https://cocomelonc.github.io/malware/2025/08/15/malware-tricks-50.html next one from my blog. tLab #technologies company recently discovered one of the first in #Kazakhstan in interesting #phishing campaign aimed at one of the clients.
twitter: https://x.com/cocomelonckz/status/1957321542322286805
Thanks tLab for the API! β₯οΈ
#hacking #research #malware #programming #purpleteam #maldev #cybercrime #apt #microsoft
twitter: https://x.com/cocomelonckz/status/1957321542322286805
Thanks tLab for the API! β₯οΈ
#hacking #research #malware #programming #purpleteam #maldev #cybercrime #apt #microsoft
cocomelonc
Malware development trick 50: phishing attack using a fake login page with Telegram exfiltration. Simple Javascript example.
ο·½
1β€11π1
https://cocomelonc.github.io/macos/2025/08/19/malware-mac-9.html next post in my blog. I'll explore #arm #m1 in upcoming posts.
twitter: https://x.com/cocomelonckz/status/1958033531797406090
#cybersecurity #malware #apple #macosx #osx #shellcode #hacking #programming #research #injection #book #cybercrime #macbook #redteam #purpleteam #blueteam
twitter: https://x.com/cocomelonckz/status/1958033531797406090
#cybersecurity #malware #apple #macosx #osx #shellcode #hacking #programming #research #injection #book #cybercrime #macbook #redteam #purpleteam #blueteam
cocomelonc
MacOS hacking part 9: shellcode injection via task_for_pid - thread hijacking. Simple C (Intel) example
ο·½
β€9π3π₯2
This media is not supported in your browser
VIEW IN TELEGRAM
I miss this country, my second home - Bahrain π§ππ§ππ§π
β€11π3π₯2
https://cocomelonc.github.io/macos/2025/08/24/malware-mac-10.html next one from my blog. instead of hijacking an existing thread, weβll create an entirely new thread in the target process.
twitter: https://x.com/cocomelonckz/status/1959855281929691412
#malware #cybersecurity #hacking #purpleteam #maldev #cybercrime #asm #apple #macosx #threatintel #research #programming #book
twitter: https://x.com/cocomelonckz/status/1959855281929691412
#malware #cybersecurity #hacking #purpleteam #maldev #cybercrime #asm #apple #macosx #threatintel #research #programming #book
β€8π1π₯1
https://github.com/cocomelonc/mdmz_book/
Alhamdulillah, I am starting to translate my #book into Kazakh to develop the Kazakh-speaking #cybersec #community in Kazakhstan. I also want to support everyone who wants to make content in Kazakh about #technology
#hacking #programming #purpleteam #malware
Alhamdulillah, I am starting to translate my #book into Kazakh to develop the Kazakh-speaking #cybersec #community in Kazakhstan. I also want to support everyone who wants to make content in Kazakh about #technology
#hacking #programming #purpleteam #malware
GitHub
GitHub - cocomelonc/mdmz_book: The result of research and investigation of malware development tricks, techniques, evasion, cryptographyβ¦
The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware - cocomelonc/mdmz_book
π₯13β€7π1
https://cocomelonc.github.io/malware/2025/08/28/malware-tricks-51.html djuma mubarak! next one from my blog. enjoy PoC stealer via another legit API. Thanks to ANY.RUN for API! β₯οΈ
twitter: https://x.com/cocomelonckz/status/1961283780779377114
#cybersecurity #malware #research #programming #hacking #purpleteam #redteam #blueteam #book #ethicalhacking #maldev #bitbucket #altassian #cybercrime
twitter: https://x.com/cocomelonckz/status/1961283780779377114
#cybersecurity #malware #research #programming #hacking #purpleteam #redteam #blueteam #book #ethicalhacking #maldev #bitbucket #altassian #cybercrime
β€11π1π₯1
https://cocomelonc.github.io/macos/2025/09/01/malware-mac-11.html next one from my blog.
straightforward bind shell for macOS on Apple Silicon. Clean, minimal, no libc. Pure syscall style.
