Skip to content
Avatar

Highlights

  • Arctic Code Vault Contributor
hexploitable/README.md

Hi there 👋

I'm Hex, and I'm a mobile security research engineer at @NowSecure

  • 🔭 I work on mobile security automation 📱 - particularly static & dynamic analysis
  • 💬 Feel free to ask me about mobile security, RASP, MDM, Frida, Reverse Engineering, etc.
  • 📫 Reach out at: me@hexplo.it or @Hexploitable

Popular repositories

  1. A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.

    Objective-C++ 81 19

  2. A collection of custom scripts for use with Hopper disassembler

    Python 23 5

  3. This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.

    JavaScript 14 6

  4. Forked from stefanesser/dumpdecrypted

    Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.

    C 2

  5. A frida module for monitoring and tampering of supervisor calls on arm64 iOS

    2

  6. Forked from BishopFox/theos-jailed

    A version of Theos/CydiaSubstrate for non-jailbroken iOS devices

    Perl 1

55 contributions in the last year

Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Mon Wed Fri

Contribution activity

September 2020

Created a pull request in nowsecure/r2frida that received 1 comment

Feature/trace summary #252

As per #252, this PR exposes the traceEmit functions to the dt commands, allowing for file redirection. A hook.output config value can now be set to

+71 −14 1 comment

Created an issue in nowsecure/r2frida that received 9 comments

Extend \dt* to allow file redirection

Trace output can be extensive, it would be nice to have a way to have trace output written to a file. SInce trace output is async, we cannot direct…

9 comments

Seeing something unexpected? Take a look at the GitHub profile guide.

You can’t perform that action at this time.