Black & White Path
Black & White Path
Apr 25, 2026 · Information Security

Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework

The article details an AI‑crafted C2 remote‑access trojan framework hosted at 101.32.128[.]36:8443, describing its Go implant, Python listener, PowerShell stager, custom 443‑based encryption, Telegram bot exfiltration, the payload delivery chain via paste.rs and GitHub Gist, and provides sample hashes for the binaries.

C2GoPowerShell
0 likes · 2 min read
Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2019 · Information Security

How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control

A hacker recounts how a desperate request led to a full‑scale investigation of insecure IoT cameras, using Shodan to discover default credentials, reverse‑engineering a malicious Android app, infiltrating a cloud server, and ultimately dismantling a ransomware operation that harvested nude videos.

APK reverse engineeringIoT vulnerabilityRemote Access Trojan
0 likes · 10 min read
How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control