Become a sponsor to +Ch0pin
Hi, I’m DimitriOs — a security researcher focused on Android internals, reverse engineering, and mobile application security.
I’m the creator and maintainer of Medusa — an extensible, modular framework for automated dynamic runtime analysis of Android and iOS applications. Medusa brings together over 90 plug-and-play modules for penetration testers, mobile security researchers, and malware analysts, enabling efficient large-scale instrumentation, behavioral analysis, and automation of repetitive tasks.
It serves as a centralized FRIDA-based environment, allowing you to dynamically load modules, bypass SSL-pinning, inspect traffic, trace APIs, and extract cryptographic or malware-related data — all from a single customizable main script.
Your sponsorship helps me continue improving Medusa’s framework, developing new modules, expanding iOS support, and maintaining open-source tooling that empowers the security community.
Thank you for supporting independent research and the evolution of open-source mobile security tooling.
Featured work
-
Ch0pin/medusa
Binary instrumentation framework based on FRIDA
JavaScript 2,084