The largest collection of malware source, samples, and papers on the internet. Password: infected Website: https://www.vx-underground.org/ vx-underground Telegram chatroom link: https://t.me/+njfLzUrqos01ZWNh
> "i don't use protonmail, it's ran by the deepstate"
> *uses gmail*
Security researcher gentoo_python discovered a Prompt Injection on VirusTotal.
Could this be used as a form of social engineering to trick users into thinking a file is safe when it's not?
File hash: 1d30bfee48043a643a5694f8d5f3d8f813f1058424df03e55aed29bf4b4c71ce
hAcKeRs jUst wAnT tO eXplOrE
It's not 1991 anymore. It's 2025. "Hackers" (the name is butchered, makes me uncomfortable), aren't compromising places to explore. If they want to explore, they'll watch a YouTube essay or browse Wikipedia.
They want money (or to be a nuisance)
fr tho bro is cooked, fbi prolly lowkey thinkin of killing his ass (he tripped and fell out a window)
Читать полностью…Ransomware but instead of encrypting data it puts parental controls on the victims computer and restricts them from visiting anime-related websites
Читать полностью…Shoutout to Windows 11 for automatically restarting while I was compressing data.
I love compressing 2,213,220 malwares and having you Thanos snap my progress into nothingness
Praying to God this is a typo because this cookie is delicious
Читать полностью…in this example the prolog looks like
PUSH RBP
MOV RBP, RSP
SUB RSP, 2 HAPPY MEAL 6 PC
DarkStorm DDoS-as-a-Service has taken credit for the alleged DDoS against X.
We have no way to confirm this information. However, we've been told like, 15 times, this is the culprit.
¯\_(ツ)_/¯
Rant / opinion
DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low.
The likelihood of a state sponsored group performing a DdoS attack on an American social media platform is also extremely low. A DdoS attack wouldn't serve any military objective (or an intelligent one rather).
The broad sweeping statement the DdoS attack came from Ukraine (or the Ukraine area(?), at a moment where many Americans are divided on the Ukraine-Russian conflict, is inflammatory at best, is propaganda at worst. Generally speaking, DFIR needs to performed, external organizations will need to be consulted, you cannot (or rather should not) make a statement regarding the situation at hand while having little to no conclusive evidence for accurate attribution. In other words, an organization typically would not make a statement regarding the origins of an offensive cyber operation without concrete evidence.
tldr sigh, non computer nerds will eat up this crap and spread conspiracy theories and misinformation.
🚨BREAKING🚨
THE X USED IN THE MUSK TWEET ISNT THE SAME X ON THE KEYBOARD. WTF IS THAT WEIRD LOOKING X.
Twitter has been down for a really long time. Probably like, 4 or 5 hours, dunno.
Elon Musk probably fuming that he can't post every 15 minutes.
Unrelated, someone asked if I remember "September 9th". They didn't even know the correct date as September 11th.
Also, yes.
Someone from India has been doing mass downloads from our virus exchange (in the millions)
1. My dude — we allow bulk downloads from our main website.
2. Don't make us impose API limitations
Anyone who unironically endorses or performs "vibe coding" will be thrown out of a helicopter while kicking and screaming.
Читать полностью…Made a silly response, currently exploding with people being like "haHA ur CooKed BRO"
Читать полностью…BRO, I COMPROMISED A HOSPITAL USING LUMMA STEALER LOGS TO EXPLORE I SWARE I WAS JUST EXPLORING
Читать полностью…*downloads 1 episode of Naruto off pirate bay*
"fuc da feds dey gunnin after me, I put dat on da O"
The alleged developer (and core member) of Lockbit ransomware group is being extradited from Israel to the United States.
Will law enforcement be nice to him? Will he face 20 years or more? Will he attempt an hero? Find out next time on Dragon Ball Z
Yes, currently maining Windows 11 while handling terabytes of malware. Don't be a big baby — what's the worst that can happen?
Читать полностью…> wake up
> take a shit
> get out of bed
> everything's computer
> wake up
> check twitter place
> normies discussing hacking
Just 0day'd the McDonald's drive-thru using a newly created technique called "Stack McChickens". You push McChickens onto the stack until the program McChickens.
Читать полностью…Update on virus-dot-exchange migration.
We're going pretty good.
14,829,127 unique malwares pushed.
Elon Musk did an interview today stating the IP addresses in the X cyber attack (?) originated from "the Ukraine area" (???).
This has resulted in many people believing the the Ukrainian government is responsible for the DdoS attack on X
Creating a GUI interface using Visual Basic, see if I can track an IP address
Читать полностью…Linux? More like linSUX, am I right? haHA get rage baited nerd
Читать полностью…Chat, we are cooked. The 90s is considered old now.
Читать полностью…Busy, have a random meme from the phone. Talk soon
Love you