Skip to content
View hexploitable's full-sized avatar

Block or report hexploitable

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hexploitable/README.md

Hi there 👋

GitHub Gitlab Twitter LinkedIn

I'm Hex, and I run Reconditorium, a security consultancy.

  • 🔭   I specialise in mobile security 📱 - particularly static & dynamic analysis
  • 💬   Feel free to ask me about mobile security, RASP, MDM, Frida, Reverse Engineering, etc.
  • 📫   Reach out at: [email protected] or @Hexploitable

Popular repositories Loading

  1. MEMSCAN MEMSCAN Public

    A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.

    Objective-C++ 92 23

  2. r2con2020_r2frida r2con2020_r2frida Public

    This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.

    JavaScript 35 8

  3. hopperScripts hopperScripts Public

    A collection of custom scripts for use with Hopper disassembler

    Python 24 5

  4. dumpdecrypted dumpdecrypted Public

    Forked from stefanesser/dumpdecrypted

    Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.

    C 3

  5. frida-uiwebview frida-uiwebview Public

    Forked from nowsecure/frida-uiwebview

    Inspect and manipulate UIWebView-hosted GUIs through Frida.

    JavaScript 3

  6. svsee svsee Public

    A frida module for monitoring and tampering of supervisor calls on arm64 iOS

    2