Chat, do you like malware builders?
If your answer is 'Yes', 'No', or literally anything else, then I've got good news for you!
We synced more data from the homie Cryakl. We've got 654 unique malware builder families. 20GB worth of builders.
https://vx-underground.org/Builders
If your answer is 'Yes', 'No', or literally anything else, then I've got good news for you!
We synced more data from the homie Cryakl. We've got 654 unique malware builder families. 20GB worth of builders.
https://vx-underground.org/Builders
π50β€20π₯12π€£5π’1
I very sincerely want to thank L0nelyH4ckers for featuring vx-underground on a DEFCON black badge. They didn't inform us this was going to be a thing, so it was very surprising.
It has been an honor and a privilege to serve this community of researchers, students, and morbidly curious, who surround us and send us silly cat pictures.
Thank you for the love and support.
To celebrate this wonderful occasion I am "open sourcing" more vx-underground artwork. Please make shirts, stickers, hats, ... whatever you'd like.
Please visit vx-underground and view the 'Art' directory. Inside of the 'Art' directory will be another directory with something we all like very much.
-smelly
It has been an honor and a privilege to serve this community of researchers, students, and morbidly curious, who surround us and send us silly cat pictures.
Thank you for the love and support.
To celebrate this wonderful occasion I am "open sourcing" more vx-underground artwork. Please make shirts, stickers, hats, ... whatever you'd like.
Please visit vx-underground and view the 'Art' directory. Inside of the 'Art' directory will be another directory with something we all like very much.
-smelly
β€52π₯32π5π1π’1π«‘1
vx-underground
I very sincerely want to thank L0nelyH4ckers for featuring vx-underground on a DEFCON black badge. They didn't inform us this was going to be a thing, so it was very surprising. It has been an honor and a privilege to serve this community of researchers,β¦
Some of you are a bunch of lazy fucks. It's fucking vx-underground kitty cat pixel art stuff. It's literally just cats. Don't fucking DM me asking what it is. Jesus fuckin Christ
π€£69β€23π4π1π’1
This media is not supported in your browser
VIEW IN TELEGRAM
In 2024 I sent this video to the Director of the NSA.
They never replied.
They never replied.
π€£80π’6π4β€3π1π₯1π€1
AcidDrop vs Anti-Lamer Backdoor
Which malware UI wins?
Which malware UI wins?
π«‘58π€£32π₯15π4β€1π’1π€©1
Iβve collected so many malware samples, malware research papers, malware source codes, and malware builders, I could probably open my own malware museum.
π49π₯°22π11π€©7β€4π―2π’1π1
Adding new papers to the malware library. Please review them. They're cool and badass.
2024-06-06 - A fully functional NtCreateProcess mimicking Windows
2025-04-01 - Unhooking Linux EDRs
2025-07-31 - Notes on RAM_DISK_CONTEXT
2025-07-31 - Red Team Tactics Evading EDR on Linux with io_uring
2025-08-06 - Making a self-deleting executable
2025-08-06 - Linux - Living in the Namespace
2025-08-07 - Delete Shadow Copies Using The IOCTL_VOLSNAP_DELETE_SNAPSHOT IOCTL
2025-08-10 - Known issues with TaskList display names
2025-08-11 - Notes on SYSTEMTIME
2025-08-12 - Out-of-Bound SYSTEMTIME in Windows Explorer
2025-08-13 - LowNtReadFile proxy function
2025-06-17 - Uncovering the network outages of digital security products from SetTcpEntry to NsiSetAllParameters
2024-06-06 - A fully functional NtCreateProcess mimicking Windows
2025-04-01 - Unhooking Linux EDRs
2025-07-31 - Notes on RAM_DISK_CONTEXT
2025-07-31 - Red Team Tactics Evading EDR on Linux with io_uring
2025-08-06 - Making a self-deleting executable
2025-08-06 - Linux - Living in the Namespace
2025-08-07 - Delete Shadow Copies Using The IOCTL_VOLSNAP_DELETE_SNAPSHOT IOCTL
2025-08-10 - Known issues with TaskList display names
2025-08-11 - Notes on SYSTEMTIME
2025-08-12 - Out-of-Bound SYSTEMTIME in Windows Explorer
2025-08-13 - LowNtReadFile proxy function
2025-06-17 - Uncovering the network outages of digital security products from SetTcpEntry to NsiSetAllParameters
π₯42β€9π3π€£2π€1
vx-underground
TeaOnHer, the app meant to combat the infamous "TeaApp", is also a giant dumpster fire. It has been compromised. THE DEVELOPER MADE HIS PASSWORD TO THE ADMIN PANEL "Password1!". IT WAS STORED IN PLAIN TEXT ON THE LANDING PAGE. WHAT THE FUCK.
