Malware, Cats and Cryptography
1.71K subscribers
60 photos
2 videos
15 files
85 links
cocomelonc's notes about maldev cryptography and math
Download Telegram
Alhamdulillah, if you are good at something then extend your #knowledge to everyone so that the world can shine
#cybersecurity #book #research #hacking #malware #programming #cybercrime #apt
❀17πŸ‘4πŸ‘4
Djuma mubarak! I know that among my followers on linkedin, twitter and telegram there are French speaking cybersecurity speciialists, I found an interesting playlist and channel: it looks at examples and code from my blog in French on youtube:

https://www.youtube.com/watch?v=TQUCY6k0o_s&list=PLboyMWpGKWpBt2iUH6hIz68oqkRtCQr2C&index=86

twitter: https://x.com/cocomelonckz/status/1920871454028992906

#cybersecurity #hacking #programming #malware #research #youtube #book #cybercrime #redteam #blueteam #purpleteam
❀8πŸ‘3πŸ‘1
Alhamdulillah! Our cat gave birth to kittens! =^..^= 😍
❀23πŸ₯°9πŸ‘5
I am working on new book, the book will be released in the next few days in sha Allah
#research #malware #book #hacking
❀22πŸ”₯7🀩4
I am on the finish line ❀️
new #book coming soon
#book #malware #hacking #research
❀14πŸ”₯7πŸ‘3
https://cocomelonc.github.io/book/2025/05/19/aiya-mmd-book.html

Alhamdulillah, I finished writing this book in few days.
I wrote this book to help my friends:
Nurkhankyzy Aiya, Acute myeloid leukemia (AML).
and all those children who are fighting for their lives.

Why is the book called that? AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.

I will be very happy if this book helps at least one person to gain knowledge and learn the science of cybersecurity. The book is mostly practice oriented.

Of course the book is not as big as my previous works, this is because firstly I needed to urgently start a fundraising campaign for the Aiya and secondly many things remain confidential (NDA)

Mobile malware - it's a constantly evolving battlefield. What you learned here is just the beginning. Tools change, defenses adapt, but the mindset stays the same: think like the adversary to build stronger defenses.

This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.

Special thanks to #Russian #hacking #community, Medet Turin 2600.kz, BlackIce #hackerspace from Almaty (Kazakhstan) and my friends from Middle East countries: Kingdom of Bahrain, Kingdom of Saudi Arabia, UAE.

All examples are practical cases for educational and research purposes only.
Book design by: Muhammad Patel

twitter: https://x.com/cocomelonckz/status/1924724518951457229

#hacking #mobile #malware #research #book #programming #android #ios #rat #spyware
❀20πŸ”₯12πŸ‘3
Malware, Cats and Cryptography
aiya-mmd-book.pdf
Book version updated: Monokai color theme ❀️
#book #research #hacking #malware #mobile
πŸ”₯12❀5
https://cocomelonc.github.io/malware/2025/05/29/malware-cryptography-42.html Djuma mubarak! Next one from my blog.
I focus on the Speck cipher, a lightweight block cipher developed by the https://x.com/NSAGov

Speck is a family of lightweight block ciphers designed for optimal performance in software implementations. It operates on a Feistel-like structure with simple operations: addition, rotation, and XOR (ARX). Speck supports various block and key sizes; in this example, we’ll use Speck128/128, which has a block size of 128 bits and a key size of 128 bits

source code:
https://github.com/cocomelonc/meow/tree/master/2025-05-29-malware-cryptography-42

#malware #hacking #cryptography #redteam #blueteam #purpleteam #book #research
❀8πŸ”₯3πŸ‘2
https://cocomelonc.github.io/linux/2025/06/03/linux-hacking-5.html next one from my blog. This keylogging trick is used by #apt28 and #apt33 groups in the wild.

Banking Trojans for Linux also often use keyloggers to obtain sensitive data such as passwords for banking applications and cryptographic keys.

I hope this post spreads awareness to the blue teamers of this interesting technique, and adds a weapon to the red teamers arsenal.

#hacking #cybersecurity #programming #linux #apt #cybercrime #malware #malwaredev #research #book
100❀7πŸ”₯4πŸ‘1
Alhamdulillah, I recently conducted a training in the Kingdom of Bahrain.

I would like to thank this beautiful country for the trust, support and cooperation during this training and I look forward to the future success of the cybersecurity specialists and my students.

I would like to highlight the special role of my students in promoting cultural heritage and Islamic values, helping to learn the culture and history of this beautiful country.

I would especially like to highlight the hospitality and recommendations for traditional cuisine.

To my great regret, I was unable to visit the beautiful Grand Mosque and this is probably the only problem that should be noted. =^..^=

#hacking #malware #maldev #research #book #programming #apt #cybercrime #cybersecurity #redteam #blueteam #purpleteam #windows #linux #android
❀29πŸ”₯7πŸ†’6