
Han Gong
Frida iOS reverse API hook SSL bypass gRPC
Skills

See my services


Work experience
iOS Reverse Engineering Specialist | Frida Expert
Self-Employed / Independent iOS Reverse Engineer • Self-employed
Dec 2015 - Present • 10 yrs 5 mos
Independent iOS reverse engineering specialist with hands-on experience in dynamic and static analysis of iOS applications. Key responsibilities and achievements: - Developed custom Frida scripts for runtime hooking of Objective-C/Swift methods, parameter tracing, modification, and call interception - Performed SSL/TLS pinning bypass and secure network traffic analysis for security research and API extraction - Extracted and decoded gRPC/Protobuf payloads from encrypted communications - Bypassed anti-debug protections (ptrace, sysctl), jailbreak detection, and runtime defenses - Conducted static disassembly using IDA and Hopper Disassembler and Ghidra to uncover private APIs, classes, strings, and encryption logic - Delivered actionable reports with Frida JS scripts, screenshots, code snippets, and detailed explanations for clients in security auditing, SDK analysis, and backend replication projects Committed to 100% confidentiality, fast delivery, and clear communication. Continuously self-updating skills through real-world projects and security communities.