AbhiTheModder Profile Banner
Abhi Profile
Abhi

@AbhiTheModder

Followers
86
Following
381
Media
17
Statuses
117

19y.o | Reverse Engineer | Dev | https://t.co/2TU6PGEhTB | Personal Tweets: @Qbtaumai | https://t.co/pDdnKwTwcj

r2frida
Joined December 2022
Don't wanna be here? Send us removal request.
@AbhiTheModder
Abhi
3 years
T 01 ๐šŸ๐š˜๐š’๐š ๐š–๐šŠ๐š’๐š—() { ๐š™๐š›๐š’๐š—๐š('๐™ท๐šŽ๐š•๐š•๐š˜, ๐š†๐š˜๐š›๐š•๐š!'); } YouTube: https://t.co/rVdetNOer4 GitHub: https://t.co/hwfMSy3jlW Discord: https://t.co/wb76nDghsi Matrix: https://t.co/LlviDmxRqf Mattermost: https://t.co/gF4KzlRlpd
Tweet card summary image
youtube.com
Hey folks๐Ÿ‘‹ It's Abhi, 18y.o | Reverse Engineer | Dev | Disclaimer: - All the videos on this channel are only for educational purposes. This channel will not be responsible for any kind of illegal...
0
0
2
@AbhiTheModder
Abhi
1 month
...
0
0
0
@AbhiTheModder
Abhi
3 months
Had a great time experimenting with r2 WASI (and of course, the CORS nightmare of WASM & hours of digging to fix a regression in latest release ๐Ÿ˜€. It transformed from a simple looking UI into this. It was funโœŒ๏ธ https://t.co/YQTSUO3iaF
0
2
7
@AbhiTheModder
Abhi
7 months
And termux compatibility ไนโ [โ ย โ โ—•โ ย โ แดฅโ ย โ โ—•โ ย โ ]โ ใ„
0
0
1
@AbhiTheModder
Abhi
7 months
Everyone's hopping on the MCP train ๐Ÿ‘€ Why limit it to one tool (jadx, IDA, etc.)? Let's make it do everything. Here's a WIP: MCP Server + @Google's Gemini solving the latest @squ1rrelCTF 2025 Android rev challenge โ€” start to finish :P
1
2
4
@_revng
rev.ng
9 months
We just opened our YouTube channel! ๐Ÿ“น First video is out: An introduction to LLVM IR ๐Ÿฒ Check it out: https://t.co/POPKXsBMuN Let us know what you think ๐Ÿ™ƒ
1
12
64
@radareorg
radare
1 year
All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! ๐Ÿ‘‰ https://t.co/8Jnqg6H3N8
1
102
241
@AbhiTheModder
Abhi
1 year
PineHookPlus No more writing code for every hookโ€”simply provide the class name, method name, and desired return value, and let Pine handle the rest! https://t.co/Jfgha6I3sJ @kyzsuki
Tweet card summary image
github.com
Pine Hook +. Contribute to RevEngiSquad/PineHookPlus development by creating an account on GitHub.
1
4
22
@AbhiTheModder
Abhi
1 year
Overriding Default Values of Android Constructor Parameters at Runtime https://t.co/eNKp8448i5 Fine: Pine and Frida better together https://t.co/rGZi1rUykk Just created for Fun while learning frida :)
Tweet card summary image
github.com
Pine and Frida better together. Contribute to AbhiTheModder/Fine development by creating an account on GitHub.
0
2
6
@AbhiTheModder
Abhi
1 year
ARM Architecture Debate: SL vs. THR Registers in Dart AOT true/false https://t.co/pURbZJ14t7 #FlutterRE #radare2 #assembly
qbtaumai.pages.dev
Abhi's Blog
1
1
4
@AbhiTheModder
Abhi
1 year
For example, Dart versions 3.4.x share the same snapshots. If you have a compiled (b)lutter for version 3.4.1, you can use the `--dart-version 3.4.1_android_arm64` flag with other 3.4.x versions like 3.4.2 or 3.4.3, and it will work! :P
0
0
0
@AbhiTheModder
Abhi
1 year
Quick tip for using (b)lutter: If you encounter Dart versions with identical snapshots, you don't need to recompile (b)lutter. Just use the `--dart-version` flag with an existing compiled version of the same snapshot.
1
0
0
@AbhiTheModder
Abhi
1 year
Unveiling Dex2C Compiled Android APKs || Reverse Engineering Dex2C - Recovering smali from native code and retrieving the original SMALI codes. https://t.co/HVTUhRZQTa
0
1
1
@SecFatal
FatalSec
2 years
#androidpentest #frida #fridabypass #mobilesecurity Stuck with some advance frida detections while pentesting mobile applications? Here is our new video which showcases how to bypass such techniques. @mobilesecurity_ https://t.co/tyYPDCatHE
0
6
14
@AbhiTheModder
Abhi
2 years
๐Ÿ˜ Check out my #GitHubUnwrapped 2023! Get yours now on https://t.co/nodYjVOz35
0
0
2
@embee_research
Matthew
2 years
Malware Unpacking With Memory Dumps - Intermediate Methods Utilising Pe-Sieve, Process Hacker, Pe-bear and Hxd to identify, perform and correct memory dumps leading to unpacked malware. https://t.co/AfQP9F9yaU #malware #Dnspy
embeeresearch.io
Demonstrating three additional methods for obtaining unpacked malware samples. Using Process Hacker, Pe-sieve, Hxd and Pe-bear.
4
112
309
@AbhiTheModder
Abhi
2 years
Hey everyone! Excited to share my new YouTube video with you all. It's all about building Hermes from source on Termux. Get your coding skills ready and let's embark on this awesome journey together! ๐ŸŽฅ๐Ÿ’ช #Termux #Hermes https://t.co/4HzrPnkp8E
0
0
2
@AbhiTheModder
Abhi
2 years
Just why these sh*ts do such things even with open-source softwares ๐Ÿคฆโ€โ™‚๏ธ I mean it's understandable when you do such things with big corporates but this is...๐Ÿคทโ€โ™‚๏ธ
@rethinkdns
rethinkdns
2 years
This is now up to 80M a day. Est to cost us $400/mo. Yikes.
0
0
2
@AbhiTheModder
Abhi
2 years
Howย Lucky Patcherย works onย someย flutter apps. Read Full Article: Web Version: https://t.co/2XY8haezgB Instant View[Telegraph]: https://t.co/bWIoPF27UY GitHub: Lucky' https://t.co/oqeTtG5htS
0
0
3
@mr_phrazer
Tim Blazytko
2 years
Great blog post about various code obfuscation schemes found in Apple's FairPlay DRM system. Recommended read, especially for ppl interested in learning more about reverse engineering, code obfuscation etc.
@nicolodev
nicolodev
2 years
Analysis of Obfuscation Found in Apple FairPlay https://t.co/NigzGQbou6
0
12
47