https://cocomelonc.github.io/macos/2025/10/15/malware-mac-12.html next one from my blog. useful for malware R&D and Apple/Mac researchers
twitter: https://x.com/cocomelonckz/status/1978680709557407815
#hacking #programming #malware #cybercrime #malwaredev #threatintel #research #redteam #blueteam #assembly #m1 #apple #macos #book #malwareanalysis #purpleteam
twitter: https://x.com/cocomelonckz/status/1978680709557407815
#hacking #programming #malware #cybercrime #malwaredev #threatintel #research #redteam #blueteam #assembly #m1 #apple #macos #book #malwareanalysis #purpleteam
β€11π2
https://cocomelonc.github.io/malware/2025/10/19/malware-tricks-52.html next one from my blog, another simple example in response to a question from one of my readers.
Thanks to ANY.RUN for the API β₯οΈ
twitter
#hacking #research #malware #malwaredev #stealer #cybercrime #redteam #blueteam #purpleteam #book #threatintel #slack
Thanks to ANY.RUN for the API β₯οΈ
#hacking #research #malware #malwaredev #stealer #cybercrime #redteam #blueteam #purpleteam #book #threatintel #slack
β€9π3
https://cocomelonc.github.io/malware/2025/10/22/malware-tricks-53.html next one, from my hack.lu talk. ideal for #redteam and #pentest #gamedev companies
twitter
#hacking #malware #stealer #xbox #microsoft #research #poc #apt #cybercrime #blueteam #purpleteam #programming #malwaredev #threatintel #threathunting #threatresearch
#hacking #malware #stealer #xbox #microsoft #research #poc #apt #cybercrime #blueteam #purpleteam #programming #malwaredev #threatintel #threathunting #threatresearch
β€7π1
https://www.youtube.com/watch?v=l2G2TZvzj0E this year I had the honor of speaking again at a hack.lu conference in Luxembourg π±πΊπ±πΊπ±πΊ!
Thanks for invitation Alexandre Dulaunoy CIRCL (Computer Incident Response Center Luxembourg)
Happy to meet friends and heroes in person again Vladimir Kropotov Didier Barzin Duncan Ogilvie Tony Jabbour Dimitrios Valsamaras CΓ©dric Bonhomme Marina Bochenkova Pedro Umbelino Stijn Tomme and others
#hacking #malware #research #apt #threatintel #cybersecurity #cybercrime #redteam #blueteam #purpleteam
Thanks for invitation Alexandre Dulaunoy CIRCL (Computer Incident Response Center Luxembourg)
Happy to meet friends and heroes in person again Vladimir Kropotov Didier Barzin Duncan Ogilvie Tony Jabbour Dimitrios Valsamaras CΓ©dric Bonhomme Marina Bochenkova Pedro Umbelino Stijn Tomme and others
#hacking #malware #research #apt #threatintel #cybersecurity #cybercrime #redteam #blueteam #purpleteam
YouTube
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
β€8π₯8
This media is not supported in your browser
VIEW IN TELEGRAM
π₯11β€9π2
Defcon Bahrain 2025
https://github.com/cocomelonc/peekaboo
twitter: https://x.com/cocomelonckz/status/1986718801636016243
#malware #cybersecurity #hacking #redteam #blueteam #apt #purpleteam #research #opensource #defcon #programming #maldev
https://github.com/cocomelonc/peekaboo
twitter: https://x.com/cocomelonckz/status/1986718801636016243
#malware #cybersecurity #hacking #redteam #blueteam #apt #purpleteam #research #opensource #defcon #programming #maldev
β€12π₯6π4π3
Next talk at #PHTALKS Sao Paolo 2025 π§π·
#conferences #research #malware #threatintel #redteam #purpleteam #book #windows
#conferences #research #malware #threatintel #redteam #purpleteam #book #windows
π₯14β€4
https://cocomelonc.github.io/linux/2025/11/14/linux-hacking-8.html next one from my blog, based on an exercise for my students and readers
#hacking #redteam #blueteam #malware #maldev #research #linux #assembly #programming #cybersecurity #infosec
#hacking #redteam #blueteam #malware #maldev #research #linux #assembly #programming #cybersecurity #infosec
β€10π3π₯3
https://cocomelonc.github.io/iot/2025/12/02/hvck-hack-epson.html next one from my blog. This article was written by me for a hackerβs HVCK magazine: Issue 1 in 2023.
Ryan Williams thank you for your magazine and for your contribution to the community!
https://x.com/cocomelonckz/status/1996068117194383547?s=20
#hacking #iot #research #magazine #programming #python #exploit #epson #redteam #cybersecurity #hvck
Ryan Williams thank you for your magazine and for your contribution to the community!
https://x.com/cocomelonckz/status/1996068117194383547?s=20
#hacking #iot #research #magazine #programming #python #exploit #epson #redteam #cybersecurity #hvck
β€11π₯6π1
On the way to Sao Paulo, there is a Starlink on board Qatar Airways and you can work online π
#conference #research #starlink #hacking
#conference #research #starlink #hacking
β€17π₯9π4π1π€£1
https://cocomelonc.github.io/linux/2025/12/10/linux-hacking-9.html next one from my blog. Something as simple as a password check has multiple failure points. #hacking #apt #cybersecurity #assembly #malware #redteam #blueteam #purpleteam #research #linux #shellcode #programming
β€6π₯5π2
I'm starting work on a
new edition of my book with Packt.β€οΈ
First edition
#book #research #software #development
#blackhat #cybersecurity #hacking #malware #maldev
new edition of my book with Packt.β€οΈ
First edition
#book #research #software #development
#blackhat #cybersecurity #hacking #malware #maldev
β€30π5π₯°5π2
https://cocomelonc.github.io/malware/2025/12/25/malware-tricks-55.html next one from my blog. Another classic technique in malware development to stay away from the more obvious Win32 APIs.
As far as I know this function used by Process Hacker, for performance in process enumeration.
The MHook library also got a significant performance boost when switching from
Another caveat, by intercepting calls to the
Thanks to ANY.RUN for the API β₯οΈ
https://x.com/cocomelonckz/status/2005515490731675758?s=20
#cybersecurity #malware #research #hacking #redteam #blueteam #programming #book
As far as I know this function used by Process Hacker, for performance in process enumeration.
The MHook library also got a significant performance boost when switching from
CreateToolhelp32Snapshot to NtQuerySystemInformationAnother caveat, by intercepting calls to the
NtQuerySystemInformation function, we also can hide a some specified process, from common process monitoring tools such as Task Manager and Process Hacker. This is also an interesting trick in malware development, but I will write about this in a separate post.Thanks to ANY.RUN for the API β₯οΈ
https://x.com/cocomelonckz/status/2005515490731675758?s=20
#cybersecurity #malware #research #hacking #redteam #blueteam #programming #book
β€11π₯4π1π1