https://cocomelonc.github.io/linux/2025/06/03/linux-hacking-5.html next one from my blog. This keylogging trick is used by #apt28 and #apt33 groups in the wild.
Banking Trojans for Linux also often use keyloggers to obtain sensitive data such as passwords for banking applications and cryptographic keys.
I hope this post spreads awareness to the blue teamers of this interesting technique, and adds a weapon to the red teamers arsenal.
#hacking #cybersecurity #programming #linux #apt #cybercrime #malware #malwaredev #research #book
Banking Trojans for Linux also often use keyloggers to obtain sensitive data such as passwords for banking applications and cryptographic keys.
I hope this post spreads awareness to the blue teamers of this interesting technique, and adds a weapon to the red teamers arsenal.
#hacking #cybersecurity #programming #linux #apt #cybercrime #malware #malwaredev #research #book
cocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
ο·½
100β€7π₯4π1
Alhamdulillah, I recently conducted a training in the Kingdom of Bahrain.
I would like to thank this beautiful country for the trust, support and cooperation during this training and I look forward to the future success of the cybersecurity specialists and my students.
I would like to highlight the special role of my students in promoting cultural heritage and Islamic values, helping to learn the culture and history of this beautiful country.
I would especially like to highlight the hospitality and recommendations for traditional cuisine.
To my great regret, I was unable to visit the beautiful Grand Mosque and this is probably the only problem that should be noted. =^..^=
#hacking #malware #maldev #research #book #programming #apt #cybercrime #cybersecurity #redteam #blueteam #purpleteam #windows #linux #android
I would like to thank this beautiful country for the trust, support and cooperation during this training and I look forward to the future success of the cybersecurity specialists and my students.
I would like to highlight the special role of my students in promoting cultural heritage and Islamic values, helping to learn the culture and history of this beautiful country.
I would especially like to highlight the hospitality and recommendations for traditional cuisine.
To my great regret, I was unable to visit the beautiful Grand Mosque and this is probably the only problem that should be noted. =^..^=
#hacking #malware #maldev #research #book #programming #apt #cybercrime #cybersecurity #redteam #blueteam #purpleteam #windows #linux #android
β€29π₯7π6
https://cocomelonc.github.io/macos/2025/06/12/malware-mac-1.html next one from my blog.
Maybe i will continue this series of posts about macOS malware.
twitter: https://x.com/cocomelonckz/status/1934464777314595218
#hacking #research #malware #cybersecurity #redteam #blueteam #purpleteam #cybercrime #telegram #macosx #apple #programming
Maybe i will continue this series of posts about macOS malware.
twitter: https://x.com/cocomelonckz/status/1934464777314595218
#hacking #research #malware #cybersecurity #redteam #blueteam #purpleteam #cybercrime #telegram #macosx #apple #programming
β€16π₯5π2
https://cocomelonc.github.io/macos/2025/06/19/malware-mac-2.html next one in my blog. next in the macOS hacking series. used by #apt34 and #apt10 #cybercrime
twitter: https://x.com/cocomelonckz/status/1935918193916494117
#hacking #malware #macos #programming #redteam #blueteam #purpleteam #research #injection #book #maldev #malwareanalysis #blackhat
twitter: https://x.com/cocomelonckz/status/1935918193916494117
#hacking #malware #macos #programming #redteam #blueteam #purpleteam #research #injection #book #maldev #malwareanalysis #blackhat
cocomelonc
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example
ο·½
β€11π₯4π3
https://cocomelonc.github.io/linux/2025/06/23/linux-hacking-6.html next one from my blog. In the future posts of this series I will show more complex, more malicious behavior in our kernel modules.
twitter: https://x.com/cocomelonckz/status/1937750222433562837
#hacking #malware #programming #rootkits #purpleteam #research #book #maldev #cybersecurity #blackhat #programming
twitter: https://x.com/cocomelonckz/status/1937750222433562837
#hacking #malware #programming #rootkits #purpleteam #research #book #maldev #cybersecurity #blackhat #programming
cocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example
ο·½
β€6π₯2π1
https://cocomelonc.github.io/macos/2025/06/25/malware-mac-3.html next post from my blog, low-level programming on macOS (Intel).
