vx-underground
45.5K subscribers
3.91K photos
413 videos
83 files
1.42K links
The largest collection of malware source, samples, and papers on the internet.

Password: infected

https://vx-underground.org/
Download Telegram
From the Google Dork-able ChatGPT conversations, someone noted the discovery of a person who believes they're in an intimate and/or sexual relationship with ChatGPT.

It is a very long read. It isn't someone being ironic. It is one of the strangest thing I've ever read.
🀣66πŸ€“8❀3😒2πŸ‘1😱1
vx-underground
Yeah, I'm killing myself tonight.
Burn all AI to the ground. This man's brain is COOKED
🀣63❀6πŸ‘6🀯5😒1🫑1
vx-underground
Photo
I'm going to church
🀣92πŸ”₯11❀‍πŸ”₯6❀3πŸ‘2😒1πŸ˜‡1
Now being referred to as "The Computer Virus Guy"

Milady, might I tempt thee with a most exquisite computer virus?
😱42πŸ₯°25😁10❀5🀣3🀝2πŸ‘1😒1🫑1
vx-underground
Now being referred to as "The Computer Virus Guy" Milady, might I tempt thee with a most exquisite computer virus?
Perhaps a charming ransomware, or perchance a distinguished information stealer? Hmmmm?
❀‍πŸ”₯51πŸ₯°13🀣8❀1πŸ‘1😒1
Everyone please pray for our friend Franklin. His Father got diagnosed with Sugma. It's fatal.
😒75πŸ™19🀣6❀‍πŸ”₯5❀1πŸ”₯1
Something interesting happened.

The United Kingdom Ministry of Justice (UK MoJ) e-mailed UNC6040 (ShinyHunters and/or UNC3944), the individual(s) believed to be responsible for the compromise(s) of Salesforce, United Kingdom Legal Aid Agency, PowerSchool, Oracle Cloud, and Snowflake.

The Ministry of Justice discovered the disposable e-mail used by the Threat Actor(s) and subsequently e-mailed them a court summons for the crimes committed.

We have a copy of the court summons.
πŸ”₯33🀣30😁6❀4😒1🀝1
vx-underground
Something interesting happened. The United Kingdom Ministry of Justice (UK MoJ) e-mailed UNC6040 (ShinyHunters and/or UNC3944), the individual(s) believed to be responsible for the compromise(s) of Salesforce, United Kingdom Legal Aid Agency, PowerSchool…
As silly as this reads, I don't personally believe the Ministry of Justice actually believed the individuals responsible for these attacks would appear before the courts.

It seems like a formality. If in the event someone is apprehended in the future, the prosecution can state they refused to appear before the courts hence they're fugitives, or fugitive-like.
❀32πŸ‘11😁5πŸ’―5πŸ”₯1πŸ₯°1πŸ€”1🀝1
As is tradition I will not be personally attending DEFCON this year.

I will be attending DEFCON as my first ever computer conference in 2027. I'm just waiting for the statute of limitations for wire fraud to hit.

Hahaha just kidding, that's crazy talk
🀣53πŸ€”15🫑8❀5πŸ”₯1πŸ‘1😱1😒1
h313n_0f_t0r while be at DEFCON representing us. She will have several different limited edition vx-underground stickers.

Two are holographic. One is glow-in-the-dark.

If you see her say "Hello" and grab a sticker.
❀67πŸ₯°17πŸ”₯7😁4πŸ€”2❀‍πŸ”₯1😒1
vx-underground
h313n_0f_t0r while be at DEFCON representing us. She will have several different limited edition vx-underground stickers. Two are holographic. One is glow-in-the-dark. If you see her say "Hello" and grab a sticker.
Oh, and do not touch her.

You do not need to touch her to get her attention. You do not need to suddenly grab her to get her attention. You do not need to touch her during any point of the conversation.

Thanks
😁76🫑32πŸ’―12🀣11❀‍πŸ”₯4😒4πŸ€“4❀3πŸ€”3😱3🀯2
🀣91πŸŽ‰7πŸ‘4😎4😁1😒1
"Tim Je" made a website that uses AI to programmatically generate fake IDs of United Kingdom politicians. This was done to mock the United Kingdom Online Safety Act

https://use-their-id.com/
😁103πŸ”₯23❀18🀣14πŸ’―6🫑5πŸ‘4πŸ‘1
All of our artwork is now available for download. You can use this to produce merch, stickers, or whatever else you'd like.

You're free to do whatever you want with it. However, if you make a profit, give us some money. If you don't... you're mean.

https://vx-underground.org/Art
❀67❀‍πŸ”₯24πŸ”₯11😁8😒1
Hello,

I've been informed someone is giving away vx-underground stuff at DEFCON at W201 and W202 on Friday.

I don't know what this means, I've never been to DEFCON, but if you're at DEFCON, you probably understand this statement.
❀62πŸ”₯6🀝5🫑4😒2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ₯°31❀6🀣6😍4❀‍πŸ”₯1😒1
I've decided I'm going to name my Red Team tool "Meow Meow Kitty Cat Meow Meow Loader".

It is a small tool suite where someone can programmatically embed a payload (.exe, .sys, .dll, etc) into a picture (currently only .BMP images).

It was 3 different binaries present:
- Inserter: CLI for embedding payloads into a target BMP file.

- Remover: CLI tool for testing if the embed process worked correctly. Extracts embedded payload into target destination. Does nothing else

- Meow Meow Kitty Cat Meow Meow Loader: Unnecessarily over-complicated and evasive binary which, only using indirect-syscalls, programmatically extracts the payload from a target .BMP. Extracted payload is executed in-memory, embedded payload never touches the disk

Only writing this because I was bored and wanting to do something with steganography. I may in the future expand to handle .TIFF, .PNG, or over-complicate it more and use Windows COM and/or GDI+ to handle the steganography process. I may also explore doing it with audio or video.
πŸ₯°71❀16πŸ‘11❀‍πŸ”₯4πŸ€“4πŸ”₯3πŸ‘2🀣2🀝2😒1