https://cocomelonc.github.io/malware/2025/04/10/malware-cryptography-41.html djuma mubarak! next one from my blog.
This post is the result of my own research on using TEA encryption on malware development, but the main difference is using Nim language instead C/C++
https://github.com/cocomelonc/meow/tree/master/2025-04-10-malware-cryptography-41
#cybersecurity #malware #hacking #redteam #blueteam #purpleteam #programming #research #cybercrime #apt #nim #clang #cpp
This post is the result of my own research on using TEA encryption on malware development, but the main difference is using Nim language instead C/C++
https://github.com/cocomelonc/meow/tree/master/2025-04-10-malware-cryptography-41
#cybersecurity #malware #hacking #redteam #blueteam #purpleteam #programming #research #cybercrime #apt #nim #clang #cpp
cocomelonc
Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example.
ο·½
β€8π₯3π2
Alhamdulillah, if you are good at something then extend your #knowledge to everyone so that the world can shine
#cybersecurity #book #research #hacking #malware #programming #cybercrime #apt
#cybersecurity #book #research #hacking #malware #programming #cybercrime #apt
β€17π4π4
https://github.com/cocomelonc/bsprishtina-2024-maldev-workshop/
Assalamu aleikum. Just updated the repository. Added new PoCs based on my trainings that I conduct in Bahrain β€οΈ at this time.
https://x.com/cocomelonckz/status/1915237225626808725
#cybersecurity #hacking #programming #research #malware #redteam #blueteam #purpleteam #apt #cybercrime #books #knowledge #packt
Assalamu aleikum. Just updated the repository. Added new PoCs based on my trainings that I conduct in Bahrain β€οΈ at this time.
https://x.com/cocomelonckz/status/1915237225626808725
#cybersecurity #hacking #programming #research #malware #redteam #blueteam #purpleteam #apt #cybercrime #books #knowledge #packt
GitHub
GitHub - cocomelonc/bsprishtina-2024-maldev-workshop: BSides Prishtina 2024 Malware Development and Persistence workshop
BSides Prishtina 2024 Malware Development and Persistence workshop - cocomelonc/bsprishtina-2024-maldev-workshop
105β€12π₯3π2
https://cocomelonc.github.io/malware/2025/05/01/malware-tricks-46.html djuma mubarak! next one in my blog. Simple "classic" trick, very useful for my entry level readers and students. enjoy! =^..^=
twtter: https://x.com/cocomelonckz/status/1918210338681409945
#malware #cybersecurity #hacking #redteam #blueteam #purpleteam #cybercrime #malwaredev #malwareanalysis #apt #spyware #research #programming
twtter: https://x.com/cocomelonckz/status/1918210338681409945
#malware #cybersecurity #hacking #redteam #blueteam #purpleteam #cybercrime #malwaredev #malwareanalysis #apt #spyware #research #programming
cocomelonc
Malware development trick 46: simple Windows keylogger. Simple C example.
ο·½
β€10π₯3π2
Djuma mubarak! I know that among my followers on linkedin, twitter and telegram there are French speaking cybersecurity speciialists, I found an interesting playlist and channel: it looks at examples and code from my blog in French on youtube:
https://www.youtube.com/watch?v=TQUCY6k0o_s&list=PLboyMWpGKWpBt2iUH6hIz68oqkRtCQr2C&index=86
twitter: https://x.com/cocomelonckz/status/1920871454028992906
#cybersecurity #hacking #programming #malware #research #youtube #book #cybercrime #redteam #blueteam #purpleteam
https://www.youtube.com/watch?v=TQUCY6k0o_s&list=PLboyMWpGKWpBt2iUH6hIz68oqkRtCQr2C&index=86
twitter: https://x.com/cocomelonckz/status/1920871454028992906
#cybersecurity #hacking #programming #malware #research #youtube #book #cybercrime #redteam #blueteam #purpleteam
YouTube
dΓ©veloppement de logiciels persistance corbeille gestionnaires d extension COM Mes documents
β€8π3π1
https://cocomelonc.github.io/malware/2025/05/10/malware-tricks-47.html next one in my blog. several #apt groups and #cybercriminal organizations like #APT37, #APT38, #Sandworm and malware like #ZeusPanda, #ROKRAT or #CosmicDuke have used this trick.
twitter: https://x.com/cocomelonckz/status/1922149005800182188
#cybersecurity #hacking #malware #redteam #blueteam #purpleteam #programming #research #malwaredev
twitter: https://x.com/cocomelonckz/status/1922149005800182188
#cybersecurity #hacking #malware #redteam #blueteam #purpleteam #programming #research #malwaredev
cocomelonc
Malware development trick 47: simple Windows clipboard hijacking. Simple C example.
