novel sanitizer bypass exploiting DOM attribute enumeration order), dozens of production secrets extracted from the Android app's obfuscated native library, multiple unauthenticated eSIM management endpoints, and a host header bypass that defeated the corporate identity server's entire auth layer.

Enterprise VPN -- Three Privilege Escalations From One Product.

  • Windows TOCTOU to SYSTEM -- Extracted a hardcoded 3DES key from the IPC protocol, forged service commands, then exploited a race between signature verification and execution using a filesystem oplock for deterministic timing. 15/15 SYSTEM. CVE pending -- vendor PSIRT confirmed credit attribution.
  • Linux IPC Command Injection to Root -- Two messages to an unauthenticated Unix socket; shell metacharacters straight into system() as root. Unprivileged to root in under two seconds.
  • Linux Symlink Following to Root -- Newline injection writes attacker-controlled content to any file as root. Chained to persistent system-wide RCE via /etc/ld.so.preload. CVE pending; vendor-confirmed via sister submission in same disclosure batch.

Virtual Gateway Firmware -- Fleet-Wide Certificate Forgery. Extracted a hardcoded CA private key identical across every deployment worldwide. Built a working MITM proxy that forges trusted certificates for any installation on earth. Also surfaced a production private TLS key deployed as the default web cert on every boot.

Fintech Mobile App -- Deep Bytecode RE + CDN Bypass. Patched an open-source decompiler to handle a proprietary bytecode version it couldn't, analysed the decompiled output, and extracted over a dozen distinct vulnerability classes across authentication, payments, identity verification, and fraud detection. Separately built a CDN bot-management bypass: rooted emulator, live memory dump at unreachable addresses, TLS-fingerprint-spoofed replay for full authenticated API access.

Enterprise Endpoint Protection -- DNS Parser Stack Overflow. A single crafted UDP packet triggers a stack overflow in a major vendor's network filter service on Windows. 100% reproducible persistent DoS across multiple crash dumps. Vendor reproduced and confirmed fix. CVE and advisory pending.

January 2026

Enterprise VPN -- Reconstruction From Binaries Alone. Licensing blocked normal operation, so I reverse engineered the whole system from compiled binaries -- no docs, no source. Rebuilt the XML profile schema by tracing code paths through disassembly, patched unrelated binary bugs just to reach the vulnerable paths, and surfaced: virtual gateway firmware with weak default credentials yielding SSH authentication bypass (Critical), and command injection in VPN client route handling where user-controlled XML traced through snprintf() directly into system() as root (Critical).

Enterprise Linux EDR. Reverse engineered a proprietary binary IPC protocol to discover quarantine bypass and cloud log injection. Malware survives detection indefinitely; audit logs poison-able with fabricated entries visible in the cloud admin console. High severity.

Network Monitoring Agent. Local privesc to root via symlink following + ld.so.preload injection. Persistent system-wide root from any unprivileged user. Critical severity. Vendor PSIRT confirmed fix. CVE and advisory pending.

Network Camera. Unauthenticated RCE via reverse-engineered binary event condition serialisation -- arbitrary command execution through user-controllable virtual inputs.


What I Do

  • Linux kernel and wireless driver debugging, upstream contributions, and repo maintenance
  • Binary reverse engineering without source or documentation
  • Mobile application RE (Android, React Native, JavaScript bytecode formats, native libraries)
  • Vulnerability research in enterprise software (EDR, VPN, identity providers, telecom)
  • Exploit development and proof-of-concept creation
  • Protocol analysis and proprietary format reconstruction

Looking For

Remote roles in Linux driver development, reverse engineering contracts, and vulnerability research.

Contact: devinwittmayer@gmail.com | Vancouver Island, BC | Available immediately

Popular repositories Loading

  1. 8821au-20210708 8821au-20210708 Public

    Forked from morrownr/8821au-20210708

    RTL8821AU driver — Linux kernel 6.18+ compatible fork.

    C

  2. wifi-pentest-comparisons wifi-pentest-comparisons Public

    WiFi adapter comparisons for penetration testing — chipset analysis and monitor mode support.

  3. tx-resources-flow-control tx-resources-flow-control Public

    Linux kernel patch — USB TX resources flow control for wireless drivers.

    Shell

  4. rtw89 rtw89 Public

    Forked from morrownr/rtw89

    Linux drivers for Realtek Wi-Fi 6/6E and Wi-Fi 7 adapters and cards

    C

  5. Lucid-Duck Lucid-Duck Public

    Profile README

  6. rtw89-kernel-patch rtw89-kernel-patch Public archive

    Superseded by tx-resources-flow-control — rtw89 USB TX flow control patch (archived)

    C