Hack.lu 2025 1 talk + 1 workshop, thank you for invitation again! β₯οΈ
https://x.com/cocomelonckz/status/1945495533885288463
#conferences #trainings #research #malware #hacking #programming #book #purpleteam #maldev #cybercrime #apt
https://x.com/cocomelonckz/status/1945495533885288463
#conferences #trainings #research #malware #hacking #programming #book #purpleteam #maldev #cybercrime #apt
β€6π1π1
https://cocomelonc.github.io/malware/2025/07/16/malware-cryptography-43.html next one from my blog. Mars is one of those βlegendary but nicheβ block ciphers you only see in CTFs, #crypto #research, or when someone wants to confuse the hell out of an analyst
Thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1945737232788144305
#hacking #malware #maldev #cryptography #research #programming #purpleteam #book
Thanks to ANY.RUN for API β₯οΈ!
twitter: https://x.com/cocomelonckz/status/1945737232788144305
#hacking #malware #maldev #cryptography #research #programming #purpleteam #book
cocomelonc
Malware and cryptography 43 - encrypt/decrypt payload via Mars cipher. Simple C example.
ο·½
β€7π1
https://cocomelonc.github.io/macos/2025/07/18/malware-mac-6.html next one from my blog. Everything works perfectly as expected =^..^=
But we have some caveats. Once we get to writing shellcode, we want to avoid any null-bytes. For this reason I will show you source code for this examples that does not contain any null-bytes in the next few blog posts.
twitter: https://x.com/cocomelonckz/status/1947148527546626306
#cybersecurity #hacking #malware #programming #apple #assembly #research #arm #m1 #maldev #shellcode #payload #redteam #blueteam #purpleteam
But we have some caveats. Once we get to writing shellcode, we want to avoid any null-bytes. For this reason I will show you source code for this examples that does not contain any null-bytes in the next few blog posts.
twitter: https://x.com/cocomelonckz/status/1947148527546626306
#cybersecurity #hacking #malware #programming #apple #assembly #research #arm #m1 #maldev #shellcode #payload #redteam #blueteam #purpleteam
cocomelonc
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples
ο·½
β€8π1π₯1
https://cocomelonc.github.io/android/2025/07/30/malware-android-2.html next one from my blog. Thanks to ANY.RUN for API! β₯οΈ
This is a practical case for educational purposes only.
twitter: https://x.com/cocomelonckz/status/1950391133705544102
#cybersecurity #hacking #malware #android #maldev #research #telegram #apt #purpleteam #redteam #blueteam #book #cybercrime #rat #trojan
This is a practical case for educational purposes only.
twitter: https://x.com/cocomelonckz/status/1950391133705544102
#cybersecurity #hacking #malware #android #maldev #research #telegram #apt #purpleteam #redteam #blueteam #book #cybercrime #rat #trojan
cocomelonc
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example.
ο·½
β€8π₯3π2
https://cocomelonc.github.io/macos/2025/08/02/malware-mac-7.html next one from my blog. This code shows that ultra-minimal #linux #shellcode still works on #macOS Sonoma, which is both surprising and #educational.
Want the same for ARM64 M1/M2 shellcode? It will be in the next posts of this macOS hacking series.
twitter: https://x.com/cocomelonckz/status/1952222369050771695
#hacking #blackhat #purpleteam #research #macos #apple #malware #apt #cybercrime #book #redteam #blueteam #cybersecurity #programming
Want the same for ARM64 M1/M2 shellcode? It will be in the next posts of this macOS hacking series.
twitter: https://x.com/cocomelonckz/status/1952222369050771695
#hacking #blackhat #purpleteam #research #macos #apple #malware #apt #cybercrime #book #redteam #blueteam #cybersecurity #programming
cocomelonc
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples
ο·½
β€8π₯3π1
Still grinding on the new book - this time with a different publisher, since the last one basically ghosted me. Asked them for almost two months to just create a GitHub repo, but apparently that was too much to handle. So yeah, switched gears. β€οΈ
π₯9β€8π2
https://cocomelonc.github.io/macos/2025/08/10/malware-mac-8.html next one from my blog. no exploits here - just clean mechanics you can reuse in #redteam and #blueteam practice/ #exercises.
twitter: https://x.com/cocomelonckz/status/1954762366396105161
#cybersecurity #hacking #malware #macos #apple #programming #research #purpleteam #maldev #malwareanalysis #arm #intel
twitter: https://x.com/cocomelonckz/status/1954762366396105161
#cybersecurity #hacking #malware #macos #apple #programming #research #purpleteam #maldev #malwareanalysis #arm #intel
cocomelonc
MacOS hacking part 8: dlopen() code loading + finding target PIDs. Simple C (Intel, ARM) examples
ο·½
β€13
https://cocomelonc.github.io/malware/2025/08/11/malware-tricks-49.html next one from my blog. Interaction with the Azure cloud is recognized as legitimate behavior and this is the main problem! Pwn! =^..^=
twitter: https://x.com/cocomelonckz/status/1955512821422403742
any.run task: https://app.any.run/tasks/5ad3bf05-f2c3-48d0-8552-7a988b536ad8
Thanks to any.run for API! β₯οΈ
#hacking #malware #stealer #azure #microsoft #cybersecurity #purpleteam #research #apt #cybercrime #blackhat #maldev #apt
twitter: https://x.com/cocomelonckz/status/1955512821422403742
any.run task: https://app.any.run/tasks/5ad3bf05-f2c3-48d0-8552-7a988b536ad8
Thanks to any.run for API! β₯οΈ
#hacking #malware #stealer #azure #microsoft #cybersecurity #purpleteam #research #apt #cybercrime #blackhat #maldev #apt
cocomelonc
Malware development trick 49: abusing Azure DevOps REST API for covert data channels. Simple C examples.
