tijme Profile Banner
Tijme Gommers Profile
Tijme Gommers

@tijme

Followers
2K
Following
1K
Statuses
1K

Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: https://t.co/536oE2DGUw

The Netherlands
Joined August 2011
Don't wanna be here? Send us removal request.
@tijme
Tijme Gommers
2 years
Cobalt Strike BOF that utilises AMD's Ryzen Master kernel driver to read and write physical memory. It currently escalates privileges from administrator to SYSTEM. Future goal is to add features such as disabling EDR, disabling ETW TI or dumping LSASS.
4
157
370
@tijme
Tijme Gommers
4 days
RT @0xBoku: 🔪Open-sourcing 💀StringReaper BOF! I've had great success in engagements carving credentials out of remote process memory with…
0
89
0
@tijme
Tijme Gommers
24 days
RT @silentwarble: Another one. It's raining PIC shellcode templates around here. Added to PIC-Library:
0
11
0
@tijme
Tijme Gommers
25 days
@silentwarble Interesting. I published somewhat the same yesterday: Compiles on MacOS using MinGW and directly outputs a x64 PIC file for Windows. Also exposes LoadLibraryA and GetProcAddress.
1
1
5
@tijme
Tijme Gommers
1 month
RT @5mukx: An unexpected journey into Microsoft Defender's signature World:
Tweet media one
Tweet media two
0
108
0
@tijme
Tijme Gommers
1 month
@_xpn_ @TheXC3LL Yeah, same here! Love it as well.
0
0
0
@tijme
Tijme Gommers
1 month
@mrgretzky @TheXC3LL Which Herman Miller chair do you have?
1
0
2
@tijme
Tijme Gommers
2 months
RT @netbiosX: EDRPrison - Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
0
68
0
@tijme
Tijme Gommers
2 months
RT @nullcon: 🛠️ Malware that sleeps, works, and never stays! 😴 Learn how Kong Loader uses sleep masks to make malware invisible in memory…
0
1
0
@tijme
Tijme Gommers
2 months
@x_Noemiep @Tijnoz Ik moet zeggen, ik was wel heel blij toen de koerier binnen liep! 🤣🍕
1
0
2
@tijme
Tijme Gommers
2 months
@mrgretzky This looks great @mrgretzky! 😀
1
0
1
@tijme
Tijme Gommers
2 months
I will be presenting at @nullcon 2025! 🇮🇳 The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!
Tweet media one
0
0
15
@tijme
Tijme Gommers
3 months
RT @AmberWolfSec: Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2…
0
24
0
@tijme
Tijme Gommers
3 months
@selmarsmit @x_Noemiep @Tijnoz Mijn dag ziet er als volgt uit. 10:00 tot 20:00 Wachten tot Magnet Axiom klaar is met het parsen van een disk image 😂. En dan rond 20:00 te horen krijgen van @Tijnoz dat ik aan het begin ergens een optie fout heb gezet 🙈.
3
0
4
@tijme
Tijme Gommers
3 months
@x_Noemiep @thelion_rasco @selmarsmit Ik had dit oprecht niet in de gaten. Sorry @selmarsmit 🤣.
2
0
2
@tijme
Tijme Gommers
3 months
@selmarsmit @Dymff Als het managed laptops zijn worden die instellingen ook vaak weer overschreven, dus zo’n mouse jiggler is dan inderdaad de minst risicovolle manier.
1
0
1
@tijme
Tijme Gommers
3 months
@mrgretzky @_xpn_ @Hexacorn ➕1, on this one! I miss Twitter how it used to be.
0
0
1
@tijme
Tijme Gommers
4 months
@_xpn_ Your talk was awesome!
0
0
0
@tijme
Tijme Gommers
4 months
@Stef_van_Dop Me! 🤣 No no, just kidding. I think you had great Dutch speakers on stage this year already! I think most of the people presenting at RedTreat are not Dutch.
1
0
2
@tijme
Tijme Gommers
5 months
@_JohnHammond @github @GitHubSecurity Received such an issue/email myself as well. I thought it was smart that they deleted the issue and only the email remained. But apparently that was not on purpose?
0
0
0