ο·½
β€9π2π₯1
Alhamdulillah! Our cat gave birth to kittens! =^..^= π
β€23π₯°9π5
https://cocomelonc.github.io/book/2025/05/19/aiya-mmd-book.html
Alhamdulillah, I finished writing this book in few days.
I wrote this book to help my friends:
Nurkhankyzy Aiya, Acute myeloid leukemia (AML).
and all those children who are fighting for their lives.
Why is the book called that? AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.
I will be very happy if this book helps at least one person to gain knowledge and learn the science of cybersecurity. The book is mostly practice oriented.
Of course the book is not as big as my previous works, this is because firstly I needed to urgently start a fundraising campaign for the Aiya and secondly many things remain confidential (NDA)
Mobile malware - it's a constantly evolving battlefield. What you learned here is just the beginning. Tools change, defenses adapt, but the mindset stays the same: think like the adversary to build stronger defenses.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to #Russian #hacking #community, Medet Turin 2600.kz, BlackIce #hackerspace from Almaty (Kazakhstan) and my friends from Middle East countries: Kingdom of Bahrain, Kingdom of Saudi Arabia, UAE.
All examples are practical cases for educational and research purposes only.
Book design by: Muhammad Patel
twitter: https://x.com/cocomelonckz/status/1924724518951457229
#hacking #mobile #malware #research #book #programming #android #ios #rat #spyware
Alhamdulillah, I finished writing this book in few days.
I wrote this book to help my friends:
Nurkhankyzy Aiya, Acute myeloid leukemia (AML).
and all those children who are fighting for their lives.
Why is the book called that? AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.
I will be very happy if this book helps at least one person to gain knowledge and learn the science of cybersecurity. The book is mostly practice oriented.
Of course the book is not as big as my previous works, this is because firstly I needed to urgently start a fundraising campaign for the Aiya and secondly many things remain confidential (NDA)
Mobile malware - it's a constantly evolving battlefield. What you learned here is just the beginning. Tools change, defenses adapt, but the mindset stays the same: think like the adversary to build stronger defenses.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to #Russian #hacking #community, Medet Turin 2600.kz, BlackIce #hackerspace from Almaty (Kazakhstan) and my friends from Middle East countries: Kingdom of Bahrain, Kingdom of Saudi Arabia, UAE.
All examples are practical cases for educational and research purposes only.
Book design by: Muhammad Patel
twitter: https://x.com/cocomelonckz/status/1924724518951457229
#hacking #mobile #malware #research #book #programming #android #ios #rat #spyware
cocomelonc
AIYA - Mobile malware development book. First edition
ο·½
β€20π₯12π3
If you want to help with translations of this book:
https://github.com/cocomelonc/aiya_mmd_book
I will prepare source code of examples and I will push it to this repo
https://github.com/cocomelonc/aiya_mmd_book
I will prepare source code of examples and I will push it to this repo
GitHub
GitHub - cocomelonc/aiya_mmd_book: Attack and introduction (info stealer), start your adventure in MMD
Attack and introduction (info stealer), start your adventure in MMD - cocomelonc/aiya_mmd_book
β€8π8π₯4
https://cocomelonc.github.io/malware/2025/05/29/malware-cryptography-42.html Djuma mubarak! Next one from my blog.
I focus on the Speck cipher, a lightweight block cipher developed by the https://x.com/NSAGov
Speck is a family of lightweight block ciphers designed for optimal performance in software implementations. It operates on a Feistel-like structure with simple operations: addition, rotation, and XOR (ARX). Speck supports various block and key sizes; in this example, weβll use Speck128/128, which has a block size of 128 bits and a key size of 128 bits
source code:
https://github.com/cocomelonc/meow/tree/master/2025-05-29-malware-cryptography-42
#malware #hacking #cryptography #redteam #blueteam #purpleteam #book #research
I focus on the Speck cipher, a lightweight block cipher developed by the https://x.com/NSAGov
Speck is a family of lightweight block ciphers designed for optimal performance in software implementations. It operates on a Feistel-like structure with simple operations: addition, rotation, and XOR (ARX). Speck supports various block and key sizes; in this example, weβll use Speck128/128, which has a block size of 128 bits and a key size of 128 bits
source code:
https://github.com/cocomelonc/meow/tree/master/2025-05-29-malware-cryptography-42
#malware #hacking #cryptography #redteam #blueteam #purpleteam #book #research
cocomelonc
Malware and cryptography 42 - encrypt/decrypt payload via Speck cipher. Simple C example.
