+
Skip to content
View subho007's full-sized avatar
😇
Working
😇
Working

Organizations

@appknox @EpicGames @androguard @jazzband @xysec @devknox @gitpmio

Block or report subho007

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
subho007/README.md

👋 Hi there, I'm subho007

I'm the Co-Founder & CEO of Appknox, where I help build cutting-edge security products to make mobile applications safer worldwide. My journey is all about offensive security research, mobile app security, and empowering teams to ship secure code at scale.


🛡️ What I Do

  • Expertise: Mobile Application Security, Offensive Security, Security Product Development
  • Notable Skills:
    • Languages: Python, Go, Swift, Kotlin, Bash
    • Security Tools: Frida, Objection, LLDB, Burp Suite, Ghidra
    • Infra & Cloud: Docker, Kubernetes, GitHub Actions, AWS, GCP
    • Specialties: Mobile DAST/SAST, RASP bypassing, eBPF for Android, Reverse Engineering, MDM Security

🚀 Featured Projects

  • KnoxSpy
    A Frida-based API traffic interceptor for MDM-managed Android apps.
  • Androguard
    Core developer of this powerful reverse engineering toolkit for Android apps.
  • pyaxmlparser
    Lightweight Python library to extract metadata from AndroidManifest.xml files in binary AXML format.
  • AFE (Android Framework for Exploitation)
    Early-stage research project for automating Android app pentesting — old but foundational in my journey into mobile security.

🌐 Connect with Me


🧑‍💻 Fun Facts

  • 🏆 Discovered CVE-2013-0926 (WebKit sandbox escape on iOS & Android)
  • 🍜 Street food explorer | 🚁 Drone pilot | ✍️ Occasional poet

“Secure code is great. Secure systems are better. Secure defaults are best.”


Thanks for stopping by! If you’re passionate about security, reverse engineering, or just love good food and flying drones, let’s connect!

Pinned Loading

  1. androguard/androguard androguard/androguard Public

    Reverse engineering and pentesting for Android applications

    Python 5.7k 1.1k

  2. python-downloader python-downloader Public

    Python downloader using Bing API v 2.0 and Google Search !

    Python 7

  3. ios-vnc ios-vnc Public

    Saurik's Fork

    C 5 2

  4. AFE AFE Public

    Forked from appknox/AFE

    Android Framework for Exploitation, is a framework for exploiting android based devices

    Python 4 1

  5. zeroperm zeroperm Public

    ZeroPermission malacious application, view the article at http://www.subho.me/bypassing-the-android-permission-model/

    Java 3

  6. android-ssl android-ssl Public

    Forked from rfreedman/android-ssl

    Example Android project using HTTPS/SSL with client certificates and self-signed server certificate

    Java 1 1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载