40629
The largest collection of malware source, samples, and papers on the internet. Password: infected https://vx-underground.org/
Holy shit, Arion Kurtaj, the guy from LAPSUS who did the Rockstar Games compromise, smuggled a phone into prison
(This is all over Rockstar forums, bro burned himself again)
malwrhunterteam discovered this. Someone should probably tell AceCareer-dot-edu they're hosting malware in their wp-includes/certificate directory.
Читать полностью…
War Thunder*, sorry. I made a mistake. I'm not big brain. Please stop bonking me. I'm sorry
Читать полностью…
Okay, I'm tired of writing now. Here are some other topics to schizo rant about later:
- Why mutation engines are less common now
- How mutation engines are effective and also not effective
- How you can make code change
- Different types of mutation engines
- Mutation engines in different programming languages
- Why some things are engines and why some aren't
- Anime
Because people asked, "what's a Polymorphic Mutation Engine?", we'll talk about it. Truthfully, the name sounds kind of dangerous, or exotic, but in theory and implementation it's not too bad. The primary issue is it requires some prerequisite knowledge and if you don't have it, it gets funky and goopy really fast.
If you're familiar with high-level programming with class inheritance, this is not the same as object oriented polymorphism.
When coding (in literally any language) there is a concept of a mutation engine. As is tradition, it sounds fancy, but if you break it down it makes sense.
What's an engine? If you think of an automobile engine (beep, beep), it's what propels the vehicle forward using a bunch of really small explosions, or something, whatever the fuck "combustion" is.
Likewise, an "engine" in programming is something that takes something in and it results in ... a result.
An engine in a vehicle takes gasoline (something in) and the engine results in "a result" (propulsion, vehicle being able to move). You have a lot of different engines in programming such as search engines, rendering engines, game engines, etc.
In that particular case, a Polymorphic Mutation Engine receives something (code) and then mutates it (changes it). It is called "Polymorphic" because it means Poly (many) - Morph (changes). It changes many times.
I have finished my Polymorphic Mutation Engine. It is very silly.
I spent hours, probably 6 hours or more, debugging trying to figure out why it wasn't mutating correctly.
Then it dawned on me Visual Studio was optimizing out segments of my code which made it break.
Today Donald Trump fired Kristi Noem (lady in charge of DHS) while she was live on television.
I have never seen someone in this prestigious a position fired on live television (or any position, for that matter).
I'm not implying anything with this post.
But, it made me very, very, very, confused. I'm working on this new code thingy, check the internet, and I see this lady fired while she's doing a live press conference, she didn't even know she was fired yet and the banner on the screen says shes fired.
I'm like ???
> be kippu
> some startup app or something
> idfk
> goes live
> people sign up
> realize it's vibe coded
> nerds get silly
> nerds do http get on api endpoint
> dumps entire database
*image censored, although it's all over xitter
For those curious, "Lick" is facing some pretty serious charges. He has successfully racked up the standard cybercrime stuff but with bigger and fancier numbers
- Wire fraud (with a sprinkle of Theft of government property (18 U.S.C. §641)): 30 years in prison
- Money laundering: 20 years in prison
- Conspiracy (aggravated, US contractor, position of power).
Under current sentencing guidelines, if "Lick" pleads guilty and begs for forgiveness, he is facing 15 - 30 years in prison. If he walks into the court telling the Judge to suck his dick and starts urinating on the walls, he will receive 50 years in prison.
... like, if the government pushes all the children and teenagers to parts of the internet that don't require age verification ... and all the adults do age verification ... doesn't that just create a massive hangout for children and potential predators ... ? Am I crazy?
Читать полностью…
In today's episode of "lol wtf the internet is silly"
- Iran malwares Iraq
- Ukraine malwares Russia
- North Korea attacking cryptocurrency exchanges
- China malwares a bunch of countries
- Chinese nerds infect iOS apps (lol)
- North Korea oopsies, infects PC from GTA V mods
Also, I think Kash Patel laid off the FBI Special Graphics Unit, because I think that background is AI generated
Читать полностью…
Chat, all hell has broken loose in the Linux community.
Linux nerds are discussing how they'd implement age verification at the OS level (if need be to comply with laws).
Linux nerds are having a psychiatric meltdown. The nerds are revolting.
My 11 month old son has learned "protesting", the precursor to true temper tantrums.
He grabbed my beard and pulled on it as hard as he could. My face was bleeding (not a lot, just by the hair follicles), and somehow the right side of my beard is longer than the left.
Where he pulled my beard, the skin is red, itchy, and some hair follicles appear to be in-grown (they look kind of infected).
He is also the perfect size to kick me in my testicles. When he lays down, his feet reach my groin. When I hold him up, his feet reach my groin.
I have been kicked in the testicles probably five times the past couple of days. No, he isn't kicking hard, but (if you're not a man and you didn't know this already) any sort of hit to the testicles is painful ... and kind of scary.
He is also strong enough to throw things. He is not accurate or consistent with his strength, but he successfully threw a small bowl of mashed pumpkins into the curtains in our dining room.
Despite my best efforts, our curtains are now stained with pumpkin, it has infused into the curtains at a molecular level.
I'm tired
sMeLlY whAt Do u Look LiKE
Unironically, pretty close to this now (1 little hairs left on head)
We need to have a talk.
