Reverse Engineer Β· Security Researcher Β· Full-Stack Developer
Dissecting code, breaking boundaries, and crafting tools for the curious.
Welcome β I'm void-eth
, a developer obsessed with how things work under the hood. I specialize in:
- π§© Reverse engineering Android, web, and native applications
- π Security research with a focus on bypasses, exploits, and de-obfuscation
- π οΈ Tool development for automation, dynamic analysis, and patching
- π Full-stack scripting using Python (Flask), Bash, Smali, and more
π£ VoidGPT
π§ A custom, authentication-free interface to interact with ChatGPT models using a Flask-powered web server. No tokens. No API keys. Just raw access.
- π Reverse-engineered architecture for direct communication
- β‘ Built-in fallback and error recovery for robust querying
- π Lightweight and deployable on minimal infrastructure
π‘οΈ pairip-protection-remover
π A fully-automated system to strip PairIP protection and licensing checks from
.apks
(Flutter apps).
- 𧬠Decompiles, patches, and rebuilds APKs in a single command
- π¦ Includes Smali/Java injection, XML cleanup, and re-signing
- π Handles native
.so
and VM protection layers
Domain | Tools & Languages |
---|---|
π Scripting | Python, Bash, Shell, JavaScript |
π§ Reverse Engg. | Frida, Ghidra, JADX, apktool, Smali, IDA Pro |
π± Mobile Hacking | ADB, Magisk, Rooted Analysis, MITM (Burp, mitmproxy) |
π Web Dev | Flask, HTML/JS, REST APIs, reverse proxying, Puppeteer |
π¬ Automation | CLI tools, debuggers, deobfuscators, patchers |
- π¬ Software exploitation and vulnerability analysis
- π² Mobile app decryption and bypasses
- π€ AI-powered toolchains for fuzzing and debugging
- π§ Smart automation for RE workflows and static/dynamic inspection
Want to collaborate, explore a security idea, or dive into some binary chaos?
- π¬ Email: [coming soon]
- π¬ GitHub Discussions: Open a thread on any of my projects
- βοΈ Deploy & test: I build tools meant to be run, broken, and rebuilt.
"Code is like a lock β and I'm here to pick it."