Security researcher and reverse engineer focused on Android security, dynamic instrumentation, and offensive tooling. Building open-source tools that help the security community analyze, test, and understand software.
JavaInjector β Inject JAR files into running Java processes through DLL injection
C++soSaver β Frida-based extraction of native
.solibraries from Android appsPythonphantom-frida β Anti-detection Frida server builder. ~90 patches, 16 detection vectors, weekly auto-builds
Pythonclsdumper β Dump all DEX files from running Android apps using Frida
TypeScript
π Android Security & Reverse Engineering
| Project | Description |
|---|---|
| JavaInjector | Inject JAR files into Java processes via DLL injection |
| soSaver | Extract native .so libraries from Android apps with Frida |
| phantom-frida | Anti-detection Frida server builder (~90 patches, 16 vectors) |
| clsdumper | Dump DEX files from running Android apps via Frida |
| APPATCHER | Android application patcher for network debugging |
| justapk | Download any APK by package name β 6 sources, auto fallback |
π‘οΈ Security & Pentesting
| Project | Description |
|---|---|
| reSolver | BurpSuite extension β automated CAPTCHA solving (6 providers, 8 CAPTCHA types) |
| phishgram | Credential harvesting toolkit for authorized red-team simulations on Telegram |
| WAFuzzer | WhatsApp bot fuzzer β payload injection via Selenium |
π Reverse Engineering & Research
| Project | Description |
|---|---|
| chatruletka | Step-by-step JavaScript deobfuscation of a video chat application |
| telegram-web-unpacked | Unpacked Telegram web app β source map reverse engineering |
| telebrief | Telegram channel analyzer with 20+ metrics and reporting |
π§ Utilities
| Project | Description |
|---|---|
| pastyper | Types clipboard content char-by-char when Ctrl+V doesn't work |
| UIAutomatorViewer | Modified UIAutomatorViewer build for Windows x64 |



