Mouad معاذ Abouhali Profile
Mouad معاذ Abouhali

@_m00dy_

Followers
612
Following
8K
Media
16
Statuses
1K

Security Reseacher/ Hacking is my motto , Marathon/Trailrunner/Climbing On my way to be a Fakir ... (#rev13 on freenode, a_m00dy_ on Instagram )

Joined April 2011
Don't wanna be here? Send us removal request.
@ProjectZeroBugs
Project Zero Bugs
2 days
Windows Exploitation Techniques: Winning Race Conditions with Path Lookups
0
18
60
@ProjectZeroBugs
Project Zero Bugs
2 days
Welcome to the new Project Zero Blog
0
9
58
@MsftSecIntel
Microsoft Threat Intelligence
3 days
Most exploitation activity related to the CVE-2025-55182 vulnerability affecting React Server Components, Next.js, and related frameworks originated from red teams assessments, but observed exploitation attempts by threat actors deliver various payloads.
Tweet card summary image
microsoft.com
CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is a critical pre-authentication remote code execution (RCE) vulnerability affecting React...
2
48
124
@MsftSecIntel
Microsoft Threat Intelligence
9 days
The December 2025 security updates are available:
@msftsecresponse
Microsoft Security Response Center
9 days
Security updates for December 2025 are now available. Details are here: https://t.co/WW89TchdN8 #PatchTuesday #SecurityUpdateGuide
1
20
44
@richinseattle
Richard Johnson
15 days
RCE in React Server Components.. Next.js users impacted, upgrade immediately https://t.co/Jj1zJchxnW
Tweet card summary image
react.dev
The library for web and native user interfaces
0
3
4
@Steph3nSims
Stephen Sims
16 days
Join me this Friday at 11AM with guest Bramwell Brizendine on the next @offby1security stream titled, "Can't Stop the ROP! Weaponizing ROP on Windows to Bypass System DLLs" Please use the following YouTube link: https://t.co/FimhzBS6IL
0
11
54
@CorelliumHQ
Corellium
16 days
We have some exciting news – Corellium is now officially part of Cellebrite! Welcome to a new era for mobile security research and testing. We can’t wait to show you what the future holds as a Cellebrite company! Read the press release to learn more ⬇️
Tweet card summary image
cellebrite.com
The addition of Corellium’s leading virtualization technology to the Cellebrite platform delivers unmatched capabilities that transcend digital forensics, investigations, analytics and intelligence ...
20
20
116
@xvonfers
xvonfers
27 days
Great talk by Samuel Groß(@5aelo). Those who think that the train has left and it is too late to enter the browser vr/xd... This is not true, so good luck to everyone in your endeavors. And once again I want to mention the legend - Seunghyun Lee(@0x10n) https://t.co/vxqmVaHIpU
@POC_Crew
POC_Crew
28 days
#POC2025 Slides are up NOW! Those slides currently in private and will be uploaded later by the speakers 😆 https://t.co/GdR9tI6Mg1
0
19
147
@OpenSecTraining
OpenSecurityTraining2
1 month
📢Call for beta testers!📢 The "Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!" course by Antonio Nappa @jeppojeps / @fuzzsociety_org will begin November 28th. Sign up here: https://t.co/Cf884f9jlY This course explores the
Tweet card summary image
docs.google.com
Enter the email you have used / will use when registering for beta.ost2.fyi. This will be used to enroll you in the beta class if you are selected. If your account does not exist at the time enroll...
1
28
109
@androidmalware2
Mobile Hacker
1 month
How to build Android Bug Bounty lab Guide to configuring emulators, real devices, proxies, Magisk, Burp, Frida by @yeswehack https://t.co/f3Iez8PKI0
3
126
682
@virusbtn
Virus Bulletin
1 month
Unit 42 uncovers the new LANDFALL Android spyware delivered as DNG images that exploit CVE-2025-21042 in Samsung devices. https://t.co/qFWkEUFMxC
1
18
68
@real_FreeRTOS
FreeRTOS
12 years
A demo for the Renesas RX64M is now available for download. This is the first demo that targets an RXv2 cored MCU. http://t.co/gnlbhZWEeT
0
1
2
@mqst_
Muqsit 𝕏
1 month
📱 A Comprehensive Guide on Modern iOS Pentesting Guide: https://t.co/oOZ3u4p6Vg Author: Noah Farmer (@d_vuln)
1
112
524
@androidmalware2
Mobile Hacker
1 month
Frida JDWP Loader This tool dynamically attaches #Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without root access. Perfect for quick dynamic app analysis https://t.co/4mxB8feSLb
6
90
454
@AirbusSecLab
Airbus Security Lab
3 months
0
4
4
@0vercl0k
Axel Souchet
4 months
I've been waiting for this a long time: the latest version of WinDbg is now shipping with the console mode debuggers (cdb, kd, ntsd) as well🥳 If you start WinDbg a bazillion times a day, starting cdb instead will save you a lot of frustration / time.
1
13
86
@Steph3nSims
Stephen Sims
5 months
If there's interest I was thinking about doing a stream for an hour this Friday while I'm teaching a class on introductory Windows exploit development. Next Friday I'm hoping to continue turning the recent patch diff we did on ole32.dll into a crash condition PoC.
16
8
129
@x64dbg
x64dbg
6 months
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
11
262
1K
@Steph3nSims
Stephen Sims
6 months
I guess AI isn't all bad... I asked ChatGPT to explain to me why so many people without any visible talent are famous. Its fair response gave me hope. 😂
1
1
47