About

whoami

I graduated as an Information Technology specialist, and my journey began in Albania, where my initial projects were focused on software government contracts rather than Android development. These projects provided me with a solid foundation in networking and various areas of technology. Little did I know, however, that I would eventually find a stronger passion for programming than for the work I initially did.

I transitioned into Android development, with my first project in the fintech sector. This experience gave me valuable insights into the Android ecosystem. Despite investing time in side projects and part-time freelance work, I still felt a lack of challenge.

This led me to move to Germany in search of new challenges and industries. I joined a team of young engineers and entrepreneurs to tackle medical problems through software, which turned out to be the pivotal boost I needed in my career. Working in the medical sector was not only about programming, but also about learning the complex legal landscape, particularly in relation to the European Union’s regulations.

Afterwards, I joined a company in Munich, where I delved into the mobility sector. I am currently working on future-oriented projects for major mobility companies, and I’ve found a passion for Android in the automotive space. This experience has not only sharpened my Android development skills but also expanded my perspective into undiscovered areas of technology, like the Android platform in cars and complex UI graphics.

Throughout my Android engineering journey, one consistent theme has been my unique approach to app development. While I always try to deliver high-quality, reliable code, my mind naturally takes me towards creative, sometimes unconventional solutions. If you ask my code reviewers, they’d probably say I have a thing for thinking outside the box, often exploring non-traditional methods. As a code reviewer myself, I prioritize spotting security risks, which reflects my mindset—constantly looking for vulnerabilities. Perhaps that’s why I’m so drawn to penetration testing, where this instinct can really thrive.

That’s when it clicked on me. After reflecting on my skills—a deep understanding of the Android platform, a love for out-of-the-box solutions, and my background in networking—I realized that I wasn’t just a software developer; I was also well-suited for penetration testing.

Since then, alongside my Android development work, I’ve immersed myself in APK analysis, bug bounty hunting, and mobile apps security research. It’s something I genuinely love to do.

Mobile Security

Are mobile security threats a real concern? Absolutely. A decade ago, mobile security was often overlooked, with many assuming the platforms were secure enough by default. But independent security researchers began uncovering not just serious but critical vulnerabilities in both Android and iOS. Over time, the mobile hacking landscape has grown to rival that of the web, with penetration testers and security researchers discovering flaws in apps with millions of downloads. I’ve personally encountered some serious cases.

OWASP, a project that helps standardize mobile security practices, provides excellent resources for addressing these issues.

APK Sherlock

This is where APK Sherlock comes in. Much like solving a crime, you begin with the finished product—an Android Application Package (APK)—and work backwards, using reverse engineering to uncover mistakes or vulnerabilities, whether intentional or accidental.

Is there a request I can assist you with?

Do you have an Android app you’d like me to pentest? If so, let’s schedule a call. Please use the subject of the meeting as the title. I look forward to hearing from you!