Some of you send me e-mails, or DMs, calling me "a cat". You say, "stinky cat", or "dumb cat", or "I know you're a cat".
What the fuck kind of psyop is this? It's not just one person, it's actually a lot of people.
I'm a human being, goddammit
AceCareer-dot-edu WordPress site has been compromised and is currently being used to host malware.
Ace is a high education institute in Manhattan, NY.
I said, "omg theyre using higher educational institutes to deliver malware".
Then I saw their university campus.
United States government big mad this week as a whistleblower leaks government documents on the internet.
Basically, the Department of Interior documents leaked showed the United States government plans on removing themes from National Parks about African American stuff, LGBT stuff, Climate Change, etc.
A Spokesman from the Department of Interior has stated the documents are edited and are intentionally misleading.
The biggest surprise is these documents were not leaked onto World of Tanks
Mutation engines have two different components.
1. The thingy you want to change (code)
2. The thingy that does the changes (the engine).
How you implement both these components is tricky because you have to solve problems such as:
1. Where am I going to store the code that changes?
2. How will the engine make sure each "change" is unique?
Many people have the false belief that a mutation engine means the code changes as it runs, but that isn't necessarily true. While that is technically* possible, it is exceptionally rare and profoundly difficult to implement in any reasonable manner. How self-rewriting code is implemented is outside the scope of this, but it is only achievable with assembly (to the best of my knowledge, I haven't seen it in any other language).
Mutations usually occurs during "mutation events", basically a time when a program can safely change itself without everything imploding. These are usually:
1. Compilation time
2. Infection time
3. ???
Primitive mutation engines change when the binary is compiled. There are many examples of this online. The code is the same, but when you click "build" the result is different each time (the .exe looks different). This is achieved (usually) with a bunch of fancy macros.
More sophisticated mutation engines change code when it infects another program. How this is achieved is also kind of outside the scope of this because it requires a pretty heavy prerequisite knowledge on Microsoft PE files (.exe or .dlls).
??? because this is basically any other time your code can change without is imploding into itself. In my case, with my Polymorphic Mutation Engine, my program changes itself each time it terminates. In other words, when it finishes running and Windows says "ok mr. program go back to the harddrive", this is when my code takes the opportunity to mutate.
Big drama on the internet today as someone on Reddit posts a video tutorial on how to perform a self-orchiectomy at home (removal of the testicals).
Please do not perform surgeries on yourself.
Some people asked if I'm trolling. No, I am not trolling, he seriously fired this lady on live tv
Читать полностью…
I don't know what kind of programming logic allows a full DB dump on an HTTP Get, but it is very sophisticated and my little brain just doesn't understand
Читать полностью…
In today's episode of "lol wtf the internet is silly"
Iranian government starts throwing hands (on the internet with malware) with:
- Clearview AI
- Jewish Agency
- Salam Palestine
- Nefesh B’Nefesh
- Yahel Israel
- Terrogence
- Zivorex
ZachXBT has done some serious shenanigans. Previously, on Dragon Ball Z, ZachXBT noted the discovery of John Daghita a/k/a Lick stealing cryptocurrency from the United States government
His investigative shenanigans got the attention of some dork named Kash Patel.
I have a stupid question
If they do age verification on everyone, making it so only adults can only visit some websites, that pushes people under age to certain parts of the internet that don't require age verification.
... doesn't that make it easier for pedophiles ... ?
> black mass vol 4
> call for papers
> need to do something cool
> something unique
> need ideas
> "hmm... malware only using rpcs?"
> nah
> "hmm.. polymorphic mutation engine?"
> nah
> "self-rewriting polymorphic mutation engine?"
> nah
> "position independent self-rewriting polymorphic mutation engine?"
> nah
> "position independent self-rewriting polymorphic mutation engine with embedded obfuscated powershell?"
> hmmm... maybe
> "position independent self-rewriting polymorphic mutation engine abusing uefi nvram variables in motherboard flash memory with sliding key encrypted embedded obfuscated powershell running in-memory without touching disk?"
> ok good idea
chat, thats my next paper
The FBI (and apparently every other government agency on planet) has seized LeakBase, the long standing competitor to Breached, with the difference being LeakBase was more tailored to Eastern Europeans.
Hot take: Operation Leak is an unoriginal and lazy name
Yesterday I spent some time making him a small bowl of pasta mixed with broccoli. It wasn't a lot, it wasn't a particularly difficult meal to make, but when I made it I was extremely tired and I tried to provide him a healthy meal.
I sat it down on his little feeding table. He looked at the food. He looked up at me. He looked back at the food. He glanced around the room.
He then decided to smack the bowl and fling the food I just had just prepared for him all over the floor. When I looked at the giant mess on the floor I let out a dramatic sigh.
He thought my facial expression was funny and he began laughing.
I verbally said, "fuck my life", and began cleaning up the mess.
Oh yeah? You're a "hacker"? Prove it.
Show me your carpel tunnel syndrome and nerve damage from sitting in a chair for too long
Current vx-underground conspiracies:
- I'm Joe Biden's psyop
- I'm the FBI
- I'm Lockbit ransomware group
- I'm the CIA
- I'm Jewish, live in Israel
- (NEW) I'm Indian, live in India
- (NEW) I'm a Syrian, opposing Syrian government
The truth:
- Fat American, Dad, balding, tired