Advertisement · 728 × 90

Posts by Tijme Gommers

Post image

Built something super satisfying — truly and tiny position independent code, cross-compiled from any OS to any OS. 😎

1 year ago 4 0 0 0

They shouldn’t even connect them in the first place… 🤌

1 year ago 1 0 1 0

“The primary goal of this campaign is to facilitate unauthorized ATM withdrawals from the victims’ bank accounts. This was achieved by relaying the near field communication (NFC) data from the victims’ physical payment cards, via their compromised Android smartphones.” 🔥

1 year ago 1 0 0 0
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

1 year ago 65 41 2 0

This is going to be amazing!

1 year ago 0 0 0 0
Acceptance email from the CFP board.

Acceptance email from the CFP board.

I will be presenting at NULLCON Goa 2025! 🇮🇳

The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!

1 year ago 2 0 0 0

Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.🧵

1 year ago 6 5 1 1
Advertisement

I used to mute a lot of words and hashtags that I wasn’t interested in on X. I see that this is also possible on Bluesky, so might be worth a try!

1 year ago 0 0 1 0
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers

Our @BSidesLondon Ivanti & Pulse Secure VPN kernel exploitation talk is live! The presentation is about shared research of my colleague Alex and me.

CVE-2023-38043, CVE-2023-35080 & CVE-2023-38543
www.youtube.com/watch?v=hmYK...

2 years ago 0 1 0 0
Post image

I dived into exploiting leaked code signing certificates to sign malware ✍. A technique that has been actively abused in the wild by threat actors for a long time.

Blog post: tij.me/blog/finding...

2 years ago 3 0 0 0

Hello world!

2 years ago 3 0 0 0