tijme Profile Banner
Tijme Gommers Profile
Tijme Gommers

@tijme

Followers
2K
Following
1K
Media
92
Statuses
1K

Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: https://t.co/536oE2DGUw

The Netherlands
Joined August 2011
Don't wanna be here? Send us removal request.
@tijme
Tijme Gommers
3 years
Cobalt Strike BOF that utilises AMD's Ryzen Master kernel driver to read and write physical memory. It currently escalates privileges from administrator to SYSTEM. Future goal is to add features such as disabling EDR, disabling ETW TI or dumping LSASS. https://t.co/vErevstmwd
Tweet card summary image
github.com
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17). - tijme/amd-ryzen-master-driver-v17-exploit
4
155
363
@SpecterOps
SpecterOps
28 days
Back in July, Neeraj Gupta introduced DeepPass2, a smarter secret scanner that finds both API keys/tokens & contextual passwords using BERT + LLM validation. The model & tool code are now live! Model ➡️ https://t.co/dzFnhyHW6J Code ➡️ https://t.co/N2aShS3xYg 🧵: 1/2
2
15
49
@tijme
Tijme Gommers
2 months
🍿My second OrangeCon talk is live! A 25-minute crash course on metamorphic malware. In Memory of In-Memory Detection! https://t.co/mDBE2HRNYS
1
16
37
@tijme
Tijme Gommers
2 months
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. https://t.co/761G96JDF1
12
97
259
@tijme
Tijme Gommers
7 months
Built something super satisfying — truly and tiny position independent code, cross-compiled from any OS to any OS. 😎
4
1
47
@tijme
Tijme Gommers
8 months
Calculating CVSS for this vuln with @chvancooten...
3
0
13
@tijme
Tijme Gommers
9 months
I’ve started the development of a #Nimplant C2 beacon in truly position independent pure C-code. It’s a PoC, highly opsec unsafe, but hopefully it inspires some people and sparks creativity! 👨‍💻 https://t.co/3FOl0WOjNX
Tweet card summary image
github.com
A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading. - tijme/nimplant-beacon-position-independent-c-code
1
16
70
@tijme
Tijme Gommers
9 months
Getting ready for #NullconGoa2025!
1
0
6
@0xBoku
Bobby Cooke
9 months
🔪Open-sourcing 💀StringReaper BOF! I've had great success in engagements carving credentials out of remote process memory with this BOF https://t.co/rgQj7PfGS0
Tweet card summary image
github.com
Reaping treasures from strings in remote processes memory - GitHub - boku7/StringReaper: Reaping treasures from strings in remote processes memory
7
92
300
@silentwarble
silentwarble
10 months
Another one. It's raining PIC shellcode templates around here. Added to PIC-Library:
github.com
Boilerplate to develop raw and truly Position Independent Code (PIC). - tijme/relocatable
1
13
74
@5mukx
Smukx.E
11 months
An unexpected journey into Microsoft Defender's signature World: https://t.co/17xtrUXk1A
1
113
443
@netbiosX
Panos Gkatziroulis 🦄
11 months
EDRPrison - Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
Tweet card summary image
github.com
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry - senzee1984/EDRPrison
2
68
205
@nullcon
NULLCON
11 months
🛠️ Malware that sleeps, works, and never stays! 😴 Learn how Kong Loader uses sleep masks to make malware invisible in memory throughout its execution, offering a new level of stealth and evasion Join @tijme at #NullconGoa2025 👉 https://t.co/pv9DTqfoZI #kongloader #shellcode
0
1
6
@tijme
Tijme Gommers
11 months
I will be presenting at @nullcon 2025! 🇮🇳 The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!
0
0
14
@AmberWolfSec
AmberWolf
1 year
Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.🧵
1
23
48
@tijme
Tijme Gommers
1 year
Presenting some research at RedTreat today 👀. Pretty excited for all other presentations as well. They’ve been amazing so far!
1
1
18
@tijme
Tijme Gommers
1 year
I've also published the source code & compiled binaries:
0
3
10
@tijme
Tijme Gommers
1 year
My @OrangeCon_nl talk is live! Elevate your knowledge: From COM Object Fundamentals To UAC Bypasses. A 25-minute crash course covering Tokens, Privileges, UAC, COM, and ultimately bypassing UAC! https://t.co/H1VZJdBzTZ
6
121
433
@tijme
Tijme Gommers
1 year
Currently at @OrangeCon_nl meeting old and new friends. A lot of interesting talks and greatly organized. 🚀
0
1
14