Defcon Bahrain 2025
https://github.com/cocomelonc/peekaboo
twitter: https://x.com/cocomelonckz/status/1986718801636016243
#malware #cybersecurity #hacking #redteam #blueteam #apt #purpleteam #research #opensource #defcon #programming #maldev
https://github.com/cocomelonc/peekaboo
twitter: https://x.com/cocomelonckz/status/1986718801636016243
#malware #cybersecurity #hacking #redteam #blueteam #apt #purpleteam #research #opensource #defcon #programming #maldev
β€12π₯6π4π3
Next talk at #PHTALKS Sao Paolo 2025 π§π·
#conferences #research #malware #threatintel #redteam #purpleteam #book #windows
#conferences #research #malware #threatintel #redteam #purpleteam #book #windows
π₯14β€4
https://cocomelonc.github.io/linux/2025/11/14/linux-hacking-8.html next one from my blog, based on an exercise for my students and readers
#hacking #redteam #blueteam #malware #maldev #research #linux #assembly #programming #cybersecurity #infosec
#hacking #redteam #blueteam #malware #maldev #research #linux #assembly #programming #cybersecurity #infosec
β€10π3π₯3
https://cocomelonc.github.io/iot/2025/12/02/hvck-hack-epson.html next one from my blog. This article was written by me for a hackerβs HVCK magazine: Issue 1 in 2023.
Ryan Williams thank you for your magazine and for your contribution to the community!
https://x.com/cocomelonckz/status/1996068117194383547?s=20
#hacking #iot #research #magazine #programming #python #exploit #epson #redteam #cybersecurity #hvck
Ryan Williams thank you for your magazine and for your contribution to the community!
https://x.com/cocomelonckz/status/1996068117194383547?s=20
#hacking #iot #research #magazine #programming #python #exploit #epson #redteam #cybersecurity #hvck
β€11π₯6π1
On the way to Sao Paulo, there is a Starlink on board Qatar Airways and you can work online π
#conference #research #starlink #hacking
#conference #research #starlink #hacking
β€17π₯9π4π1π€£1
https://cocomelonc.github.io/linux/2025/12/10/linux-hacking-9.html next one from my blog. Something as simple as a password check has multiple failure points. #hacking #apt #cybersecurity #assembly #malware #redteam #blueteam #purpleteam #research #linux #shellcode #programming
β€6π₯5π2
I'm starting work on a
new edition of my book with Packt.β€οΈ
First edition
#book #research #software #development
#blackhat #cybersecurity #hacking #malware #maldev
new edition of my book with Packt.β€οΈ
First edition
#book #research #software #development
#blackhat #cybersecurity #hacking #malware #maldev
β€30π5π₯°5π2
https://cocomelonc.github.io/malware/2025/12/25/malware-tricks-55.html next one from my blog. Another classic technique in malware development to stay away from the more obvious Win32 APIs.
As far as I know this function used by Process Hacker, for performance in process enumeration.
The MHook library also got a significant performance boost when switching from
Another caveat, by intercepting calls to the
Thanks to ANY.RUN for the API β₯οΈ
https://x.com/cocomelonckz/status/2005515490731675758?s=20
#cybersecurity #malware #research #hacking #redteam #blueteam #programming #book
As far as I know this function used by Process Hacker, for performance in process enumeration.
