β€βπ₯6π1π₯1
https://cocomelonc.github.io/malware/2024/12/29/malware-cryptography-38.html next one on my blog.
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
cocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
ο·½
1β€5π2π₯1
https://cocomelonc.github.io/malware/2025/01/16/malware-cryptography-39.html next one on my blog.
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
cocomelonc
Malware and cryptography 39 - encrypt/decrypt payload via DES-like cipher. Simple C example.
ο·½
1β€8π1π₯1π1
https://cocomelonc.github.io/malware/2025/01/19/malware-tricks-44.html next one in my blog.
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
cocomelonc
Malware development trick 44: Stealing data via legit GitHub API. Simple C example.
ο·½
β€4π1π₯1
In the previous examples I created a simple Proof of Concept
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
βstealingβ simplest information from victimβs Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
βstealingβ simplest information from victimβs Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
cocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
ο·½
β€5π1π1
https://cocomelonc.github.io/linux/2025/02/01/linux-hacking-4.html next post on my blog. This technique is often used in security research, particularly in side-channel attacks where attackers measure access times to infer sensitive data.
If youβre interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
If youβre interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
cocomelonc
Linux hacking part 4: Measuring cache hit and cache miss times in linux.
ο·½
β€5π1π₯1
https://github.com/cocomelonc/mdmz_book Djuma Mubarak!
This repository was created at the request of my readers to fix errors and create translations of MD MZ Book into other languages.
You are welcome to contribute and make pull requests =^..^=!
twitter link: https://x.com/cocomelonckz/status/1892653928241668246
#cybersecurity #malware #malwaredev #cybercrime #cryptography #hacking #programming #book
This repository was created at the request of my readers to fix errors and create translations of MD MZ Book into other languages.
You are welcome to contribute and make pull requests =^..^=!
twitter link: https://x.com/cocomelonckz/status/1892653928241668246
#cybersecurity #malware #malwaredev #cybercrime #cryptography #hacking #programming #book
β€9π₯5π1