Skip to content
View Xplo8E's full-sized avatar
:octocat:
:octocat:

Block or report Xplo8E

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Xplo8E/README.md

The wheel of fortune turns ever; when good arrives, expect the bad, and when bad strikes, await the good.


Security researcher who got too curious about how things break.

I reverse engineer mobile apps - iOS and Android, Frida scripts, digging into how things work under the hood. CTFs when they look interesting.

Lately I've been deep into AI - not the hype stuff, but building things that actually work. MCP servers, security-focused agents, figuring out how LLMs fit into research workflows without being annoying. It's an interesting space when you approach it as tooling rather than magic.

I build my own apps when I need something that doesn't exist, and go down research rabbit holes more often than I probably should.

Still learning, still breaking things.

Pinned Loading

  1. intrascan intrascan Public

    Mobile security scanner that runs Nuclei templates via Frida to test MDM app APIs through their VPN tunnels.

    Python 6

  2. shadow shadow Public

    Forked from sammyjeng/shadow

    A jailbreak detection bypass for modern iOS jailbreaks.

    Logos 1

  3. fridactl fridactl Public

    a simple preference bundle to set frida server port.

    Objective-C 2

  4. hacktricks-mcp-server hacktricks-mcp-server Public

    Bring HackTricks pentesting knowledge into Claude Desktop. Search 1000+ security techniques, exploits, and payloads without leaving your AI assistant. MCP-powered, npx-ready.

    JavaScript 1