tijme Profile Banner
Tijme Gommers Profile
Tijme Gommers

@tijme

Followers
2K
Following
1K
Media
88
Statuses
1K

Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: https://t.co/536oE2DGUw

The Netherlands
Joined August 2011
Don't wanna be here? Send us removal request.
@tijme
Tijme Gommers
3 years
Cobalt Strike BOF that utilises AMD's Ryzen Master kernel driver to read and write physical memory. It currently escalates privileges from administrator to SYSTEM. Future goal is to add features such as disabling EDR, disabling ETW TI or dumping LSASS.
Tweet card summary image
github.com
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17). - tijme/amd-ryzen-master-driver-v17-exploit
4
156
365
@tijme
Tijme Gommers
3 months
Built something super satisfying — truly and tiny position independent code, cross-compiled from any OS to any OS. 😎
Tweet media one
4
1
44
@tijme
Tijme Gommers
4 months
Calculating CVSS for this vuln with @chvancooten.
Tweet media one
3
0
13
@tijme
Tijme Gommers
5 months
I’ve started the development of a #Nimplant C2 beacon in truly position independent pure C-code. It’s a PoC, highly opsec unsafe, but hopefully it inspires some people and sparks creativity! 👨‍💻.
Tweet card summary image
github.com
A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading. - tijme/nimplant-beacon-position-independent-c-code
1
16
69
@tijme
Tijme Gommers
5 months
Getting ready for #NullconGoa2025!
Tweet media one
1
0
6
@tijme
Tijme Gommers
5 months
RT @0xBoku: 🔪Open-sourcing 💀StringReaper BOF!.I've had great success in engagements carving credentials out of remote process memory with….
Tweet card summary image
github.com
Reaping treasures from strings in remote processes memory - GitHub - boku7/StringReaper: Reaping treasures from strings in remote processes memory
0
93
0
@tijme
Tijme Gommers
6 months
RT @silentwarble: Another one. It's raining PIC shellcode templates around here. Added to PIC-Library:
Tweet card summary image
github.com
Boilerplate to develop raw and truly Position Independent Code (PIC). - tijme/relocatable
0
11
0
@tijme
Tijme Gommers
7 months
RT @5mukx: An unexpected journey into Microsoft Defender's signature World:.
Tweet media one
Tweet media two
0
106
0
@tijme
Tijme Gommers
7 months
RT @netbiosX: EDRPrison - Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
Tweet card summary image
github.com
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry - senzee1984/EDRPrison
0
68
0
@tijme
Tijme Gommers
7 months
RT @nullcon: 🛠️ Malware that sleeps, works, and never stays! 😴. Learn how Kong Loader uses sleep masks to make malware invisible in memory….
0
1
0
@tijme
Tijme Gommers
7 months
I will be presenting at @nullcon 2025! 🇮🇳. The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!
Tweet media one
0
0
14
@tijme
Tijme Gommers
8 months
RT @AmberWolfSec: Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2….
0
23
0
@tijme
Tijme Gommers
9 months
Presenting some research at RedTreat today 👀. Pretty excited for all other presentations as well. They’ve been amazing so far!
Tweet media one
1
1
19
@tijme
Tijme Gommers
11 months
I've also published the source code & compiled binaries:
0
3
11
@tijme
Tijme Gommers
11 months
My @OrangeCon_nl talk is live!. Elevate your knowledge: From COM Object Fundamentals To UAC Bypasses. A 25-minute crash course covering Tokens, Privileges, UAC, COM, and ultimately bypassing UAC!.
Tweet media one
6
123
437
@tijme
Tijme Gommers
11 months
Currently at @OrangeCon_nl meeting old and new friends. A lot of interesting talks and greatly organized. 🚀.
0
1
14
@tijme
Tijme Gommers
1 year
Very happy to be speaking at @OrangeCon_nl 🤩. I feel like the organization puts so much passion into it; this must be and will become a great conference in The Netherlands!
Tweet media one
2
5
27
@tijme
Tijme Gommers
1 year
RT @GabrielLandau: Introducing a new Windows vulnerability class: False File Immutability. 👉 Bonus: a kernel exploit to load unsigned driv….
Tweet card summary image
elastic.co
This article introduces a previously-unnamed class of Windows vulnerability that demonstrates the dangers of assumption and describes some unintended security consequences.
0
216
0
@tijme
Tijme Gommers
1 year
From Theory to Practice: Kernel Heap Spray Exploitation for Privilege Escalation💥. Part two of the blog series by my colleague Alex:
Tweet media one
2
57
176
@tijme
Tijme Gommers
1 year
Our @BSidesLondon Ivanti & Pulse Secure VPN kernel exploitation talk is live! The presentation is about shared research of my colleague Alex and me. CVE-2023-38043, CVE-2023-35080 & CVE-2023-38543.
2
2
9