Skip to content
Block or Report

Block or report hexploitable

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Hi there 👋

I'm Hex, and I run Reconditorium, a security consultancy.

  • 🔭   I specialise in mobile security 📱 - particularly static & dynamic analysis
  • 💬   Feel free to ask me about mobile security, RASP, MDM, Frida, Reverse Engineering, etc.
  • 📫   Reach out at: or @Hexploitable

Popular repositories

  1. MEMSCAN Public

    A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.

    Objective-C++ 87 21

  2. This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.

    JavaScript 27 7

  3. A collection of custom scripts for use with Hopper disassembler

    Python 23 5

  4. Forked from stefanesser/dumpdecrypted

    Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.

    C 3

  5. Forked from nowsecure/frida-uiwebview

    Inspect and manipulate UIWebView-hosted GUIs through Frida.

    JavaScript 3

  6. svsee Public

    A frida module for monitoring and tampering of supervisor calls on arm64 iOS


5 contributions in the last year

Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Mon Wed Fri

Contribution activity

November 2022

hexploitable has no activity yet for this period.

Seeing something unexpected? Take a look at the GitHub profile guide.