If you found this guide helpful and want to learn more, keep an eye out for upcoming posts where we'll dive into more complex topics, like creating persistent malware, evading detection, and hooking system calls.
twitter: https://x.com/cocomelonckz/status/1938452085885784303
#malware #hacking #research #maldev #blueteam #redteam #purpleteam #cybersecurity #blackhat #assembly #macos #apple #cybercrime
If you found this guide helpful and want to learn more, keep an eye out for upcoming posts where we'll dive into more complex topics, like creating persistent malware, evading detection, and hooking system calls.
twitter: https://x.com/cocomelonckz/status/1938452085885784303
#malware #hacking #research #maldev #blueteam #redteam #purpleteam #cybersecurity #blackhat #assembly #macos #apple #cybercrime
cocomelonc
MacOS hacking part 3: shellcoding. x86_64 assembly intro. Simple NASM examples
ο·½
β€13π₯3π2
Djuma Mubarak π I decided to buy a MacBook on M1 for research, everything I do for MacBook on Intel is outdated
#malware #cybersecurity #research #hacking #blackhat #book #cybercrime
#malware #cybersecurity #research #hacking #blackhat #book #cybercrime
β€15π€―3π―2π₯1
https://cocomelonc.github.io/malware/2025/07/01/malware-tricks-48.html next one from my blog. Simple but still used by #apt33 #apt37 #apt38 and #sandworm
Thanks to ANY.RUN for the API!
twitter: https://x.com/cocomelonckz/status/1940628624622985403
#malware #hacking #research #office #microsoft #malwaredev #malwareanalysis #redteam #blueteam #purpleteam #blackhat #ethicalhacking #programming #visualbasic #c #book #cpp
Thanks to ANY.RUN for the API!
twitter: https://x.com/cocomelonckz/status/1940628624622985403
#malware #hacking #research #office #microsoft #malwaredev #malwareanalysis #redteam #blueteam #purpleteam #blackhat #ethicalhacking #programming #visualbasic #c #book #cpp
cocomelonc
Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
ο·½
β€9π1π1
https://cocomelonc.github.io/macos/2025/07/04/malware-mac-4.html next one from my blog. ASM code tested on Intel, C code tested on Intel and ARM (M1)
twitter: https://x.com/cocomelonckz/status/1942072393511424043
ο»Ώ#malware #hacking #programming #blackhat #redteam #blueteam #maldev #research #assembly #intel #arm #cybercrime #cybersecurity #apt
twitter: https://x.com/cocomelonckz/status/1942072393511424043
ο»Ώ#malware #hacking #programming #blackhat #redteam #blueteam #maldev #research #assembly #intel #arm #cybercrime #cybersecurity #apt
cocomelonc
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples
ο·½
β€9π2π₯1
https://cocomelonc.github.io/macos/2025/07/08/malware-mac-5.html next one from my blog. I decided it would be better to make a separate article for ARM/M1 assembly
twitter: https://x.com/cocomelonckz/status/1942805722070163614
#cybersecurity #hacking #malware #maldev #blackhat #ethicalhacking #purpleteam #research #book #infosec #programming #assembly #cpp #cybercrime #apt
twitter: https://x.com/cocomelonckz/status/1942805722070163614
#cybersecurity #hacking #malware #maldev #blackhat #ethicalhacking #purpleteam #research #book #infosec #programming #assembly #cpp #cybercrime #apt
cocomelonc
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples
ο·½
π₯5β€3π1
I wonder how difficult it is to program this with the most realistic physics?
a long time ago I taught children to program PC games and even wrote several 2D adventure games myself
Nostalgy #retrogames
a long time ago I taught children to program PC games and even wrote several 2D adventure games myself
Nostalgy #retrogames
β€20
https://cocomelonc.github.io/android/2025/07/13/malware-android-1.html next one from my blog. I want to see how is working the Android malware analysis(beta) feature in ANY.RUN
ANY.RUN says: βProcess communicates with Telegram (possibly using it as an attackerβs C2 server)" (T1102)
Many thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1944607736475373757
#hacking #research #malware #maldev #purpleteam #android #stealer #telegram #book #programming #cybersecurity
ANY.RUN says: βProcess communicates with Telegram (possibly using it as an attackerβs C2 server)" (T1102)
Many thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1944607736475373757
#hacking #research #malware #maldev #purpleteam #android #stealer #telegram #book #programming #cybersecurity
cocomelonc
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example.
