Whoami

Hello, World! I’m Mohe, a cybersecurity student at Lincoln University, Malaysia. I’m passionate about all things cybersecurity—from understanding network protocols to building tools that explore real-time security challenges. I’m comfortable working on both Linux and Windows systems and enjoy digging deep into how systems and networks operate. I also actively participate in CTFs to sharpen my practical security skills.

I love programming and applying my knowledge to hands-on projects. Outside of my studies, I enjoy web development with Next.js, React, and TypeScript, creating applications that are both functional and user-friendly.

Some of my notable projects include this website and Password Manager, designed for secure data handling, and a RAG App, exploring retrieval-augmented generation concepts.

I’m always curious, experimenting, and seeking ways to turn ideas into real, working solutions.

Skills

  • Cybersecurity
  • Windows Internals
  • Linux
  • Active directory
  • Knowledge Networking
  • reverse Engineering
  • C++
  • python
  • Go
  • Javascript
  • Typescript
  • Next.js
  • React.js
  • FastAPI
  • Node.js
  • SQL
  • NoSQL
  • CSS
Build full-stack web apps.
Hi, I'm MØHΞ
Projects,0
Blogs,0
a cybersecurity student, I specialize in building secure digital experiences. I apply my passion for security to my work as a web developer, creating robust applications and sharing my findings through code and content.

CyberSecurity & Web Development hobbyist

Malyasia, Kuala Lumpur

01127718942

mohieddinabbas141@gmail.com

LinkedIn

LinkedIn

MOHIEDDIN ABBAS

GitHub

GitHub

mohe22

X

X

AbbasMohieddin

Check out my latest work

see all projects

cybersecurity and full-stack developer who loves building secure web apps, solving CTF challenges, and sharing knowledge through blogs and projects.

Project image 1

Ping

Nov 7, 2025

A C++ raw ICMP ping utility that sends ICMP Echo Requests to a host, measures round-trip time, and prints results. Uses threads to receive replies, calculates checksums, handles timeouts, and shows statistics including min/avg/max RTT and packet loss. Supports -c for count.

Programming
Windows
CodeBlog
Project image 1

DHCP spoofer

Oct 9, 2025

A network attack tool for performing man-in-the-middle attacks using DHCP spoofing.

Network
Cybersecurity
Programming
CodeBlog
Project image 1

Process remote injection

Sep 22, 2025

Remote Process Injection via Thread Hijacking with Dynamic API Resolution and Hashing-Based Stealth Execution

Malware
Windows
Programming
CodeBlog
Project image 1

Go HTTP server

Sep 1, 2025

A fully custom HTTP server implemented in Go, supporting request parsing, partial parsing, static file serving, and dynamic endpoint handling.

Go
Protocols
Network
CodeBlog
Project image 1

PID spoofing

Aug 22, 2025

PID spoofing is a technique where an attacker manipulates or fakes a process ID (PID) to hiding malicious activity on a system.

Malware
Programming
Windows
CodeBlog
Project image 1

DLL injector

Aug 22, 2025

DLL injection technique using undocumented Windows Native API functions to load a custom DLL into a running process

Malware
Windows
Programming
CodeBlog

Check out my latest Blogs

View All Blogs

I write about cybersecurity, programming, and problem-solving from building secure full-stack applications to breaking down CTF challenges and practical guides for developers. My goal is to share insights that help others learn, build, and stay ahead in tech.

How Ping work?

How Ping work?

A C++ raw ICMP ping utility that sends ICMP Echo Requests to a host, measures round-trip time, and prints results. Uses threads to receive replies, calculates checksums, handles timeouts, and shows statistics including min/avg/max RTT and packet loss. Supports -c for count.

Network
Programming
CodeBlog
TombWatcher

TombWatcher

TombWatcher, a complex Active Directory machine. This walkthrough covers Kerberoasting, abusing Group Managed Service Accounts (gMSA), and escalating privileges through a creative ADCS ESC15 certificate vulnerability. A multi-stage attack from user to full domain compromise.

CTF
Active Directory
Privilege Esclation
Blog
Certificate.htb

Certificate.htb

From a null-byte upload to SYSTEM. Pivoted through users by abusing ADCS, then leveraged SeManageVolume and SeImpersonate privileges to dump the final admin hash.

CTF
Windows
Privilege Esclation
Blog
DHCP spoofer

DHCP spoofer

A network attack tool for performing man-in-the-middle attacks using DHCP spoofing.

Network
Cybersecurity
Programming
CodeBlog
Strutted Walkthrough

Strutted Walkthrough

Exploited CVE-2024-53677 for access, found tomcat-users.xml with james password, then used sudo tcpdump to create SUID /tmp/bash and gained root.

CTF
privilege esclation
Linux
Blog
Remote injection

Remote injection

Remote Process Injection via Thread Hijacking with Dynamic API Resolution and Hashing-Based Stealth Execution

Windows
Malware
Programming
CodeBlog