frenchyeti
Software Security Researcher
Funding Links: https://github.com/sponsors/FrenchYeti
- Name: FrenchYeti
- Location: France
- Company: Reversense
- Kind: user
- Followers: 423
- Following: 62
- Total stars: 1553
- Repositories count: 113
- Created at: 2022-11-17T12:54:15.502Z
- Updated at: 2025-03-30T09:29:39.817Z
- Last synced at: 2025-03-30T09:29:39.817Z
GitHub Sponsors Profile
Hey there đź‘‹
I am a physical person from France.
I develop several Android/TEE reverse engineering and dynamic analysis tools, and software libraries for electron/angular stack
One of most active project is Interruptor - a Frida based system call hooking library. It offers arguments parsing and tampering with a rich API to avoid use kernel constant name instead of direct values.
I do conferences and free workshops about code protection mechanisms, bypasses with Frida and reverse engineering tooling [Insomni'hack 2022 - EN] [LeHack 2022 - FR] [NorthSec 2022 - FR] [Ressources].
My main project is Dexcalibur - a reverse engineering platform focused on instrumentation automation for Android application - project is currently paused to switch to another tech stack. It allows anyone to reverse engineer and to inspect application at runtime including obfuscated apps.
In other hand, i develop various underlying libraries and scripts (some includes into Dexcalibur) to help mobile security engineer to assess application or reverse malware. Example : [FridaCodeShare - arm64 strace] [Android file system hook for Frida]
Actually, i maintain a free oss version and a paid version of Dexcalibur. Paid version has a rich electron-based UI and it is based on an Eclipse-like IDE framework developped by myself.
Thanks to sponsorship, i hope to provide a single - free and open-source - version of Dexcalibur including all features and a better UI.
- Current Sponsors: 2
- Past Sponsors: 0
- Total Sponsors: 2
- Minimum Sponsorship: $1.00
Featured Works
FrenchYeti/dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
Language: JavaScript - Stars: 1085enovella/TEE-reversing
A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
Language: - Stars: 918FrenchYeti/interruptor
Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker
Language: TypeScript - Stars: 341FrenchYeti/frida-scan
A small utilities to scan process memory and search patterns using frida with a single line of command
Language: Python - Stars: 21FrenchYeti/rasputin
A place to reborn
Language: JavaScript - Stars: 59Past Sponsorships
View AllSponsorship Breakdown by Kind
- User: 1