Skip to content
View MUH4MM4D-SH4KIB's full-sized avatar

Block or report MUH4MM4D-SH4KIB

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MUH4MM4D-SH4KIB/README.md

πŸ›‘οΈ MUHAMMAD SHAKIB


πŸ‘‹ About Me

It's me MUHAMMAD SHAKIB, a passionate Security Researcher and Mobile Application Pentester with specialized expertise in reverse engineering and vulnerability assessment. I focus on identifying security flaws in mobile applications and helping developers create more secure software.


πŸ’Ό Core Competencies

πŸ”’ Security Specializations

  • Mobile Application Security Testing
  • Reverse Engineering & Static Analysis
  • SSL/TLS Certificate Pinning Bypass
  • Vulnerability Assessment & Penetration Testing
  • Security Research

πŸ› οΈ Technical Skills

Python JavaScript Java Kotlin Android
HTML5 CSS3 Burp Suite Frida

🎯 Expertise Areas

πŸ“± Mobile Security

  • Android App Analysis and security assessment
  • Reverse Engineering using tools like JADX, Ghidra, APKTool
  • Runtime Manipulation with Frida and Xposed
  • SSL Pinning Bypass techniques for mobile applications
  • Secure Code Review and best practices implementation

πŸ”§ Technical Capabilities

  • Static & Dynamic Analysis of mobile applications
  • Network Security testing and intercepting
  • Cryptographic Implementation review
  • Vulnerability Identification and exploitation
  • Security Tool Development in Python
  • Api Development

πŸ”— Connect With Me

Facebook Telegram GitHub


🌟 Current Focus

  • πŸ”¬ Researching advanced mobile application security techniques
  • πŸ›‘οΈ Developing security assessment methodologies
  • πŸ“š Continuous learning in reverse engineering
  • πŸ” Exploring new vulnerability classes in mobile apps

πŸ”Ž How to Find Me Online

Search Terms: Muhammad Shakib Security Researcher, Mobile App Pentester Bangladesh, Android Security Specialist, Reverse Engineering Expert


⚑ "Curiosity is the engine of achievement."

πŸ“« Let's Collaborate

I'm always open to discussing security research, collaboration on projects, or helping with mobile application security challenges. Feel free to reach out through any of the platforms above!

Popular repositories Loading

  1. Facebook-SSL-Pinning-Bypass Facebook-SSL-Pinning-Bypass Public

    Facebook SSL Pinning Bypass this repository demonstrates practical methods to bypass SSL/TLS pinning in the Facebook Android app, enabling HTTPS traffic interception for security research, reverse …

    5 2

  2. Meta-Business-Suite-SSL-Pinning-Bypass Meta-Business-Suite-SSL-Pinning-Bypass Public

    Meta Business Suite SSL Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Meta Business Suite Android app, enabling HTTPS traffic interception for security research, re…

    5 2

  3. Messenger-SSL-Pinning-Bypass Messenger-SSL-Pinning-Bypass Public

    Messenger SSL Pinning Bypass this repository demonstrates practical methods to bypass SSL/TLS pinning in the Messenger Android app, enabling HTTPS traffic interception for security research, revers…

    4 2

  4. Threads-SSL-Pinning-Bypass Threads-SSL-Pinning-Bypass Public

    Threads SSL Pinning Bypass this repository demonstrates practical methods to bypass SSL/TLS pinning in the Threads Android app, enabling HTTPS traffic interception for security research, reverse en…

    4 2

  5. Workplace-SSL-Pinning-Bypass Workplace-SSL-Pinning-Bypass Public

    Workplace-SSL-Pinning-Bypass demonstrates practical methods to bypass SSL/TLS pinning in the Workplace Android app, enabling HTTPS traffic interception for security research, reverse engineering, d…

    4

  6. MUH4MM4D-SH4KIB MUH4MM4D-SH4KIB Public

    2 1