
Tijme Gommers
@tijme
Followers
2K
Following
1K
Media
88
Statuses
1K
Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: https://t.co/536oE2DGUw
The Netherlands
Joined August 2011
Cobalt Strike BOF that utilises AMD's Ryzen Master kernel driver to read and write physical memory. It currently escalates privileges from administrator to SYSTEM. Future goal is to add features such as disabling EDR, disabling ETW TI or dumping LSASS.
github.com
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17). - tijme/amd-ryzen-master-driver-v17-exploit
4
156
365
I’ve started the development of a #Nimplant C2 beacon in truly position independent pure C-code. It’s a PoC, highly opsec unsafe, but hopefully it inspires some people and sparks creativity! 👨💻.
github.com
A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading. - tijme/nimplant-beacon-position-independent-c-code
1
16
69
RT @0xBoku: 🔪Open-sourcing 💀StringReaper BOF!.I've had great success in engagements carving credentials out of remote process memory with….
github.com
Reaping treasures from strings in remote processes memory - GitHub - boku7/StringReaper: Reaping treasures from strings in remote processes memory
0
93
0
RT @silentwarble: Another one. It's raining PIC shellcode templates around here. Added to PIC-Library:
github.com
Boilerplate to develop raw and truly Position Independent Code (PIC). - tijme/relocatable
0
11
0
RT @netbiosX: EDRPrison - Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
github.com
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry - senzee1984/EDRPrison
0
68
0
RT @AmberWolfSec: Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2….
0
23
0
My @OrangeCon_nl talk is live!. Elevate your knowledge: From COM Object Fundamentals To UAC Bypasses. A 25-minute crash course covering Tokens, Privileges, UAC, COM, and ultimately bypassing UAC!.
6
123
437
Currently at @OrangeCon_nl meeting old and new friends. A lot of interesting talks and greatly organized. 🚀.
0
1
14
RT @gmhzxy: Defeating HVCI without admin privileges or a kernel driver(csc.sys).
github.com
Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling without admin permissions or kernel drivers. - zer0condition/ZeroHVCI
0
57
0
Very happy to be speaking at @OrangeCon_nl 🤩. I feel like the organization puts so much passion into it; this must be and will become a great conference in The Netherlands!
2
5
27
RT @GabrielLandau: Introducing a new Windows vulnerability class: False File Immutability. 👉 Bonus: a kernel exploit to load unsigned driv….
elastic.co
This article introduces a previously-unnamed class of Windows vulnerability that demonstrates the dangers of assumption and describes some unintended security consequences.
0
216
0
Our @BSidesLondon Ivanti & Pulse Secure VPN kernel exploitation talk is live! The presentation is about shared research of my colleague Alex and me. CVE-2023-38043, CVE-2023-35080 & CVE-2023-38543.
2
2
9