https://cocomelonc.github.io/malware/2024/12/29/malware-cryptography-38.html next one on my blog.
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
cocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
﷽
1❤5👍2🔥1
https://cocomelonc.github.io/malware/2025/01/16/malware-cryptography-39.html next one on my blog.
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
cocomelonc
Malware and cryptography 39 - encrypt/decrypt payload via DES-like cipher. Simple C example.
﷽
1❤8👍1🔥1👏1
https://cocomelonc.github.io/malware/2025/01/19/malware-tricks-44.html next one in my blog.
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
cocomelonc
Malware development trick 44: Stealing data via legit GitHub API. Simple C example.
﷽
❤4👍1🔥1
In the previous examples I created a simple Proof of Concept
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
“stealing” simplest information from victim’s Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
“stealing” simplest information from victim’s Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
cocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
﷽
❤5👍1👏1
https://cocomelonc.github.io/linux/2025/02/01/linux-hacking-4.html next post on my blog. This technique is often used in security research, particularly in side-channel attacks where attackers measure access times to infer sensitive data.
If you’re interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
If you’re interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
cocomelonc
Linux hacking part 4: Measuring cache hit and cache miss times in linux.
﷽
❤5👍1🔥1
https://github.com/cocomelonc/mdmz_book Djuma Mubarak!
This repository was created at the request of my readers to fix errors and create translations of MD MZ Book into other languages.
You are welcome to contribute and make pull requests =^..^=!
twitter link: https://x.com/cocomelonckz/status/1892653928241668246
#cybersecurity #malware #malwaredev #cybercrime #cryptography #hacking #programming #book
This repository was created at the request of my readers to fix errors and create translations of MD MZ Book into other languages.
You are welcome to contribute and make pull requests =^..^=!
twitter link: https://x.com/cocomelonckz/status/1892653928241668246
#cybersecurity #malware #malwaredev #cybercrime #cryptography #hacking #programming #book
❤9🔥5👍1
Translation of the MD MZ book (2-nd edition, ~1000 pages) into Russian (first few chapters), Turkish (390 pages left) and Portuguese (many thanks to Joas A Santos) languages has begun! =^..^= #malware #book #cybersecurity #hacking
❤12🔥2👍1
https://cocomelonc.github.io/book/2025/02/23/book-publication-tr.html The translation of this book into Turkish is currently underway. Thanks to my friends from Kazakh students community from Turkey.
You can send donations via paypal:
https://paypal.me/cocomelonc/
twitter: https://x.com/cocomelonckz/status/1894257801246982175
All funds raised go towards publishing the hard copy (paper version) of this book (Turkish language). I'm starting a fundraising campaign.
#cybersecurity #hacking #research #book #turkish #kazakh #english #malware #redteam #blueteam #purpleteam #programming #fundraising
You can send donations via paypal:
https://paypal.me/cocomelonc/
twitter: https://x.com/cocomelonckz/status/1894257801246982175
All funds raised go towards publishing the hard copy (paper version) of this book (Turkish language). I'm starting a fundraising campaign.
#cybersecurity #hacking #research #book #turkish #kazakh #english #malware #redteam #blueteam #purpleteam #programming #fundraising
❤7🔥4👏1
https://cocomelonc.github.io/malware/2025/02/24/malware-tricks-45.html next post on my blog. simple but not less important
Why this is powerful? Of course it’s a simple “dirty” Proof of Concept, but as you can see it works:
-stealthy payload hiding - no direct payload storage, avoids static detection.
-bypasses simple signature-based detection - payload is embedded in an image file.
-completely pure C - no external libraries required!
-foundation for more advanced steganography-based malware!
#cybersecurity #hacking #malware #steganography #redteam #blueteam #purpleteam #research #programming #ethicalhacking
Why this is powerful? Of course it’s a simple “dirty” Proof of Concept, but as you can see it works:
-stealthy payload hiding - no direct payload storage, avoids static detection.
-bypasses simple signature-based detection - payload is embedded in an image file.
-completely pure C - no external libraries required!
-foundation for more advanced steganography-based malware!
#cybersecurity #hacking #malware #steganography #redteam #blueteam #purpleteam #research #programming #ethicalhacking
cocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
﷽
2👍5❤4🔥3
Alhamdulillah, I have finished translating the book into Turkish but I need help from fellow native Turkish speakers: there may be many semantic and grammatical errors. Please, contact me on LinkedIn. Twitter, Email or Telegram
#book #malware #kazakhstan #turkiye #cryptography #research #hacking #math #science #knowledge #community
#book #malware #kazakhstan #turkiye #cryptography #research #hacking #math #science #knowledge #community
❤17👍1🔥1
https://github.com/cocomelonc/mdmz_book/tree/main/translations/ru-ru
At the request of many readers, I am working on translating the book into russian.
По просьбе многих читателей работаю над переводом книги на русский язык
#book #malware #research #hacking #science #community
At the request of many readers, I am working on translating the book into russian.
По просьбе многих читателей работаю над переводом книги на русский язык
#book #malware #research #hacking #science #community
GitHub
mdmz_book/translations/ru-ru at main · cocomelonc/mdmz_book
The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware - cocomelonc/mdmz_book
❤14🔥5👏2