https://www.first.org/events/symposium/central-asia2026/program#pMalware-Development-for-Ethical-Hackers-Windows-Linux-Android-Full-Day
#conferences #hacking #malware #training #workshop #book #research
#conferences #hacking #malware #training #workshop #book #research
FIRST β Forum of Incident Response and Security Teams
Program Overview / 2026 FIRST Regional Symposium for Central Asia
β€14π3π₯3
https://cocomelonc.github.io/macos/2026/02/28/mac-malware-persistence-4.html next one from my blog. Used by #lazarus #kimsuky and #windshift #apt groups
twitter
#hacking #malware #research #macos #persistence #redteam #blueteam #purpleteam #maldev #programming #cybersecurity #threatintel
#hacking #malware #research #macos #persistence #redteam #blueteam #purpleteam #maldev #programming #cybersecurity #threatintel
β€6π₯1
Alhamdulillah! Successfully conducted training class for the FIRST conference in Tashkent, Uzbekistan πΊπΏ! Happy to meet my friends and colleagues in person Mukhtar Serikbayev Donavan Cheah Yoon Yik Ng ε΄εη Imane B. Jamaleddine HADINI Malik Tawfiq Bilal Alqurneh. You are true professionals!
Twitter/X
#hacking #conference #research #malware #redteam #blueteam #threatintel #maldev #book #programming
Twitter/X
#hacking #conference #research #malware #redteam #blueteam #threatintel #maldev #book #programming
π₯9π5β€2
https://cocomelonc.github.io/malware/2026/03/05/malware-cryptography-44.html next one from my blog.
Today, we will move away from classical encryption and use pure #mathematics. We are going to use the Discrete Fourier Transform (DFT) to turn our #shellcode into #frequency noise.
You might wonder: is this just a βacademicβ trick, or does it have real-world applications in high-end cyber espionage?
While we donβt often see a pure DFT loop in every commodity #malware, the philosophy behind it is a hallmark of sophisticated #APT groups. Here is why this idea is more βrealβ than it looks.
twitter/X
#hacking #cybersecurity #programming #research #maldev #book #threatintel #purpleteam #ethicalhacking #math
Today, we will move away from classical encryption and use pure #mathematics. We are going to use the Discrete Fourier Transform (DFT) to turn our #shellcode into #frequency noise.
You might wonder: is this just a βacademicβ trick, or does it have real-world applications in high-end cyber espionage?
While we donβt often see a pure DFT loop in every commodity #malware, the philosophy behind it is a hallmark of sophisticated #APT groups. Here is why this idea is more βrealβ than it looks.
twitter/X
#hacking #cybersecurity #programming #research #maldev #book #threatintel #purpleteam #ethicalhacking #math
π₯7β€3π3π3
My pet project (draft) was selected to be presented at DEFCON Singapore 2026, which will take place from April 28 to April 30, 2026.
#hacking #malware #threatintel #programming #research
#hacking #malware #threatintel #programming #research
GitHub
GitHub - cocomelonc/peekaboo: It bridges my research with a functional tool. I want to provide a safe, open-source framework forβ¦
It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defenders to improve detection through hands-on learning. - cocome...
π₯11β€5π3π₯°1
BadPaw_and_MeowMeow.pdf
212 B
Exposing a Russian Campaign Targeting Ukraine Using New Malware Duo: BadPaw and MeowMeow
#hacking #apt #malware #threatintel #research #report #cats
#hacking #apt #malware #threatintel #research #report #cats
β€6π₯3π2
https://cocomelonc.github.io/linux/2026/03/12/linux-hacking-10.html next one. #APT groups and #HiddenWasp using this mechanism to hide #malware from #detection
X/twitter
#hacking #cybersecurity #research #linux #programming #threatintel #purpleteam #redteam #blueteam #maldev #malwareanalysis #book
X/twitter
#hacking #cybersecurity #research #linux #programming #threatintel #purpleteam #redteam #blueteam #maldev #malwareanalysis #book
β€8
Eid Mubarak π
https://cocomelonc.github.io/macos/2026/03/19/mac-malware-persistence-5.html next one from my blog, classic trick. Used by #Lazarus #APT and #osx.flashback #botnet in the wild
X/Twitter
#hacking #malware #cybersecurity #threatintel #research #programming #macos #ethicalhacking #purpleteam #book #malwareanalysis #maldev
https://cocomelonc.github.io/macos/2026/03/19/mac-malware-persistence-5.html next one from my blog, classic trick. Used by #Lazarus #APT and #osx.flashback #botnet in the wild
X/Twitter
#hacking #malware #cybersecurity #threatintel #research #programming #macos #ethicalhacking #purpleteam #book #malwareanalysis #maldev
5β€15
260320.pdf
744.5 KB
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example.