The MHook library also got a significant performance boost when switching from
CreateToolhelp32Snapshot to NtQuerySystemInformationAnother caveat, by intercepting calls to the
NtQuerySystemInformation function, we also can hide a some specified process, from common process monitoring tools such as Task Manager and Process Hacker. This is also an interesting trick in malware development, but I will write about this in a separate post.Thanks to ANY.RUN for the API β₯οΈ
https://x.com/cocomelonckz/status/2005515490731675758?s=20
#cybersecurity #malware #research #hacking #redteam #blueteam #programming #book
β€11π₯4π1π1
Djuma Mubarak! With @mrexodia Duncan Ogilvie at @hack_lu 2025! Thank you for @x64dbg β€οΈ
#hacking #cybersecurity #malware #malwareanalysis #maldev #research #threatintel #redteam #blueetam #purpleteam #programming #reveng #reverse #x64dbg
#hacking #cybersecurity #malware #malwareanalysis #maldev #research #threatintel #redteam #blueetam #purpleteam #programming #reveng #reverse #x64dbg
β€16π₯3π1
https://cocomelonc.github.io/macos/2026/01/05/malware-mac-persistence-1.html next one from my blog. As I mentioned before, this series of posts will be about MacOS malware persistence practical implementation
https://x.com/i/status/2008768782735732861
#hacking #malware #maldev #persistence #apt #macos #cybersecurity #purpleteam #ethicalhacking #threatintel #research #book
https://x.com/i/status/2008768782735732861
#hacking #malware #maldev #persistence #apt #macos #cybersecurity #purpleteam #ethicalhacking #threatintel #research #book
β€7π₯5π2
Alhamdulillah! I was happy to speak at a great IdentityShield Summit 2026 conference and meet friends and colleagues in person. There are so many of them that it is impossible to list them all π
First and foremost, special thanks to Anirban Mukherji thank you for the invitation, for your hospitality, and for the kind words from you every time we meet.
Jayson E. Street Nikhil Shrivastava Gaurav Bhatia Raj Sharma Dhillon Kannabhiran your are the legends!
Special thanks to Vivek Yadav you are true professional!
I also thank the entire team at miniOrange without whom this conference would look different, in particular Dikshita Tiwari for support and help
twitter: https://x.com/cocomelonckz/status/2013104098401534257?s=20
#conference #cybersecurity #india #hacking #malware #research #threatintel #redteam #blueteam #purpleteam
First and foremost, special thanks to Anirban Mukherji thank you for the invitation, for your hospitality, and for the kind words from you every time we meet.
Jayson E. Street Nikhil Shrivastava Gaurav Bhatia Raj Sharma Dhillon Kannabhiran your are the legends!
Special thanks to Vivek Yadav you are true professional!
I also thank the entire team at miniOrange without whom this conference would look different, in particular Dikshita Tiwari for support and help
twitter: https://x.com/cocomelonckz/status/2013104098401534257?s=20
#conference #cybersecurity #india #hacking #malware #research #threatintel #redteam #blueteam #purpleteam
β€11
With Jayson.E.Street πππ
This is the third time we've met in different parts of the world π€
#hacking #malware #research #conference
This is the third time we've met in different parts of the world π€
#hacking #malware #research #conference
π₯12π6π₯°5
My Malware Development for Ethical Hackers eBook is currently featured in Packt's $9.99 Sale!
https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801076975
#hacking #malware #maldev #threathunting #threatintel #ethicalhacking #purpleteam #redteam #blueteam #research #book #packt
https://www.packtpub.com/en-us/product/malware-development-for-ethical-hackers-9781801076975
#hacking #malware #maldev #threathunting #threatintel #ethicalhacking #purpleteam #redteam #blueteam #research #book #packt
β€7π₯6π2
GRAPH_RU-APT-ChainReaver-L_Report_EN.pdf
36.9 MB
The CTI team at Graph Inc. has successfully identified and tracked a large-scale campaign leveraging a supply chain attack, which spreads globally through the compromise of mirror websites and the poisoning of trusted Git repositories, backed by a large and well-structured infrastructure, multiple malware families, and advanced infostealer techniques.
The campaign represents a new level of operational maturity, combining:
- Compromised legitimate websites & GitHub repositories
- Cross-platform malware delivery at scale
- Credential, document, browser data, and access-token theft
- Evasion techniques designed to bypass traditional security controls
#apt #iran #hacking #malware #github #threathunting #threatintel
The campaign represents a new level of operational maturity, combining:
- Compromised legitimate websites & GitHub repositories
- Cross-platform malware delivery at scale
- Credential, document, browser data, and access-token theft
- Evasion techniques designed to bypass traditional security controls
#apt #iran #hacking #malware #github #threathunting #threatintel
β€11π₯8