Mouad معاذ Abouhali
@_m00dy_
Followers
612
Following
8K
Media
16
Statuses
1K
Security Reseacher/ Hacking is my motto , Marathon/Trailrunner/Climbing On my way to be a Fakir ... (#rev13 on freenode, a_m00dy_ on Instagram )
Joined April 2011
Windows Exploitation Techniques: Winning Race Conditions with Path Lookups
0
18
60
Most exploitation activity related to the CVE-2025-55182 vulnerability affecting React Server Components, Next.js, and related frameworks originated from red teams assessments, but observed exploitation attempts by threat actors deliver various payloads.
microsoft.com
CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is a critical pre-authentication remote code execution (RCE) vulnerability affecting React...
2
48
124
The December 2025 security updates are available:
Security updates for December 2025 are now available. Details are here: https://t.co/WW89TchdN8
#PatchTuesday #SecurityUpdateGuide
1
20
44
RCE in React Server Components.. Next.js users impacted, upgrade immediately https://t.co/Jj1zJchxnW
react.dev
The library for web and native user interfaces
0
3
4
Join me this Friday at 11AM with guest Bramwell Brizendine on the next @offby1security stream titled, "Can't Stop the ROP! Weaponizing ROP on Windows to Bypass System DLLs" Please use the following YouTube link: https://t.co/FimhzBS6IL
0
11
54
We have some exciting news – Corellium is now officially part of Cellebrite! Welcome to a new era for mobile security research and testing. We can’t wait to show you what the future holds as a Cellebrite company! Read the press release to learn more ⬇️
cellebrite.com
The addition of Corellium’s leading virtualization technology to the Cellebrite platform delivers unmatched capabilities that transcend digital forensics, investigations, analytics and intelligence ...
20
20
116
Great talk by Samuel Groß(@5aelo). Those who think that the train has left and it is too late to enter the browser vr/xd... This is not true, so good luck to everyone in your endeavors. And once again I want to mention the legend - Seunghyun Lee(@0x10n) https://t.co/vxqmVaHIpU
#POC2025 Slides are up NOW! Those slides currently in private and will be uploaded later by the speakers 😆 https://t.co/GdR9tI6Mg1
0
19
147
📢Call for beta testers!📢 The "Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!" course by Antonio Nappa @jeppojeps / @fuzzsociety_org will begin November 28th. Sign up here: https://t.co/Cf884f9jlY This course explores the
docs.google.com
Enter the email you have used / will use when registering for beta.ost2.fyi. This will be used to enroll you in the beta class if you are selected. If your account does not exist at the time enroll...
1
28
109
How to build Android Bug Bounty lab Guide to configuring emulators, real devices, proxies, Magisk, Burp, Frida by @yeswehack
https://t.co/f3Iez8PKI0
3
126
682
Unit 42 uncovers the new LANDFALL Android spyware delivered as DNG images that exploit CVE-2025-21042 in Samsung devices. https://t.co/qFWkEUFMxC
1
18
68
A demo for the Renesas RX64M is now available for download. This is the first demo that targets an RXv2 cored MCU. http://t.co/gnlbhZWEeT
0
1
2
📱 A Comprehensive Guide on Modern iOS Pentesting Guide: https://t.co/oOZ3u4p6Vg Author: Noah Farmer (@d_vuln)
1
112
524
Frida JDWP Loader This tool dynamically attaches #Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without root access. Perfect for quick dynamic app analysis https://t.co/4mxB8feSLb
6
90
454
New public advisories released by @Acronis related to our research: https://t.co/HiE4YPn4dd,
https://t.co/Jk2wlo8mKZ,
https://t.co/e9JRdKF6qq,
https://t.co/EH7s5XBKPc,
https://t.co/o6A7JdLD3G,
https://t.co/vDwVuswZeB. Don't forget to apply patches!
0
4
4
I've been waiting for this a long time: the latest version of WinDbg is now shipping with the console mode debuggers (cdb, kd, ntsd) as well🥳 If you start WinDbg a bazillion times a day, starting cdb instead will save you a lot of frustration / time.
1
13
86
If there's interest I was thinking about doing a stream for an hour this Friday while I'm teaching a class on introductory Windows exploit development. Next Friday I'm hoping to continue turning the recent patch diff we did on ole32.dll into a crash condition PoC.
16
8
129
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
11
262
1K
Windows Native API Programming course is now available on Trainsec! https://t.co/Z4haEdcbrB
trainsec.net
The Windows native API is the “real” API user-mode code uses to talk to the kernel. This API, however, is mostly undocumented. The course teaches the fundamentals of the Native API implemented by...
1
22
104
I guess AI isn't all bad... I asked ChatGPT to explain to me why so many people without any visible talent are famous. Its fair response gave me hope. 😂
1
1
47