Malware, Cats and Cryptography
1.72K subscribers
60 photos
2 videos
15 files
85 links
cocomelonc's notes about maldev cryptography and math
Download Telegram
PC Zone UK's PC magazine 1, 2 (April-May 1993)
❀‍πŸ”₯9πŸ”₯3πŸ‘1
Djuma Mubarak!
Saturday, 28.12.2024 13.00 (GMT +3)
Dear community, you are welcome to discuss, Q&A
1πŸ”₯5
PC Zone UK's PC magazine 4. 5, 6 (July-September 1993)
#pcmagazine #nostalgia #collection #games
1❀3πŸ”₯1
https://cocomelonc.github.io/malware/2024/12/29/malware-cryptography-38.html next one on my blog.

As an example, added simple analysis of standard on block cipher from #Kazakhstan

Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.

I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.

twitter: https://x.com/cocomelonckz/status/1873639894872187096

#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
1❀5πŸ‘2πŸ”₯1
Happy New 2025 Year! I continue working on my new book for the blue teamers on Threat Hunting, and I am also preparing a new research on IoT hacking and cryptography. I hope my new works will also be useful in the new year.
1πŸ”₯11❀2
https://cocomelonc.github.io/malware/2025/01/16/malware-cryptography-39.html next one on my blog.

This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.

#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
1❀8πŸ‘1πŸ”₯1πŸ‘1
In the previous examples I created a simple Proof of Concept
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
β€œstealing” simplest information from victim’s Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
❀5πŸ‘1πŸ‘1
https://cocomelonc.github.io/linux/2025/02/01/linux-hacking-4.html next post on my blog. This technique is often used in security research, particularly in side-channel attacks where attackers measure access times to infer sensitive data.

If you’re interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!

#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
❀5πŸ‘1πŸ”₯1