- how are cats different from dogs?
- cats don't work for the cops and catch rats =^..^=
#cats #catstanbul #archive
- cats don't work for the cops and catch rats =^..^=
#cats #catstanbul #archive
1β€21π₯4π3π€2
https://www.amazon.com/dp/1801810176
Today I received the 2024 sales report for my book Malware Development for Ethical Hackers. Total sales including ebooks and Packt subscriptions: 1,160 copies. The book was in the top 3 Amazon wishlist last year, and also in the top 3 on Packt in the security and cryptography categories.
First of all, I am grateful to my family, especially my wife Laura. My readers, coworkers, and friends deserve a tremendous amount of gratitude as well.
It is my sincere desire that the information I impart will result in at least one reader becoming more knowledgeable, more proficient, and more self-assured.
#book #research #hacking #malware #apt #cybercrime
Today I received the 2024 sales report for my book Malware Development for Ethical Hackers. Total sales including ebooks and Packt subscriptions: 1,160 copies. The book was in the top 3 Amazon wishlist last year, and also in the top 3 on Packt in the security and cryptography categories.
First of all, I am grateful to my family, especially my wife Laura. My readers, coworkers, and friends deserve a tremendous amount of gratitude as well.
It is my sincere desire that the information I impart will result in at least one reader becoming more knowledgeable, more proficient, and more self-assured.
#book #research #hacking #malware #apt #cybercrime
β€16π₯5π2π1
https://cocomelonc.github.io/malware/2025/04/02/malware-cryptography-40.html djuma mubarak! next one on my blog. enjoy!
In this post I want to show you how to implement custom RC5 encryption in Nim language and execute decrypted payload using a sneaky Windows API trick - EnumDesktopsA
twitter: https://x.com/cocomelonckz/status/1908020857164747143
#hacking #cybersecurity #programming #cybercrime #apt #malware #threatintel #book #research #cryptography
In this post I want to show you how to implement custom RC5 encryption in Nim language and execute decrypted payload using a sneaky Windows API trick - EnumDesktopsA
twitter: https://x.com/cocomelonckz/status/1908020857164747143
#hacking #cybersecurity #programming #cybercrime #apt #malware #threatintel #book #research #cryptography
cocomelonc
Malware and cryptography 40 - encrypt/decrypt payload via RC5. Simple Nim example.
ο·½
β€10π2π₯1
There are already 3 international conferences this year where I will not be able to speak, although I received approval for my talk, and all because of the stupid entry rules into the European Union and the Balkans πππ
https://x.com/cocomelonckz/status/1908410624343785746
#research #malware #book #conferences #hacking #cybercrime #apt
https://x.com/cocomelonckz/status/1908410624343785746
#research #malware #book #conferences #hacking #cybercrime #apt
X (formerly Twitter)
zhassulan zhussupov (@cocomelonckz) on X
There are already 3 international conferences this year where I will not be able to speak, although I received approval for my talk, and all because of the stupid entry rules into the European Union and the Balkans
#research #malware #book #conferences #hackingβ¦
#research #malware #book #conferences #hackingβ¦
β€10π3π3π2
https://cocomelonc.github.io/malware/2025/04/10/malware-cryptography-41.html djuma mubarak! next one from my blog.
This post is the result of my own research on using TEA encryption on malware development, but the main difference is using Nim language instead C/C++
https://github.com/cocomelonc/meow/tree/master/2025-04-10-malware-cryptography-41
#cybersecurity #malware #hacking #redteam #blueteam #purpleteam #programming #research #cybercrime #apt #nim #clang #cpp
This post is the result of my own research on using TEA encryption on malware development, but the main difference is using Nim language instead C/C++
https://github.com/cocomelonc/meow/tree/master/2025-04-10-malware-cryptography-41
#cybersecurity #malware #hacking #redteam #blueteam #purpleteam #programming #research #cybercrime #apt #nim #clang #cpp
cocomelonc
Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example.
ο·½
β€8π₯3π2
Alhamdulillah, if you are good at something then extend your #knowledge to everyone so that the world can shine
#cybersecurity #book #research #hacking #malware #programming #cybercrime #apt
#cybersecurity #book #research #hacking #malware #programming #cybercrime #apt
β€17π4π4
https://github.com/cocomelonc/bsprishtina-2024-maldev-workshop/
Assalamu aleikum. Just updated the repository. Added new PoCs based on my trainings that I conduct in Bahrain β€οΈ at this time.
https://x.com/cocomelonckz/status/1915237225626808725
#cybersecurity #hacking #programming #research #malware #redteam #blueteam #purpleteam #apt #cybercrime #books #knowledge #packt
Assalamu aleikum. Just updated the repository. Added new PoCs based on my trainings that I conduct in Bahrain β€οΈ at this time.
https://x.com/cocomelonckz/status/1915237225626808725
#cybersecurity #hacking #programming #research #malware #redteam #blueteam #purpleteam #apt #cybercrime #books #knowledge #packt
GitHub
GitHub - cocomelonc/bsprishtina-2024-maldev-workshop: BSides Prishtina 2024 Malware Development and Persistence workshop
BSides Prishtina 2024 Malware Development and Persistence workshop - cocomelonc/bsprishtina-2024-maldev-workshop
105β€12π₯3π2
https://cocomelonc.github.io/malware/2025/05/01/malware-tricks-46.html djuma mubarak! next one in my blog. Simple "classic" trick, very useful for my entry level readers and students. enjoy! =^..^=
twtter: https://x.com/cocomelonckz/status/1918210338681409945
#malware #cybersecurity #hacking #redteam #blueteam #purpleteam #cybercrime #malwaredev #malwareanalysis #apt #spyware #research #programming
twtter: https://x.com/cocomelonckz/status/1918210338681409945
#malware #cybersecurity #hacking #redteam #blueteam #purpleteam #cybercrime #malwaredev #malwareanalysis #apt #spyware #research #programming
cocomelonc
Malware development trick 46: simple Windows keylogger. Simple C example.