twitter: https://x.com/cocomelonckz/status/1963094417138401712
#hacking #malware #purpleteam #redteam #blueteam #apple #macos #research #maldev #threatintel #cybersecurity #cybercrime #apt #book
straightforward bind shell for macOS on Apple Silicon. Clean, minimal, no libc. Pure syscall style.
twitter: https://x.com/cocomelonckz/status/1963094417138401712
#hacking #malware #purpleteam #redteam #blueteam #apple #macos #research #maldev #threatintel #cybersecurity #cybercrime #apt #book
1β€8
https://cocomelonc.github.io/persistence/2025/09/14/malware-pers-28.html next one from my blog. works even with Windows Defender real-time protection enabled. enjoy!
twitter: https://x.com/cocomelonckz/status/1968223494044520587
#cybersecurity #malware #hacking #programming #research #persistence #maldev #blackhat #cybercrime #apt #book #redteam #blueteam #purpleteam #threatintel
twitter: https://x.com/cocomelonckz/status/1968223494044520587
#cybersecurity #malware #hacking #programming #research #persistence #maldev #blackhat #cybercrime #apt #book #redteam #blueteam #purpleteam #threatintel
1β€8π1π₯1
https://cocomelonc.github.io/persistence/2025/09/20/malware-pers-29.html next one from my blog #cybersecurity #hacking #maldev #malware #persistence #research #redteam #blueteam #purpleteam #cybercrime #programming #threatintel
β€7π₯4π1π1
Alhamdulillah! In September, I presented my talk at two conferences:
Security BSides Ahmedabad
MCTTP Munich Cyber Tactics, Techniques and Procedures
I thank the organizers for their hospitality and assistance!
Nikhil Shrivastava Alex Moshkov
Vera Nikolic Florian Hansemann
I was happy to see many experts, colleagues, and friends in person!
I hope and look forward to being part of these conferences next year β€οΈ
#cybersecurity #hacking #research #osint #programming #redteam #blueteam #cybercrime #apt #threatintel #threatintelligence #threathunting #malware #maldev #purpleteam
Security BSides Ahmedabad
MCTTP Munich Cyber Tactics, Techniques and Procedures
I thank the organizers for their hospitality and assistance!
Nikhil Shrivastava Alex Moshkov
Vera Nikolic Florian Hansemann
I was happy to see many experts, colleagues, and friends in person!
I hope and look forward to being part of these conferences next year β€οΈ
#cybersecurity #hacking #research #osint #programming #redteam #blueteam #cybercrime #apt #threatintel #threatintelligence #threathunting #malware #maldev #purpleteam
β€17π₯7β‘3
https://cocomelonc.github.io/linux/2025/10/09/linux-hacking-7.html next one. This is a compact, portable sysinfo stealer "dirty PoC" for Linux
source code
#hacking #research #programming #redteam #blueteam #threatintel #purpleteam #malware #malwaredev #apt #cybersecurity
source code
#hacking #research #programming #redteam #blueteam #threatintel #purpleteam #malware #malwaredev #apt #cybersecurity
β€8π₯3π1
https://cocomelonc.github.io/macos/2025/10/15/malware-mac-12.html next one from my blog. useful for malware R&D and Apple/Mac researchers
twitter: https://x.com/cocomelonckz/status/1978680709557407815
#hacking #programming #malware #cybercrime #malwaredev #threatintel #research #redteam #blueteam #assembly #m1 #apple #macos #book #malwareanalysis #purpleteam
twitter: https://x.com/cocomelonckz/status/1978680709557407815
#hacking #programming #malware #cybercrime #malwaredev #threatintel #research #redteam #blueteam #assembly #m1 #apple #macos #book #malwareanalysis #purpleteam
β€11π2
https://cocomelonc.github.io/malware/2025/10/19/malware-tricks-52.html next one from my blog, another simple example in response to a question from one of my readers.
Thanks to ANY.RUN for the API β₯οΈ
twitter
#hacking #research #malware #malwaredev #stealer #cybercrime #redteam #blueteam #purpleteam #book #threatintel #slack
Thanks to ANY.RUN for the API β₯οΈ
#hacking #research #malware #malwaredev #stealer #cybercrime #redteam #blueteam #purpleteam #book #threatintel #slack
β€9π3