Mohammed Idrees Banyamer

Mohammed Idrees Banyamer

Security Researcher & Exploit Developer

๐Ÿ“ Jordan  ยท  Information Security Consultant @ JODDB

Who am I?

I'm Mohammed Idrees Banyamer, an independent security researcher and exploit developer based in Jordan. I specialize in offensive security โ€” finding and weaponizing vulnerabilities across Windows internals, web applications, mobile platforms, and embedded systems. My work focuses on original CVE discovery, proof-of-concept development, and responsible disclosure.

I currently work as an Information Security Consultant at JODDB while running this blog to document my research, share exploit writeups, and contribute back to the security community.

Published CVEs & Exploits

CVE-2025-24071
Windows File Explorer NTLM Hash Disclosure
Windows 11 File Explorer (.library-ms)
High PoC โ†’
CVE-2025-24076
Windows 11 Elevation of Privilege
Windows 11 22H2/23H2/24H2 + Server 2025
High PoC โ†’
CVE-2025-33073
Windows SMB Client Privilege Escalation + RCE
Windows 11 SMB Client
High PoC โ†’
CVE-2025-30397
Windows Server 2025 JScript.dll Use-After-Free RCE
Windows Server 2025 JScript.dll
Critical PoC โ†’
CVE-2025-68613
n8n Authenticated Expression Injection RCE (CVSS 9.9)
n8n Workflow Automation Platform
Critical PoC โ†’
CVE-2025-47175
Microsoft PowerPoint 2019 Use-After-Free RCE
Microsoft PowerPoint 2019
High PoC โ†’
CVE-2025-2594
WordPress User Registration Plugin Auth Bypass
WordPress User Registration Plugin โ‰ค4.1.2
High PoC โ†’
CVE-2025-37928
Parrot & DJI Drone OS Kernel Panic
Parrot & DJI Drone Linux-based OS
High PoC โ†’
CVE-2026-28372
GNU inetutils telnetd Local Privilege Escalation
GNU inetutils telnetd
High PoC โ†’
CVE-2026-3395
MaxSite CMS Unauthenticated RCE
MaxSite CMS
Critical PoC โ†’

Skills & Focus Areas

Exploit Development CVE Research Windows Internals Privilege Escalation Remote Code Execution Use-After-Free NTLM / SMB Attacks Web Application Security WordPress Security Kernel Exploitation Reverse Engineering PoC Development Responsible Disclosure Risk Management Penetration Testing HackTheBox CTF Challenges

Active On

โฌก
GitHub
mbanyamer ยท 12+ repos
๐Ÿ’€
Exploit-DB
Published exploits & PoCs
๐ŸŸข
HackTheBox
Active machine player
๐Ÿ’ผ
LinkedIn
Professional profile
โš ๏ธ All research published on this blog is conducted for educational purposes and responsible disclosure only. PoC code is shared after vendor patches are available. Do not use any of this for unauthorized access.