OP 23 January, 2023 - 10:44 PM
(This post was last modified: 23 January, 2023 - 11:02 PM by RAISEN_VIP. Edited 1 time in total.
Edit Reason: appears Font Font Font, idk why
)
:dance2: Service of Configs, Checkers, Reversing Apps Mobile :dance2:
Hello everyone, my name is RAISEN, I am a software developer,
Mobile Applications Analyst, Pentester and I have been doing Configs and Checkers for the Latin American community for more than 5 years.
This is my first time making myself known to English-speaking communities.
I hope I can provide you with a good service and be to your liking and be able to fulfill your requests for custom configs or checkers.
Something important is that I only do "Monthly (remote) Configs" through a modification that I have made to the version of OpenBullet which I have called RaisenBullet, which avoids several attacks to see the api and which I have been increasing custom functions to achieve make the APIs that clients request.
I still have a lot to learn and I hope to learn from you too.
Here are some of my skills, in case you want to hire my services
Hello everyone, my name is RAISEN, I am a software developer,
Mobile Applications Analyst, Pentester and I have been doing Configs and Checkers for the Latin American community for more than 5 years.
This is my first time making myself known to English-speaking communities.
I hope I can provide you with a good service and be to your liking and be able to fulfill your requests for custom configs or checkers.
Something important is that I only do "Monthly (remote) Configs" through a modification that I have made to the version of OpenBullet which I have called RaisenBullet, which avoids several attacks to see the api and which I have been increasing custom functions to achieve make the APIs that clients request.
I still have a lot to learn and I hope to learn from you too.
Here are some of my skills, in case you want to hire my services
[+] Application of engineering and laboratory analysis (pentesting) in mobile phones (Android-iOS).(Dex-Kotlin-IPA).
[+] Experience in the Analysis and Bypass of any TLS, SSL or HANDSHAKE connection or APK's connection error security, basic, intermediate, Advanced and also Custom TLS/SSL pinning, are easy for me.
[+] Analysis of encrypted or encrypted variables in post, headers, cookies, urls, and emulate their encryption operation and be able to make the Request in an encrypted way Exactly like the API.
[+] Decryption of variables, I will be able to see the keys of the encryption methods in Android, iOS or Web mobile apps.
[+] API-level decryption in APK Methods AES, SHA1, SHA256, BYCRYPT, HMAC or any other custom method.
[+] Android jailbreak experience.
[+] iOS jailbreak experience.
[+] Experience defeating Android Root within apps.
[+] Experience defeating iOS Root within apps.
[+] Experience defeating the TLS, SSL Pinning or connection error when trying to view the api.
[+] Bypass some Recaptchas v2, v3
[+] Bypass some WAF not all
[+] Bypass some PerimeterX not all
[+] Memory dump, Memory scan and Native Methods emulation (lib.so)
[+] arm, native libraries, fingerprint, some PX, and some shape security
[+] Experience doing Request Protobuf or with Content or PostData as array
[+] Some of the things mentioned above are possible on the web, not all, just some.
✅ MY DISCORD
? https://discord.gg/QP69v4k45T
✅ TICKET IN TELEGRAM:
? @TicketRaisen_bot
✅ Channel News 1: @NEWS_API
✅ Channel News 2: @NEWS_APIS
✅ Vouches: @TeamRaisenApis_VOUCHES
✅Public Group Chat @Ventas_cuentasGlobal_Apis
[+] Experience in the Analysis and Bypass of any TLS, SSL or HANDSHAKE connection or APK's connection error security, basic, intermediate, Advanced and also Custom TLS/SSL pinning, are easy for me.
[+] Analysis of encrypted or encrypted variables in post, headers, cookies, urls, and emulate their encryption operation and be able to make the Request in an encrypted way Exactly like the API.
[+] Decryption of variables, I will be able to see the keys of the encryption methods in Android, iOS or Web mobile apps.
[+] API-level decryption in APK Methods AES, SHA1, SHA256, BYCRYPT, HMAC or any other custom method.
[+] Android jailbreak experience.
[+] iOS jailbreak experience.
[+] Experience defeating Android Root within apps.
[+] Experience defeating iOS Root within apps.
[+] Experience defeating the TLS, SSL Pinning or connection error when trying to view the api.
[+] Bypass some Recaptchas v2, v3
[+] Bypass some WAF not all
[+] Bypass some PerimeterX not all
[+] Memory dump, Memory scan and Native Methods emulation (lib.so)
[+] arm, native libraries, fingerprint, some PX, and some shape security
[+] Experience doing Request Protobuf or with Content or PostData as array
[+] Some of the things mentioned above are possible on the web, not all, just some.
✅ MY DISCORD
? https://discord.gg/QP69v4k45T
✅ TICKET IN TELEGRAM:
? @TicketRaisen_bot
✅ Channel News 1: @NEWS_API
✅ Channel News 2: @NEWS_APIS
✅ Vouches: @TeamRaisenApis_VOUCHES
✅Public Group Chat @Ventas_cuentasGlobal_Apis