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
#malware #hacking #threatintel #redteam #blueteam #report #research #FBI #iran #APT
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example.
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
#malware #hacking #threatintel #redteam #blueteam #report #research #FBI #iran #APT
β€7π₯3π€1
https://cocomelonc.github.io/macos/2026/03/20/mac-malware-persistence-6.html next one from my blog.
The #macOS-specific variant of the technique used by #HiddenWasp and #Skidmap #malware.
X/Twitter
#hacking #cybersecurity #threatintel #maldev #malwareanalysis #redteam #blueteam #research #persistence #book
The #macOS-specific variant of the technique used by #HiddenWasp and #Skidmap #malware.
X/Twitter
#hacking #cybersecurity #threatintel #maldev #malwareanalysis #redteam #blueteam #research #persistence #book
β€6π₯1
Malware, Cats and Cryptography
https://cocomelonc.github.io/book/2025/05/19/aiya-mmd-book.html Alhamdulillah, I finished writing this book in few days. I wrote this book to help my friends: Nurkhankyzy Aiya, Acute myeloid leukemia (AML). and all those children who are fightingβ¦
It's sad, but the little angel who inspired the title of this book has passed away after a long journey of treatment β€οΈ
#book #research #hacking #charity
#book #research #hacking #charity
π’43β€7π7π2
https://cocomelonc.github.io/macos/2026/03/29/mac-malware-persistence-7.html next one from #macOS #malware #persistence series. This trick was first documented by Patrick Wardle
enjoy!
X/Twitter
#hacking #programming #research #book #apple #maldev #cybersecurity #threatintel #malwareanalysis #redteam #blueteam #purpleteam
enjoy!
X/Twitter
#hacking #programming #research #book #apple #maldev #cybersecurity #threatintel #malwareanalysis #redteam #blueteam #purpleteam
β€7π1π₯1πΎ1
macOS ClickFix Campaign Targets Claude Code Users with AMOS Stealer and Backdoor Access
ANY.RUN analysts identified a macOS-specific ClickFix campaign targeting users of AI tools such as Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, and Cursor
#hacking #malware #stealer #research #anyrun
ANY.RUN analysts identified a macOS-specific ClickFix campaign targeting users of AI tools such as Claude Code, Grok, n8n, NotebookLM, Gemini CLI, OpenClaw, and Cursor
#hacking #malware #stealer #research #anyrun
β€7
By the way, the coolest thing is that ANY.RUN announced a Sandbox for macOS! β€οΈ
#hacking #malware #sandbox #anyrun #threatintel #research #programming #malwareanalysis #blueteam
#hacking #malware #sandbox #anyrun #threatintel #research #programming #malwareanalysis #blueteam
ANY.RUN's Cybersecurity Blog
Ready for macOS Threats: Cross-Platform SOC Analysis with ANY.RUN
macOS threats are targeting enterprise environments. See how SOC teams can investigate cross-platform malware faster with interactive sandbox.
β€10
https://cocomelonc.github.io/macos/2026/04/01/malware-mac-13.html next one from my blog.
The C code only uses standard libraries and sysctl. enjoy!
twitter/X
#hacking #malware #research #book #threatintel #virustotal #apt #maldev #malwareanalysis #purpleteam
The C code only uses standard libraries and sysctl. enjoy!
twitter/X
#hacking #malware #research #book #threatintel #virustotal #apt #maldev #malwareanalysis #purpleteam
β€8
https://cocomelonc.github.io/macos/2026/04/02/mac-malware-persistence-8.html next one on my blog.
This post is quick observation of classic trick.
X/Twitter
#malware #hacking #threatintel #research #persistence #macos #purpleteam #redteam #blueteam #apt #book
This post is quick observation of classic trick.
X/Twitter
#malware #hacking #threatintel #research #persistence #macos #purpleteam #redteam #blueteam #apt #book
β€7π₯1π1