vx-underground (@vxunderground) 's Twitter Profile
vx-underground

@vxunderground

The largest collection of malware source code, samples, and papers on the internet.

Password: infected

ID: 1158139840866791424

linkhttps://vx-underground.org calendar_today04-08-2019 22:17:10

15,15K Tweet

352,352K Followers

245 Following

vx-underground (@vxunderground) 's Twitter Profile Photo

Since the FBI arrested that Chinese government hacker dude, do you think he'll be treated like any other criminal or do you think the CIA is going to beat his ass lmfao

vx-underground (@vxunderground) 's Twitter Profile Photo

Chat, I've got a LONG night shift ahead of me with the baby. If you're a noob, or something, and have questions about malware, comment it below. Or share a cat picture or share a cool Discord server you like that I can join -smelly

vx-underground (@vxunderground) 's Twitter Profile Photo

This is a great question because, as many of you have noticed, many reports will proclaim a malware payload or Threat Actor to be "highly sophisticated" when, in actuality, they're fairly generic and use recycled techniques. To be direct: it's entirely subjective. There have

vx-underground (@vxunderground) 's Twitter Profile Photo

Threat Actors care, but it depends on the type of malware and their "target audience" e.g. home user, enterprise, or other governments... Ultimately, it is impossible for malware to be undetected forever. Additionally, to make your code be undetectable is very strenuous work and

vx-underground (@vxunderground) 's Twitter Profile Photo

Nerds reaction if someone does ransomware: "whoa whoa whoa based" Nerds reaction if someone cheats in multiplayer video games: "fuck you, you're a piece of shit"