Black & White Path
Black & White Path
Apr 25, 2026 · Information Security

Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework

The article details an AI‑crafted C2 remote‑access trojan framework hosted at 101.32.128[.]36:8443, describing its Go implant, Python listener, PowerShell stager, custom 443‑based encryption, Telegram bot exfiltration, the payload delivery chain via paste.rs and GitHub Gist, and provides sample hashes for the binaries.

C2GoPowerShell
0 likes · 2 min read
Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework
FunTester
FunTester
Dec 3, 2023 · Backend Development

Why Your Java App’s CPU Spikes: Mastering C1/C2 JIT Threads

This article explains how HotSpot's C1 and C2 JIT compiler threads work, why they can consume excessive CPU, and provides practical JVM tuning options—including tiered compilation, code‑cache sizing, and compiler‑thread adjustments—to mitigate performance issues.

C1C2HotSpot
0 likes · 11 min read
Why Your Java App’s CPU Spikes: Mastering C1/C2 JIT Threads
Liangxu Linux
Liangxu Linux
Jun 26, 2021 · Information Security

Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018

Researchers from 360 Netlab have uncovered RotaJakiro, a stealthy Linux backdoor malware first seen in 2018, which uses ZLIB compression, AES/XOR/ROTATE encryption, and hidden plugins to exfiltrate data and evade detection, with twelve functions yet its true purpose remains unknown.

BackdoorC2Linux malware
0 likes · 4 min read
Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018