When I first made vx-underground in May, 2019, one of the first people to discover the site was a person named "Santa". They messaged me and said they liked my website.
Approx. once a year "Santa" says Hello to me.
No idea who they are
Approx. once a year "Santa" says Hello to me.
No idea who they are
❤194🥰32❤🔥25🫡12👍8🔥6😎4😢1
Someone has done an excellent job collecting RATs and documenting them by version. They also included images.
A+ work. This is amazing (we're going to ingest this eventually)
https://github.com/Cryakl/Ultimate-RAT-Collection
A+ work. This is amazing (we're going to ingest this eventually)
https://github.com/Cryakl/Ultimate-RAT-Collection
GitHub
GitHub - Cryakl/Ultimate-RAT-Collection: For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders…
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots. - Cryakl/Ultimate-RAT-Collection
❤91😎16👏9👍7😱3🔥2😢1
vx-underground
Someone has done an excellent job collecting RATs and documenting them by version. They also included images. A+ work. This is amazing (we're going to ingest this eventually) https://github.com/Cryakl/Ultimate-RAT-Collection
Holy cow, this dude is cookin'. How do we hire this guy?
https://github.com/Cryakl/Ransomware-Database
https://github.com/Cryakl/Ransomware-Database
GitHub
GitHub - Cryakl/Ransomware-Database: For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom…
For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes. - GitHub - Cryakl/Ransomware-Database: For educational purposes only, samples of ransomware/w...
🔥84🤩19🫡10❤5😎4🥰3😢1🎉1🤓1🤝1
Yesterday I became acquainted with a young and passionate person who, for the past 2 years, has been documenting RATs (images, versions, port usage), and ransomware payloads (images, notes, contact information).
They've documented 92 ransomware variants including (if applicable), their manuals, builders, etc.
They've documented 474 RATs variants including (if applicable), their version history, builders, source code, manuals, etc.
When I spoke with them they shared they've discovered (through various means) hundreds, possibly thousands, of other malware builders from various countries dating back nearly 2 decades. They've been slowly reviewing them all and documenting them by themselves.
Interestingly, as our staff is limited on resources, having family issues, or having new family members introduced, we suddenly discovered a young and passionate person who has been working tirelessly for 2 years without much recognition.
When one door closes, another door opens.
Chat, we may have a new staff member
VXUG 🤝Cryakl
They've documented 92 ransomware variants including (if applicable), their manuals, builders, etc.
They've documented 474 RATs variants including (if applicable), their version history, builders, source code, manuals, etc.
When I spoke with them they shared they've discovered (through various means) hundreds, possibly thousands, of other malware builders from various countries dating back nearly 2 decades. They've been slowly reviewing them all and documenting them by themselves.
Interestingly, as our staff is limited on resources, having family issues, or having new family members introduced, we suddenly discovered a young and passionate person who has been working tirelessly for 2 years without much recognition.
When one door closes, another door opens.
Chat, we may have a new staff member
VXUG 🤝Cryakl
🔥300❤59🤯15😇9❤🔥7👍6👏5🤝4🥰2😢1
vx-underground
Yesterday I became acquainted with a young and passionate person who, for the past 2 years, has been documenting RATs (images, versions, port usage), and ransomware payloads (images, notes, contact information). They've documented 92 ransomware variants…
GitHub
Cryakl - Overview
Take care and don't execute any samples on your main machine. The last thing I want is any lasting damage done to any PC. Not associated with Cryakl ransomware. - Cryakl
❤🔥128🔥34👏7❤5👍4🎉4😁3😇2🤝2🥰1😢1
When you see someone on social media discussing using AI to code it is your personal responsibility to encourage them. Tell them to "ignore the haters" and "keep it up!".
This will keep our cybersecurity pockets phat for generations to come.
This will keep our cybersecurity pockets phat for generations to come.
👍145❤🔥41😁34🫡23💯11🤣9❤4🔥2🤝2😢1
vx-underground
When you see someone on social media discussing using AI to code it is your personal responsibility to encourage them. Tell them to "ignore the haters" and "keep it up!". This will keep our cybersecurity pockets phat for generations to come.
Is this ethical? Probably not. Is it cool and badass? Yes.
💯117😎19👏7🤝6😁4👍2❤1😢1
Hi,
We've added 497 malware builders (even some old school), including some which target Android devices. Each directory now includes images of the malware builder as a 'preview'.
Some builders have been removed so we can ensure they're legitimate.
Thanks to Cryakl 🤝
We've added 497 malware builders (even some old school), including some which target Android devices. Each directory now includes images of the malware builder as a 'preview'.
Some builders have been removed so we can ensure they're legitimate.
Thanks to Cryakl 🤝
❤99❤🔥30🤓11🔥5👍3👏2🫡2😢1
vx-underground
Hi, We've added 497 malware builders (even some old school), including some which target Android devices. Each directory now includes images of the malware builder as a 'preview'. Some builders have been removed so we can ensure they're legitimate. Thanks…
Honestly, Sliver, NightHawk, Havoc, Cobalt Strike, you need to take notes.
Do your tools even look cool and badass like this?
Do your tools even look cool and badass like this?
❤129❤🔥39🤣34🔥10🫡6🤓5👍2👏2😢1
Connor Moucka a/k/a Waifu, the Canadian believed to be responsible for the Snowflake compromise, has consented to extradition to the United States.
We can't recall a time a suspected Threat Actor consented to extradition to the United States.
https://cyberscoop.com/connor-moucka-snowflake-hacker-extradition-us/
We can't recall a time a suspected Threat Actor consented to extradition to the United States.
https://cyberscoop.com/connor-moucka-snowflake-hacker-extradition-us/
CyberScoop
Canadian citizen allegedly involved in Snowflake attacks consents to extradition to US
Connor Moucka, a 26-year-old arrested at the behest of U.S. authorities in October in Kitchener, Ontario, faces 20 federal charges.
🤣71😱18🙏4👍2❤1😢1
This media is not supported in your browser
VIEW IN TELEGRAM
Arkana ransomware group claims to have compromised an Internet Service Provider in California.
They were even nice enough to put together a music video montage illustrating the level of access they possess.
They were even nice enough to put together a music video montage illustrating the level of access they possess.
🤣156😎32🤓5❤4👍4🤯2😱2😢1