Abhi
@AbhiTheModder
Followers
86
Following
381
Media
17
Statuses
117
19y.o | Reverse Engineer | Dev | https://t.co/2TU6PGEhTB | Personal Tweets: @Qbtaumai | https://t.co/pDdnKwTwcj
r2frida
Joined December 2022
T 01 ๐๐๐๐ ๐๐๐๐() { ๐๐๐๐๐('๐ท๐๐๐๐, ๐๐๐๐๐!'); } YouTube: https://t.co/rVdetNOer4 GitHub: https://t.co/hwfMSy3jlW Discord: https://t.co/wb76nDghsi Matrix: https://t.co/LlviDmxRqf Mattermost: https://t.co/gF4KzlRlpd
youtube.com
Hey folks๐ It's Abhi, 18y.o | Reverse Engineer | Dev | Disclaimer: - All the videos on this channel are only for educational purposes. This channel will not be responsible for any kind of illegal...
0
0
2
Had a great time experimenting with r2 WASI (and of course, the CORS nightmare of WASM & hours of digging to fix a regression in latest release ๐. It transformed from a simple looking UI into this. It was funโ๏ธ https://t.co/YQTSUO3iaF
0
2
7
And termux compatibility ไนโ [โ ย โ โโ ย โ แดฅโ ย โ โโ ย โ ]โ ใ
0
0
1
Everyone's hopping on the MCP train ๐ Why limit it to one tool (jadx, IDA, etc.)? Let's make it do everything. Here's a WIP: MCP Server + @Google's Gemini solving the latest @squ1rrelCTF 2025 Android rev challenge โ start to finish :P
1
2
4
We just opened our YouTube channel! ๐น First video is out: An introduction to LLVM IR ๐ฒ Check it out: https://t.co/POPKXsBMuN Let us know what you think ๐
1
12
64
All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! ๐ https://t.co/8Jnqg6H3N8
1
102
241
PineHookPlus No more writing code for every hookโsimply provide the class name, method name, and desired return value, and let Pine handle the rest! https://t.co/Jfgha6I3sJ
@kyzsuki
github.com
Pine Hook +. Contribute to RevEngiSquad/PineHookPlus development by creating an account on GitHub.
1
4
22
Overriding Default Values of Android Constructor Parameters at Runtime https://t.co/eNKp8448i5 Fine: Pine and Frida better together https://t.co/rGZi1rUykk Just created for Fun while learning frida :)
github.com
Pine and Frida better together. Contribute to AbhiTheModder/Fine development by creating an account on GitHub.
0
2
6
ARM Architecture Debate: SL vs. THR Registers in Dart AOT true/false https://t.co/pURbZJ14t7
#FlutterRE #radare2 #assembly
qbtaumai.pages.dev
Abhi's Blog
1
1
4
For example, Dart versions 3.4.x share the same snapshots. If you have a compiled (b)lutter for version 3.4.1, you can use the `--dart-version 3.4.1_android_arm64` flag with other 3.4.x versions like 3.4.2 or 3.4.3, and it will work! :P
0
0
0
Quick tip for using (b)lutter: If you encounter Dart versions with identical snapshots, you don't need to recompile (b)lutter. Just use the `--dart-version` flag with an existing compiled version of the same snapshot.
1
0
0
Unveiling Dex2C Compiled Android APKs || Reverse Engineering Dex2C - Recovering smali from native code and retrieving the original SMALI codes. https://t.co/HVTUhRZQTa
0
1
1
#androidpentest #frida #fridabypass #mobilesecurity Stuck with some advance frida detections while pentesting mobile applications? Here is our new video which showcases how to bypass such techniques. @mobilesecurity_
https://t.co/tyYPDCatHE
0
6
14
Researching Xiaomiโs TEE to get to Chinese money
research.checkpoint.com
Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the latest...
0
4
8
Malware Unpacking With Memory Dumps - Intermediate Methods Utilising Pe-Sieve, Process Hacker, Pe-bear and Hxd to identify, perform and correct memory dumps leading to unpacked malware. https://t.co/AfQP9F9yaU
#malware #Dnspy
embeeresearch.io
Demonstrating three additional methods for obtaining unpacked malware samples. Using Process Hacker, Pe-sieve, Hxd and Pe-bear.
4
112
309
Hey everyone! Excited to share my new YouTube video with you all. It's all about building Hermes from source on Termux. Get your coding skills ready and let's embark on this awesome journey together! ๐ฅ๐ช #Termux #Hermes
https://t.co/4HzrPnkp8E
0
0
2
Howย Lucky Patcherย works onย someย flutter apps. Read Full Article: Web Version: https://t.co/2XY8haezgB Instant View[Telegraph]: https://t.co/bWIoPF27UY GitHub: Lucky' https://t.co/oqeTtG5htS
0
0
3
Great blog post about various code obfuscation schemes found in Apple's FairPlay DRM system. Recommended read, especially for ppl interested in learning more about reverse engineering, code obfuscation etc.
Analysis of Obfuscation Found in Apple FairPlay https://t.co/NigzGQbou6
0
12
47