ο·½
β€4π₯2π1
Hack.lu 2025 1 talk + 1 workshop, thank you for invitation again! β₯οΈ
https://x.com/cocomelonckz/status/1945495533885288463
#conferences #trainings #research #malware #hacking #programming #book #purpleteam #maldev #cybercrime #apt
https://x.com/cocomelonckz/status/1945495533885288463
#conferences #trainings #research #malware #hacking #programming #book #purpleteam #maldev #cybercrime #apt
β€6π1π1
https://cocomelonc.github.io/malware/2025/07/16/malware-cryptography-43.html next one from my blog. Mars is one of those βlegendary but nicheβ block ciphers you only see in CTFs, #crypto #research, or when someone wants to confuse the hell out of an analyst
Thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1945737232788144305
#hacking #malware #maldev #cryptography #research #programming #purpleteam #book
Thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1945737232788144305
#hacking #malware #maldev #cryptography #research #programming #purpleteam #book
cocomelonc
Malware and cryptography 43 - encrypt/decrypt payload via Mars cipher. Simple C example.
ο·½
β€7π1
https://cocomelonc.github.io/macos/2025/07/18/malware-mac-6.html next one from my blog. Everything works perfectly as expected =^..^=
But we have some caveats. Once we get to writing shellcode, we want to avoid any null-bytes. For this reason I will show you source code for this examples that does not contain any null-bytes in the next few blog posts.
twitter: https://x.com/cocomelonckz/status/1947148527546626306
#cybersecurity #hacking #malware #programming #apple #assembly #research #arm #m1 #maldev #shellcode #payload #redteam #blueteam #purpleteam
But we have some caveats. Once we get to writing shellcode, we want to avoid any null-bytes. For this reason I will show you source code for this examples that does not contain any null-bytes in the next few blog posts.
twitter: https://x.com/cocomelonckz/status/1947148527546626306
#cybersecurity #hacking #malware #programming #apple #assembly #research #arm #m1 #maldev #shellcode #payload #redteam #blueteam #purpleteam
cocomelonc
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples
ο·½
β€8π1π₯1
https://cocomelonc.github.io/android/2025/07/30/malware-android-2.html next one from my blog. Thanks to ANY.RUN for API! β₯οΈ
This is a practical case for educational purposes only.
twitter: https://x.com/cocomelonckz/status/1950391133705544102
#cybersecurity #hacking #malware #android #maldev #research #telegram #apt #purpleteam #redteam #blueteam #book #cybercrime #rat #trojan
This is a practical case for educational purposes only.
twitter: https://x.com/cocomelonckz/status/1950391133705544102
#cybersecurity #hacking #malware #android #maldev #research #telegram #apt #purpleteam #redteam #blueteam #book #cybercrime #rat #trojan
cocomelonc
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example.
ο·½
β€8π₯3π2
https://cocomelonc.github.io/macos/2025/08/02/malware-mac-7.html next one from my blog. This code shows that ultra-minimal #linux #shellcode still works on #macOS Sonoma, which is both surprising and #educational.
Want the same for ARM64 M1/M2 shellcode? It will be in the next posts of this macOS hacking series.
twitter: https://x.com/cocomelonckz/status/1952222369050771695
#hacking #blackhat #purpleteam #research #macos #apple #malware #apt #cybercrime #book #redteam #blueteam #cybersecurity #programming
Want the same for ARM64 M1/M2 shellcode? It will be in the next posts of this macOS hacking series.
twitter: https://x.com/cocomelonckz/status/1952222369050771695
#hacking #blackhat #purpleteam #research #macos #apple #malware #apt #cybercrime #book #redteam #blueteam #cybersecurity #programming
cocomelonc
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples
ο·½
β€8π₯3π1
Still grinding on the new book - this time with a different publisher, since the last one basically ghosted me. Asked them for almost two months to just create a GitHub repo, but apparently that was too much to handle. So yeah, switched gears. β€οΈ
π₯9β€8π2
https://cocomelonc.github.io/macos/2025/08/10/malware-mac-8.html next one from my blog. no exploits here - just clean mechanics you can reuse in #redteam and #blueteam practice/ #exercises.
twitter: https://x.com/cocomelonckz/status/1954762366396105161
#cybersecurity #hacking #malware #macos #apple #programming #research #purpleteam #maldev #malwareanalysis #arm #intel
twitter: https://x.com/cocomelonckz/status/1954762366396105161
#cybersecurity #hacking #malware #macos #apple #programming #research #purpleteam #maldev #malwareanalysis #arm #intel
cocomelonc
MacOS hacking part 8: dlopen() code loading + finding target PIDs. Simple C (Intel, ARM) examples
ο·½
β€13