Thanks to visit codestin.com
Credit goes to Github.com

Skip to content
View MUH4MM4D-SH4KIB's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report MUH4MM4D-SH4KIB

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MUH4MM4D-SH4KIB/README.md
MUHAMMAD SHAKIB



MUHAMMAD SHAKIB

Security Researcher · Reverse Engineer · Full-Stack Developer

I break apps to make them secure — and build things from scratch.


Telegram   GitHub   Facebook   Profile views

🔐 SSL Pinning Bypass

I bypass SSL/TLS certificate pinning at both Java layer and native C/C++ level.

Successfully bypassed:

Facebook · Instagram · Instagram Lite · Threads · Business Suite · TikTok · Twitter / X · Crunchyroll · CoinGlass · and many more across social media, streaming, and fintech apps.


🔍 Reverse Engineering & App Analysis

 APK Decompilation        →  Tear apart any Android app to its core
 Native Library Analysis  →  .so file disassembly & ARM64 patching
 Runtime Instrumentation  →  Frida hooks at Java & native levels
 Smali Modification       →  Direct bytecode editing & APK rebuilding
 Signature Spoofing       →  Bypass server-side signature verification

🔄 API Reverse Engineering

I intercept and reconstruct private/undocumented APIs from mobile applications — mapping authentication flows, documenting hidden endpoints, and turning closed systems into testable interfaces.


💻 Web & API Development

 Frontend   →  Responsive websites with HTML5 · CSS3 · JavaScript
 Backend    →  RESTful APIs with Python · Flask · FastAPI
 Full Stack →  End-to-end web applications from UI to database

🛠️ Tools & Tech

Security Frida · Ghidra · Radare2 · Burp Suite · JADX · APKTool · Objection · mitmproxy
Languages Python · JavaScript · Java · Kotlin · Smali · ARM64 Assembly
Web / API HTML5 · CSS3 · REST APIs · Flask · FastAPI · Postman
Platforms Android · Linux · Termux · Git

📊 GitHub Overview

  GitHub Streak


Need something bypassed, reverse engineered, or built?

📬 Telegram · 💻 GitHub · 📘 Facebook

Pinned Loading

  1. Facebook-SSL-Pinning-Bypass Facebook-SSL-Pinning-Bypass Public

    Facebook SSL Pinning Bypass for Android – intercept Facebook traffic.

    9 4

  2. Meta-Business-Suite-SSL-Pinning-Bypass Meta-Business-Suite-SSL-Pinning-Bypass Public

    Meta Business Suite SSL Pinning Bypass for Android – intercept Meta Business Suite traffic..

    8 3

  3. Messenger-SSL-Pinning-Bypass Messenger-SSL-Pinning-Bypass Public

    Messenger SSL Pinning Bypass for Android – intercept Messenger traffic..

    7 3

  4. Threads-SSL-Pinning-Bypass Threads-SSL-Pinning-Bypass Public

    Threads SSL Pinning Bypass for Android – intercept Threads traffic.

    Shell 8 2

  5. Instagram-SSL-Pinning-Bypass Instagram-SSL-Pinning-Bypass Public

    Instagram SSL Pinning Bypass for Android – intercept Instagram traffic.

    Shell 4