Hi! I'm speedyfriend67 β a curious iOS reverse engineer, creative Swift developer, and bug bounty hunter π§ͺ. I explore Apple internals, make PoCs, design custom tools, and build security-focused apps from scratch. Always learning, always shipping.
-
π iOS Security Research
- Bug bounties via Apple Security Bounty program
- Reverse engineering with IDA Pro & Ghidra
- Mach-O parsing, No-JIT hooking, kernel fuzzing, and PoCs
-
π§° iOS App Development
- Building SwiftUI apps for iOS: from IPA signers to UniGram (campus notification app)
- Tools for Mach-O analysis, IPA injection, and APK Runner
- Using ElleKit, zsign-ios, MachOKit, and more
- Writing PoCs for iOS/macOS
- Creating a professional Ghidra-like reverse engineering suite in Rust, Go, and C++ (in the future)
- Designing Swift packages (e.g. gradients, Mach-O utilities)
- UI/UX experimentation with shaders, blur, glassmorphism, and 3D visuals
Project | Description |
---|---|
IPASigner | SwiftUI app to sign & inject tweaks into .ipa files using ElleKit & zsign-ios |
UniGram | A campus notification app that scrapes university notices & alerts users |
Alony | Skyblock-style customizable island game in the browser using Three.js |
Mach-O Analyzer | iOS app for parsing and inspecting Mach-O headers using MachOKit |
No-JIT Hooking Blog | Writing technical blog posts on bypassing JIT restrictions on iOS |
- π iOS mod menu for Minecraft using Titanox (non-jailbroken)
- π§ DM me on Discord, email me (speedyfriend433@gmail.com), or find me on GitHub!
- π¬ Korean π°π· & English πΊπΈ OK
- π For learning, not for piracy. All tools are for research, personal use, and ethical testing.
βEverything can be broken. The fun part is learning how.β