ο·½
β€5π4π₯2π1
https://cocomelonc.github.io/malware/2025/08/15/malware-tricks-50.html next one from my blog. tLab #technologies company recently discovered one of the first in #Kazakhstan in interesting #phishing campaign aimed at one of the clients.
twitter: https://x.com/cocomelonckz/status/1957321542322286805
Thanks tLab for the API! β₯οΈ
#hacking #research #malware #programming #purpleteam #maldev #cybercrime #apt #microsoft
twitter: https://x.com/cocomelonckz/status/1957321542322286805
Thanks tLab for the API! β₯οΈ
#hacking #research #malware #programming #purpleteam #maldev #cybercrime #apt #microsoft
cocomelonc
Malware development trick 50: phishing attack using a fake login page with Telegram exfiltration. Simple Javascript example.
ο·½
1β€11π1
https://cocomelonc.github.io/macos/2025/08/19/malware-mac-9.html next post in my blog. I'll explore #arm #m1 in upcoming posts.
twitter: https://x.com/cocomelonckz/status/1958033531797406090
#cybersecurity #malware #apple #macosx #osx #shellcode #hacking #programming #research #injection #book #cybercrime #macbook #redteam #purpleteam #blueteam
twitter: https://x.com/cocomelonckz/status/1958033531797406090
#cybersecurity #malware #apple #macosx #osx #shellcode #hacking #programming #research #injection #book #cybercrime #macbook #redteam #purpleteam #blueteam
cocomelonc
MacOS hacking part 9: shellcode injection via task_for_pid - thread hijacking. Simple C (Intel) example
ο·½
β€9π3π₯2
This media is not supported in your browser
VIEW IN TELEGRAM
I miss this country, my second home - Bahrain π§ππ§ππ§π
β€11π3π₯2
https://cocomelonc.github.io/macos/2025/08/24/malware-mac-10.html next one from my blog. instead of hijacking an existing thread, weβll create an entirely new thread in the target process.
twitter: https://x.com/cocomelonckz/status/1959855281929691412
#malware #cybersecurity #hacking #purpleteam #maldev #cybercrime #asm #apple #macosx #threatintel #research #programming #book
twitter: https://x.com/cocomelonckz/status/1959855281929691412
#malware #cybersecurity #hacking #purpleteam #maldev #cybercrime #asm #apple #macosx #threatintel #research #programming #book
β€8π1π₯1
https://github.com/cocomelonc/mdmz_book/
Alhamdulillah, I am starting to translate my #book into Kazakh to develop the Kazakh-speaking #cybersec #community in Kazakhstan. I also want to support everyone who wants to make content in Kazakh about #technology
#hacking #programming #purpleteam #malware
Alhamdulillah, I am starting to translate my #book into Kazakh to develop the Kazakh-speaking #cybersec #community in Kazakhstan. I also want to support everyone who wants to make content in Kazakh about #technology
#hacking #programming #purpleteam #malware
GitHub
GitHub - cocomelonc/mdmz_book: The result of research and investigation of malware development tricks, techniques, evasion, cryptographyβ¦
The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware - cocomelonc/mdmz_book
π₯13β€7π1
https://cocomelonc.github.io/malware/2025/08/28/malware-tricks-51.html djuma mubarak! next one from my blog. enjoy PoC stealer via another legit API. Thanks to ANY.RUN for API! β₯οΈ
twitter: https://x.com/cocomelonckz/status/1961283780779377114
#cybersecurity #malware #research #programming #hacking #purpleteam #redteam #blueteam #book #ethicalhacking #maldev #bitbucket #altassian #cybercrime
twitter: https://x.com/cocomelonckz/status/1961283780779377114
#cybersecurity #malware #research #programming #hacking #purpleteam #redteam #blueteam #book #ethicalhacking #maldev #bitbucket #altassian #cybercrime
β€11π1π₯1
https://cocomelonc.github.io/macos/2025/09/01/malware-mac-11.html next one from my blog.
straightforward bind shell for macOS on Apple Silicon. Clean, minimal, no libc. Pure syscall style.
twitter: https://x.com/cocomelonckz/status/1963094417138401712
#hacking #malware #purpleteam #redteam #blueteam #apple #macos #research #maldev #threatintel #cybersecurity #cybercrime #apt #book
straightforward bind shell for macOS on Apple Silicon. Clean, minimal, no libc. Pure syscall style.
twitter: https://x.com/cocomelonckz/status/1963094417138401712
#hacking #malware #purpleteam #redteam #blueteam #apple #macos #research #maldev #threatintel #cybersecurity #cybercrime #apt #book
1β€8
https://cocomelonc.github.io/persistence/2025/09/14/malware-pers-28.html next one from my blog. works even with Windows Defender real-time protection enabled. enjoy!
twitter: https://x.com/cocomelonckz/status/1968223494044520587
#cybersecurity #malware #hacking #programming #research #persistence #maldev #blackhat #cybercrime #apt #book #redteam #blueteam #purpleteam #threatintel
twitter: https://x.com/cocomelonckz/status/1968223494044520587
#cybersecurity #malware #hacking #programming #research #persistence #maldev #blackhat #cybercrime #apt #book #redteam #blueteam #purpleteam #threatintel
1β€8π1π₯1