ο·½
β€8π₯3π2
https://cocomelonc.github.io/linux/2025/06/03/linux-hacking-5.html next one from my blog. This keylogging trick is used by #apt28 and #apt33 groups in the wild.
Banking Trojans for Linux also often use keyloggers to obtain sensitive data such as passwords for banking applications and cryptographic keys.
I hope this post spreads awareness to the blue teamers of this interesting technique, and adds a weapon to the red teamers arsenal.
#hacking #cybersecurity #programming #linux #apt #cybercrime #malware #malwaredev #research #book
Banking Trojans for Linux also often use keyloggers to obtain sensitive data such as passwords for banking applications and cryptographic keys.
I hope this post spreads awareness to the blue teamers of this interesting technique, and adds a weapon to the red teamers arsenal.
#hacking #cybersecurity #programming #linux #apt #cybercrime #malware #malwaredev #research #book
cocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
ο·½
100β€7π₯4π1
Alhamdulillah, I recently conducted a training in the Kingdom of Bahrain.
I would like to thank this beautiful country for the trust, support and cooperation during this training and I look forward to the future success of the cybersecurity specialists and my students.
I would like to highlight the special role of my students in promoting cultural heritage and Islamic values, helping to learn the culture and history of this beautiful country.
I would especially like to highlight the hospitality and recommendations for traditional cuisine.
To my great regret, I was unable to visit the beautiful Grand Mosque and this is probably the only problem that should be noted. =^..^=
#hacking #malware #maldev #research #book #programming #apt #cybercrime #cybersecurity #redteam #blueteam #purpleteam #windows #linux #android
I would like to thank this beautiful country for the trust, support and cooperation during this training and I look forward to the future success of the cybersecurity specialists and my students.
I would like to highlight the special role of my students in promoting cultural heritage and Islamic values, helping to learn the culture and history of this beautiful country.
I would especially like to highlight the hospitality and recommendations for traditional cuisine.
To my great regret, I was unable to visit the beautiful Grand Mosque and this is probably the only problem that should be noted. =^..^=
#hacking #malware #maldev #research #book #programming #apt #cybercrime #cybersecurity #redteam #blueteam #purpleteam #windows #linux #android
β€29π₯7π6
https://cocomelonc.github.io/macos/2025/06/12/malware-mac-1.html next one from my blog.
Maybe i will continue this series of posts about macOS malware.
twitter: https://x.com/cocomelonckz/status/1934464777314595218
#hacking #research #malware #cybersecurity #redteam #blueteam #purpleteam #cybercrime #telegram #macosx #apple #programming
Maybe i will continue this series of posts about macOS malware.
twitter: https://x.com/cocomelonckz/status/1934464777314595218
#hacking #research #malware #cybersecurity #redteam #blueteam #purpleteam #cybercrime #telegram #macosx #apple #programming
β€16π₯5π2
https://cocomelonc.github.io/macos/2025/06/19/malware-mac-2.html next one in my blog. next in the macOS hacking series. used by #apt34 and #apt10 #cybercrime
twitter: https://x.com/cocomelonckz/status/1935918193916494117
#hacking #malware #macos #programming #redteam #blueteam #purpleteam #research #injection #book #maldev #malwareanalysis #blackhat
twitter: https://x.com/cocomelonckz/status/1935918193916494117
#hacking #malware #macos #programming #redteam #blueteam #purpleteam #research #injection #book #maldev #malwareanalysis #blackhat
cocomelonc
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example
ο·½
β€11π₯4π3
https://cocomelonc.github.io/linux/2025/06/23/linux-hacking-6.html next one from my blog. In the future posts of this series I will show more complex, more malicious behavior in our kernel modules.
twitter: https://x.com/cocomelonckz/status/1937750222433562837
#hacking #malware #programming #rootkits #purpleteam #research #book #maldev #cybersecurity #blackhat #programming
twitter: https://x.com/cocomelonckz/status/1937750222433562837
#hacking #malware #programming #rootkits #purpleteam #research #book #maldev #cybersecurity #blackhat #programming
cocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example
ο·½
β€6π₯2π1