Whoami

Hello, World! I’m Mohe, a cybersecurity student at Lincoln University, Malaysia. I’m passionate about all things cybersecurity—from understanding network protocols to building tools that explore real-time security challenges. I’m comfortable working on both Linux and Windows systems and enjoy digging deep into how systems and networks operate. I also actively participate in CTFs to sharpen my practical security skills.

I love programming and applying my knowledge to hands-on projects. Outside of my studies, I enjoy web development with Next.js, React, and TypeScript, creating applications that are both functional and user-friendly.

Some of my notable projects include a Password Manager, designed for secure data handling, and a RAG App, exploring retrieval-augmented generation concepts.

I’m always curious, experimenting, and seeking ways to turn ideas into real, working solutions.

Skills

  • Cybersecurity
  • Windows Internals
  • Linux
  • Active directory
  • Knowledge Networking
  • reverse Engineering
  • C++
  • python
  • Go
  • Javascript
  • Typescript
  • Next.js
  • React.js
  • FastAPI
  • Node.js
  • SQL
  • NoSQL
  • CSS
Build full-stack web apps.
Hi, I'm MØHΞ
Projects,0
Blogs,0
a cybersecurity student, I specialize in building secure digital experiences. I apply my passion for security to my work as a web developer, creating robust applications and sharing my findings through code and content.

CyberSecurity & Web Development hobbyist

Malyasia, Kuala Lumpur

01127718942

mohieddinabbas141@gmail.com

LinkedIn

LinkedIn

MOHIEDDIN ABBAS

GitHub

GitHub

mohe22

X

X

AbbasMohieddin

Check out my latest work

see all projects

cybersecurity and full-stack developer who loves building secure web apps, solving CTF challenges, and sharing knowledge through blogs and projects.

Project image 1

Process remote injection

9 days ago

Remote Process Injection via Thread Hijacking with Dynamic API Resolution and Hashing-Based Stealth Execution

Malware
Windows
Programming
CodeBlog
Project image 1

Go HTTP server

30 days ago

A fully custom HTTP server implemented in Go, supporting request parsing, partial parsing, static file serving, and dynamic endpoint handling.

Go
Protocols
Network
CodeBlog
Project image 1

PID spoofing

Aug 22, 2025

PID spoofing is a technique where an attacker manipulates or fakes a process ID (PID) to hiding malicious activity on a system.

Malware
Programming
Windows
CodeBlog
Project image 1

DLL injector

Aug 22, 2025

DLL injection technique using undocumented Windows Native API functions to load a custom DLL into a running process

Malware
Windows
Programming
CodeBlog
Project image 1

indirect syscall

Aug 22, 2025

Stealthy Windows x64 shellcode loader using indirect syscalls to bypass EDR/AV, download payloads via HTTPS, and execute them without invoking monitored WinAPI calls.

Programming
Malware
Windows
CodeBlog
Project image

Unhooking NTDLL

Aug 22, 2025

A simple C++ script that unhooks the in-memory ntdll.dll by restoring its .text section with a clean version from disk to remove user-mode hooks placed by EDRs or antivirus software.

Programming
Windows
Malware
CodeBlog

Check out my latest Blogs

View All Blogs

I write about cybersecurity, programming, and problem-solving from building secure full-stack applications to breaking down CTF challenges and practical guides for developers. My goal is to share insights that help others learn, build, and stay ahead in tech.

Strutted Walkthrough

Strutted Walkthrough

Exploited CVE-2024-53677 for access, found tomcat-users.xml with james password, then used sudo tcpdump to create SUID /tmp/bash and gained root.

CTF
privilege esclation
Linux
Blog
Remote injection

Remote injection

Remote Process Injection via Thread Hijacking with Dynamic API Resolution and Hashing-Based Stealth Execution

Windows
Malware
Programming
CodeBlog
injector

injector

simple tool to hide Payloads in Image Files and pdf.

Malware
Programming
Cybersecurity
CodeBlog
Go HTTP server

Go HTTP server

A fully custom HTTP server implemented in Go, supporting request parsing, partial parsing, static file serving, and dynamic endpoint handling.

Programming
Protocols
CodeBlog
PID spoofing

PID spoofing

PID spoofing is a technique where an attacker manipulates or fakes a process ID (PID) to hiding malicious activity on a system.

Malware
Windows
Programming
CodeBlog
DLL injection

DLL injection

DLL injection technique using undocumented Windows Native API functions to load a custom DLL into a running process.

Malware
Windows
Programming
CodeBlog