Skip to content
View 0x3xploit's full-sized avatar
๐ŸŽฏ
Focusing
๐ŸŽฏ
Focusing

Block or report 0x3xploit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please donโ€™t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
0x3xploit/README.md

Hi ๐Ÿ‘‹, I'm Pratham Naik

A CTF player from India

  • ๐ŸŒฑ Iโ€™m currently learning Exploit Development Reverse Engineering and Malware analysis

  • ๐Ÿ“ I regularly write articles on [Reverse engineering](Reverse engineering)

  • ๐Ÿ’ฌ Ask me about Low level stuffs

  • ๐Ÿ“ซ How to reach me naikpratham1212@gmail.com

stats graph languages graph
cplusplus logo c logo java logo python logo android logo androidstudio logo bash logo vim logo visualstudio logo

Pinned Loading

  1. frida-android-jni-hooking frida-android-jni-hooking Public

    Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for security testing and debugging.

    JavaScript 46 5