Tijme Gommers's Avatar

Tijme Gommers

@tijme.bsky.social

Offensive Security at ABN AMRO Bank ๐Ÿฆ. Red Teaming, Malware Development & Reverse Engineering ๐Ÿ™. Cyber Cyber Cyber โšก๏ธ.

178 Followers  |  81 Following  |  9 Posts  |  Joined: 21.11.2023
Posts Following

Posts by Tijme Gommers (@tijme.bsky.social)

Post image

Built something super satisfying โ€” truly and tiny position independent code, cross-compiled from any OS to any OS. ๐Ÿ˜Ž

09.04.2025 19:34 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

They shouldnโ€™t even connect them in the first placeโ€ฆ ๐ŸคŒ

08.02.2025 20:57 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

โ€œThe primary goal of this campaign is to facilitate unauthorized ATM withdrawals from the victimsโ€™ bank accounts. This was achieved by relaying the near field communication (NFC) data from the victimsโ€™ physical payment cards, via their compromised Android smartphones.โ€ ๐Ÿ”ฅ

08.02.2025 20:55 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

30.01.2025 18:37 โ€” ๐Ÿ‘ 65    ๐Ÿ” 41    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

This is going to be amazing!

26.12.2024 18:18 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Acceptance email from the CFP board.

Acceptance email from the CFP board.

I will be presenting at NULLCON Goa 2025! ๐Ÿ‡ฎ๐Ÿ‡ณ

The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!

10.12.2024 20:04 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.๐Ÿงต

26.11.2024 11:17 โ€” ๐Ÿ‘ 6    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1

I used to mute a lot of words and hashtags that I wasnโ€™t interested in on X. I see that this is also possible on Bluesky, so might be worth a try!

14.11.2024 20:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers

Our @BSidesLondon Ivanti & Pulse Secure VPN kernel exploitation talk is live! The presentation is about shared research of my colleague Alex and me.

CVE-2023-38043, CVE-2023-35080 & CVE-2023-38543
www.youtube.com/watch?v=hmYK...

11.02.2024 12:53 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

I dived into exploiting leaked code signing certificates to sign malware โœ. A technique that has been actively abused in the wild by threat actors for a long time.

Blog post: tij.me/blog/finding...

22.11.2023 07:12 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Hello world!

21.11.2023 22:00 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0