It's leaking nerds driver licenses too.
DAWG LOL STOP VIBE CODING
DAWG LOL STOP VIBE CODING
π€£85β€βπ₯7π€―4β€1π’1π1π―1
vx-underground
It's leaking nerds driver licenses too. DAWG LOL STOP VIBE CODING
WHAT IS BRO YAPPIN ABOUT?! NONE OF THIS IS TRUE
π€£81π12π’5β€2
vx-underground
WHAT IS BRO YAPPIN ABOUT?! NONE OF THIS IS TRUE
All information by Zach Whittacker. He reported on this last week but I somehow missed it
https://techcrunch.com/2025/08/06/a-rival-tea-app-for-men-is-leaking-its-users-personal-data-and-drivers-licenses/
https://techcrunch.com/2025/08/06/a-rival-tea-app-for-men-is-leaking-its-users-personal-data-and-drivers-licenses/
TechCrunch
TeaOnHer, a rival Tea app for men, is leaking users' personal data and driver's licenses | TechCrunch
The newly launched app, now trending on Apple's App Store, contains at least one major security flaw that exposes the private information of its users, including their uploaded selfies and government-issued IDs.
β€20π€©7π₯1π’1
I'll tell you one thing right now, Chat. If these video game companies require a drivers license to play a game, we got driver licenses FOR YEARS thanks to TeaApp and TeaOnHer.
It's free identity theft for the whole family. You can frisbee stolen identities to strangers
It's free identity theft for the whole family. You can frisbee stolen identities to strangers
π€©77π€£27β€14π―7π’1
If you're a person who has been a victim of a data leak and/or company compromise we have tips on how to protect yourself.
We know changing passwords can only go so far. If you're a noob and want some tips read below!
1. Change your full name. You need to change your first name, middle name, and last name. If you don't have a middle name, get one.
2. Physically destroy your cell phone. Ideally you should catapult it into an active volcano. Once this has been accomplished, get a new cell phone provider, cell phone number, and cell phone model.
3. Change your profession. If you have a job as a result of a university education, then too bad. Go back to school or go into blue collar work.
4. Get plastic surgery. You need to be unrecognizable to friends, family, and co-workers (your old co-workers).
5. Move to a different state and/or country.
With these 5 simple tips you won't have to worry about cyber breaches!
We know changing passwords can only go so far. If you're a noob and want some tips read below!
1. Change your full name. You need to change your first name, middle name, and last name. If you don't have a middle name, get one.
2. Physically destroy your cell phone. Ideally you should catapult it into an active volcano. Once this has been accomplished, get a new cell phone provider, cell phone number, and cell phone model.
3. Change your profession. If you have a job as a result of a university education, then too bad. Go back to school or go into blue collar work.
4. Get plastic surgery. You need to be unrecognizable to friends, family, and co-workers (your old co-workers).
5. Move to a different state and/or country.
With these 5 simple tips you won't have to worry about cyber breaches!
π«‘76π30π€£22β€5π4π€2π1π€©1
vx-underground
If you're a person who has been a victim of a data leak and/or company compromise we have tips on how to protect yourself. We know changing passwords can only go so far. If you're a noob and want some tips read below! 1. Change your full name. You need toβ¦
Oh, I forgot the 6th "step". This step is optional, but if all else fails you could commit suicide. If you're dead you'll be in 50% LESS breaches. Your identity will still be stolen, but without being online it'll happen less often (hopefully).
π38π€£24β€7π₯°3π₯2π1
vx-underground
Oh, I forgot the 6th "step". This step is optional, but if all else fails you could commit suicide. If you're dead you'll be in 50% LESS breaches. Your identity will still be stolen, but without being online it'll happen less often (hopefully).
For the autistic people, Germans, Australians, emotionally stunted, and old confused people: this is satire. Don't kill yourself.
π63π€£21π’8π€―7β€4β€βπ₯4π3π€3π«‘1