ο·½
β€10π₯3π2
Djuma mubarak! I know that among my followers on linkedin, twitter and telegram there are French speaking cybersecurity speciialists, I found an interesting playlist and channel: it looks at examples and code from my blog in French on youtube:
https://www.youtube.com/watch?v=TQUCY6k0o_s&list=PLboyMWpGKWpBt2iUH6hIz68oqkRtCQr2C&index=86
twitter: https://x.com/cocomelonckz/status/1920871454028992906
#cybersecurity #hacking #programming #malware #research #youtube #book #cybercrime #redteam #blueteam #purpleteam
https://www.youtube.com/watch?v=TQUCY6k0o_s&list=PLboyMWpGKWpBt2iUH6hIz68oqkRtCQr2C&index=86
twitter: https://x.com/cocomelonckz/status/1920871454028992906
#cybersecurity #hacking #programming #malware #research #youtube #book #cybercrime #redteam #blueteam #purpleteam
YouTube
dΓ©veloppement de logiciels persistance corbeille gestionnaires d extension COM Mes documents
β€8π3π1
https://cocomelonc.github.io/malware/2025/05/10/malware-tricks-47.html next one in my blog. several #apt groups and #cybercriminal organizations like #APT37, #APT38, #Sandworm and malware like #ZeusPanda, #ROKRAT or #CosmicDuke have used this trick.
twitter: https://x.com/cocomelonckz/status/1922149005800182188
#cybersecurity #hacking #malware #redteam #blueteam #purpleteam #programming #research #malwaredev
twitter: https://x.com/cocomelonckz/status/1922149005800182188
#cybersecurity #hacking #malware #redteam #blueteam #purpleteam #programming #research #malwaredev
cocomelonc
Malware development trick 47: simple Windows clipboard hijacking. Simple C example.
ο·½
β€9π2π₯1
Alhamdulillah! Our cat gave birth to kittens! =^..^= π
β€23π₯°9π5
https://cocomelonc.github.io/book/2025/05/19/aiya-mmd-book.html
Alhamdulillah, I finished writing this book in few days.
I wrote this book to help my friends:
Nurkhankyzy Aiya, Acute myeloid leukemia (AML).
and all those children who are fighting for their lives.
Why is the book called that? AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.
I will be very happy if this book helps at least one person to gain knowledge and learn the science of cybersecurity. The book is mostly practice oriented.
Of course the book is not as big as my previous works, this is because firstly I needed to urgently start a fundraising campaign for the Aiya and secondly many things remain confidential (NDA)
Mobile malware - it's a constantly evolving battlefield. What you learned here is just the beginning. Tools change, defenses adapt, but the mindset stays the same: think like the adversary to build stronger defenses.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to #Russian #hacking #community, Medet Turin 2600.kz, BlackIce #hackerspace from Almaty (Kazakhstan) and my friends from Middle East countries: Kingdom of Bahrain, Kingdom of Saudi Arabia, UAE.
All examples are practical cases for educational and research purposes only.
Book design by: Muhammad Patel
twitter: https://x.com/cocomelonckz/status/1924724518951457229
#hacking #mobile #malware #research #book #programming #android #ios #rat #spyware
Alhamdulillah, I finished writing this book in few days.
I wrote this book to help my friends:
Nurkhankyzy Aiya, Acute myeloid leukemia (AML).
and all those children who are fighting for their lives.
Why is the book called that? AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.
I will be very happy if this book helps at least one person to gain knowledge and learn the science of cybersecurity. The book is mostly practice oriented.
Of course the book is not as big as my previous works, this is because firstly I needed to urgently start a fundraising campaign for the Aiya and secondly many things remain confidential (NDA)
Mobile malware - it's a constantly evolving battlefield. What you learned here is just the beginning. Tools change, defenses adapt, but the mindset stays the same: think like the adversary to build stronger defenses.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to #Russian #hacking #community, Medet Turin 2600.kz, BlackIce #hackerspace from Almaty (Kazakhstan) and my friends from Middle East countries: Kingdom of Bahrain, Kingdom of Saudi Arabia, UAE.
All examples are practical cases for educational and research purposes only.
Book design by: Muhammad Patel
twitter: https://x.com/cocomelonckz/status/1924724518951457229
#hacking #mobile #malware #research #book #programming #android #ios #rat #spyware
cocomelonc
AIYA - Mobile malware development book. First edition
ο·½
β€20π₯12π3
If you want to help with translations of this book:
https://github.com/cocomelonc/aiya_mmd_book
I will prepare source code of examples and I will push it to this repo
https://github.com/cocomelonc/aiya_mmd_book
I will prepare source code of examples and I will push it to this repo
GitHub
GitHub - cocomelonc/aiya_mmd_book: Attack and introduction (info stealer), start your adventure in MMD
Attack and introduction (info stealer), start your adventure in MMD - cocomelonc/aiya_mmd_book
β€8π8π₯4