8000 0x3xploit (0x3xploit) Β· GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View 0x3xploit's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report 0x3xploit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0x3xploit/README.md

Hi πŸ‘‹, I'm Pratham Naik

A CTF player from India

  • 🌱 I’m currently learning Exploit Development Reverse Engineering and Malware analysis

  • πŸ“ I regularly write articles on [Reverse engineering](Reverse engineering)

  • πŸ’¬ Ask me about Low level stuffs

  • πŸ“« How to reach me naikpratham1212@gmail.com

stats graph languages graph
cplusplus logo c logo java logo python logo android logo androidstudio logo bash logo vim logo visualstudio logo

Pinned Loading

  1. frida-android-jni-hooking frida-android-jni-hooking Public

    Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for security testing and debugging.

    JavaScript 38 4

0