Tijme Gommers (@tijme) 's Twitter Profile
Tijme Gommers

@tijme

Offensive Security at @ABNAMRO 🐙. Forensics at @HuntedNL. Cyber Cyber Cyber ⚡. Bluesky: bsky.app/profile/tijme.…

ID: 365321951

linkhttps://tij.me/ calendar_today31-08-2011 07:15:52

1,1K Tweet

1,1K Followers

590 Following

Tijme Gommers (@tijme) 's Twitter Profile Photo

Presenting some research at RedTreat today 👀. Pretty excited for all other presentations as well. They’ve been amazing so far!

Presenting some research at RedTreat today 👀. Pretty excited for all other presentations as well. They’ve been amazing so far!
AmberWolf (@amberwolfsec) 's Twitter Profile Photo

Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.🧵

Tijme Gommers (@tijme) 's Twitter Profile Photo

I will be presenting at NULLCON 2025! 🇮🇳 The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!

I will be presenting at <a href="/nullcon/">NULLCON</a> 2025! 🇮🇳

The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!
NULLCON (@nullcon) 's Twitter Profile Photo

🛠️ Malware that sleeps, works, and never stays! 😴 Learn how Kong Loader uses sleep masks to make malware invisible in memory throughout its execution, offering a new level of stealth and evasion Join Tijme Gommers at #NullconGoa2025 👉 nullcon.net/goa-2025/speak… #kongloader #shellcode

🛠️ Malware that sleeps, works, and never stays! 😴

Learn how Kong Loader uses sleep masks to make malware invisible in memory throughout its execution, offering a new level of stealth and evasion

Join <a href="/tijme/">Tijme Gommers</a> at #NullconGoa2025

👉 nullcon.net/goa-2025/speak…

#kongloader #shellcode
Bobby Cooke (@0xboku) 's Twitter Profile Photo

🔪Open-sourcing 💀StringReaper BOF! I've had great success in engagements carving credentials out of remote process memory with this BOF github.com/boku7/StringRe…

Tijme Gommers (@tijme) 's Twitter Profile Photo

I’ve started the development of a #Nimplant C2 beacon in truly position independent pure C-code. It’s a PoC, highly opsec unsafe, but hopefully it inspires some people and sparks creativity! 👨‍💻 github.com/tijme/nimplant…

Tijme Gommers (@tijme) 's Twitter Profile Photo

Built something super satisfying — truly and tiny position independent code, cross-compiled from any OS to any OS. 😎

Built something super satisfying — truly and tiny position independent code, cross-compiled from any OS to any OS. 😎
Tijme Gommers (@tijme) 's Twitter Profile Photo

Exciting times. I'm publishing Dittobytes today after presenting it at OrangeCon ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. github.com/tijme/dittobyt…

Tijme Gommers (@tijme) 's Twitter Profile Photo

🍿My second OrangeCon talk is live! A 25-minute crash course on metamorphic malware. In Memory of In-Memory Detection! youtu.be/9tCT2ItbPD4

SpecterOps (@specterops) 's Twitter Profile Photo

Back in July, Neeraj Gupta introduced DeepPass2, a smarter secret scanner that finds both API keys/tokens & contextual passwords using BERT + LLM validation. The model & tool code are now live! Model ➡️ ghst.ly/3KTLkmm Code ➡️ ghst.ly/3L96jS5 🧵: 1/2

Back in July, Neeraj Gupta introduced DeepPass2, a smarter secret scanner that finds both API keys/tokens &amp; contextual passwords using BERT + LLM validation.

The model &amp; tool code are now live!

Model ➡️ ghst.ly/3KTLkmm
Code ➡️ ghst.ly/3L96jS5

🧵: 1/2