Malware, Cats and Cryptography
1.71K subscribers
60 photos
2 videos
15 files
85 links
cocomelonc's notes about maldev cryptography and math
Download Telegram
πŸ”₯14❀4
https://cocomelonc.github.io/iot/2025/12/02/hvck-hack-epson.html next one from my blog. This article was written by me for a hacker’s HVCK magazine: Issue 1 in 2023.

Ryan Williams thank you for your magazine and for your contribution to the community!

https://x.com/cocomelonckz/status/1996068117194383547?s=20

#hacking #iot #research #magazine #programming #python #exploit #epson #redteam #cybersecurity #hvck
❀11πŸ”₯6πŸ‘1
On the way to Sao Paulo, there is a Starlink on board Qatar Airways and you can work online 😍
#conference #research #starlink #hacking
❀17πŸ”₯9πŸ‘4😍1🀣1
πŸ˜πŸ˜πŸ˜πŸ˜‚πŸ˜‚πŸ˜‚ #research #bugbounty #cve #hacking #cybersecurity
❀22πŸ”₯10πŸ‘3
❀6πŸ”₯5πŸ‘2
I'm starting work on a
new edition of my book with Packt.❀️
First edition
#book #research #software #development
#blackhat #cybersecurity #hacking #malware #maldev
❀30πŸ‘5πŸ₯°5😁2
The pattern on each cat's nose is as unique as a human fingerprint.
#cats #catstanbul #meow
❀16πŸ”₯1
https://cocomelonc.github.io/malware/2025/12/25/malware-tricks-55.html next one from my blog. Another classic technique in malware development to stay away from the more obvious Win32 APIs.

As far as I know this function used by Process Hacker, for performance in process enumeration.

The MHook library also got a significant performance boost when switching from CreateToolhelp32Snapshot to NtQuerySystemInformation

Another caveat, by intercepting calls to the NtQuerySystemInformation function, we also can hide a some specified process, from common process monitoring tools such as Task Manager and Process Hacker. This is also an interesting trick in malware development, but I will write about this in a separate post.

Thanks to ANY.RUN for the API β™₯️

https://x.com/cocomelonckz/status/2005515490731675758?s=20
#cybersecurity #malware #research #hacking #redteam #blueteam #programming #book
❀11πŸ”₯4πŸ‘1πŸ‘1
Happy New Year ❀️
❀31πŸŽ‰11❀‍πŸ”₯4πŸ‘1
❀7πŸ”₯5πŸ‘2
Alhamdulillah! I was happy to speak at a great IdentityShield Summit 2026 conference and meet friends and colleagues in person. There are so many of them that it is impossible to list them all 😊

First and foremost, special thanks to Anirban Mukherji thank you for the invitation, for your hospitality, and for the kind words from you every time we meet.

Jayson E. Street Nikhil Shrivastava Gaurav Bhatia Raj Sharma Dhillon Kannabhiran your are the legends!

Special thanks to Vivek Yadav you are true professional!

I also thank the entire team at miniOrange without whom this conference would look different, in particular Dikshita Tiwari for support and help

twitter: https://x.com/cocomelonckz/status/2013104098401534257?s=20

#conference #cybersecurity #india #hacking #malware #research #threatintel #redteam #blueteam #purpleteam
❀11
With Jayson.E.Street πŸ˜‚πŸ˜‚πŸ˜‚
This is the third time we've met in different parts of the world πŸ€”
#hacking #malware #research #conference
πŸ”₯12πŸ‘6πŸ₯°5
πŸ”₯17❀9
GRAPH_RU-APT-ChainReaver-L_Report_EN.pdf
36.9 MB
The CTI team at Graph Inc. has successfully identified and tracked a large-scale campaign leveraging a supply chain attack, which spreads globally through the compromise of mirror websites and the poisoning of trusted Git repositories, backed by a large and well-structured infrastructure, multiple malware families, and advanced infostealer techniques.

The campaign represents a new level of operational maturity, combining:
- Compromised legitimate websites & GitHub repositories
- Cross-platform malware delivery at scale
- Credential, document, browser data, and access-token theft
- Evasion techniques designed to bypass traditional security controls
#apt #iran #hacking #malware #github #threathunting #threatintel
❀11πŸ”₯8