Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-23cocomelonccocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example
2025-06-19cocomelonccocomelonc
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example
2025-06-12cocomelonccocomelonc
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
2025-06-03cocomelonccocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
2025-05-29cocomelonccocomelonc
Malware and cryptography 42 - encrypt/decrypt payload via Speck cipher. Simple C example.
2025-05-19cocomelonccocomelonc
AIYA - Mobile malware development book. First edition
AndroRAT Anubis CraxsRAT Dendroid FakeGram Hydra IPStorm SpyNote
2025-05-10cocomelonccocomelonc
Malware development trick 47: simple Windows clipboard hijacking. Simple C example.
CosmicDuke RokRAT
2025-05-01cocomelonccocomelonc
Malware development trick 46: simple Windows keylogger. Simple C example.
MyDoom Nokki RokRAT
2025-04-10cocomelonccocomelonc
Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example.
2025-04-02cocomelonccocomelonc
Malware and cryptography 40 - encrypt/decrypt payload via RC5. Simple Nim example.
2025-03-19cocomelonccocomelonc
MD MZ Book: Russian translation
2025-03-12cocomelonccocomelonc
Malware development: persistence - part 27. Scheduled Tasks. Simple C example.
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-01-19cocomelonccocomelonc
Malware development trick 44: Stealing data via legit GitHub API. Simple C example.
OceanLotus BitRAT RecordBreaker
2025-01-16cocomelonccocomelonc
Malware and cryptography 39 - encrypt/decrypt payload via DES-like cipher. Simple C example.
2024-12-29cocomelonccocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
2024-12-16cocomelonccocomelonc
Malware and cryptography 36 - random sbox generation algorithms: Fisher-Yates shuffle. Simple C example.
2024-12-16cocomelonccocomelonc
Malware and cryptography 37 - Nonlinearity. Walsh Transform. Simple C example.
2024-11-30cocomelonccocomelonc
Malware and cryptography 35: encrypt payload via Treyfer algorithm. Simple C example.
2024-11-22cocomelonccocomelonc
Linux malware development 3: linux process injection with ptrace. Simple C example.
EvilGnome HiddenWasp Turla RAT