oooo oooo oooo
ooooo888 ooooooo oo oooooo 888 ooooo oooooooo8 888ooooo
888 888 888 888 888 888 888o888 888ooooooo 888 888
888 888 888 888 888 888 8888 88o ooo 888 888 888
88ooo888o 88ooo88 o888o o888o o888o o888o 888 88oooooo88 o888o o888o
put a bangin' donk on it
A hacker. Interested in mobile reverse engineering and data mining.
Based in Vienna, Austria.
Education and other credentials:
None.
Publications:
Discovering undocumented mobile application APIs
Covering the basics of using TLS interception, static analysis and
dynamic instrumentation techniques to uncover hidden API endpoints
in iOS and Android applications.
Your Conference?
Parler Tricks
Unofficial API for the Parler social network, released as a
Python library with all endpoints used by the iOS application.
https://git.tcp.direct/d0nk/parler-tricks
Twitter Fleets
Using a hidden Twitter API endpoint to bypass authentication and
scrape expired fleets without triggering a "read" notification
OSINTCurious Podcast, Episode 48
https://techcrunch.com/2020/11/21/twitter-fleets-bug/
Hacktivism for Free Public Transportation
Exposing cryptographic vulnerabilities in middleware used by mobile
app public transportation ticketing systems
December 2019, NorthernRST, Aberdeen, Scotland
(video unavailable)
Skills:
Android, iOS and React Native mobile application development.
Static and dynamic analysis of Android and iOS applications.
Reverse engineering, auditing and data mining third-party APIs.
Full-stack web development using TypeScript, Python and Rust.
Data analytics using PostgreSQL and Google BigQuery.
Linux/FreeBSD system administration and DevOps.
Contact:
Twitter: https://twitter.com/donk_enby
please @ me before sending me a direct message
Matrix: @rd:fairydust.space
Work experience and other forms of contact available upon request.