I’m seeking an experienced developer with strong reverse engineering skills to dissect the Threads iOS application and map out key API endpoints. This is a technical contract for someone comfortable working at the network protocol, request/response, and app binary level to uncover undocumented methods.
Scope of Work:
Reverse engineer Threads iOS app to determine API calls for: Login authentication flow Follow / Unfollow user actions Edit bio requests Profile picture upload/update Create new post (text/images) Document all endpoints: Required URL paths and HTTP methods (GET, POST, etc.) Headers, tokens, and authentication requirements Request and response JSON structures Verify endpoints are functional by crafting example requests. Deliver a clear technical document + minimal example code (Python, JS, or cURL) demonstrating each endpoint. Requirements:
Proven background in reverse engineering iOS apps (static & dynamic analysis). Proficiency with tools like Charles Proxy, mitmproxy, Burp Suite, Frida, Objection, Hopper, IDA, etc. Understanding of modern authentication flows (OAuth, JWT, signed requests). Ability to work quickly while preserving data confidentiality. Deliverables:
Full endpoint map with parameters & expected payloads. Auth/session handling procedure. Working minimal scripts showing usage. Budget: Open to discussion based on experience and timeline. Timeline: 1–2 weeks preferred. Engagement: NDA required prior to starting.
How to Apply: In your message, please outline:
Similar reverse engineering projects you’ve completed. Tools/tests you plan to use. Expected approach to avoid triggering anti-bot or anti-scraping blocks.