Skip to content
You must be logged in to sponsor Ch0pin

Become a sponsor to +Ch0pin

@Ch0pin

+Ch0pin

Ch0pin
/dev/null

Hi, I’m DimitriOs — a security researcher focused on Android internals, reverse engineering, and mobile application security.

I’m the creator and maintainer of Medusa — an extensible, modular framework for automated dynamic runtime analysis of Android and iOS applications. Medusa brings together over 90 plug-and-play modules for penetration testers, mobile security researchers, and malware analysts, enabling efficient large-scale instrumentation, behavioral analysis, and automation of repetitive tasks.

It serves as a centralized FRIDA-based environment, allowing you to dynamically load modules, bypass SSL-pinning, inspect traffic, trace APIs, and extract cryptographic or malware-related data — all from a single customizable main script.

Your sponsorship helps me continue improving Medusa’s framework, developing new modules, expanding iOS support, and maintaining open-source tooling that empowers the security community.

Thank you for supporting independent research and the evolution of open-source mobile security tooling.

@Ch0pin

Modernize its design for greater performance and extensibility, further enhance iOS support, and develop new specialized modules to provide deeper runtime visibility and analysis.

Featured work

  1. Ch0pin/medusa

    Binary instrumentation framework based on FRIDA

    JavaScript 2,084

0% towards 10 monthly sponsors goal

Be the first to sponsor this goal!

Select a tier

$ a month

Choose a custom amount.

$5 a month

Select
  • Get a Sponsor badge on your profile

$110 a month

Select
  • Name goes under Medusa's banner

$125 a month

Select
  • Logo or name goes in my project README