"WE TEACH OFFENSIVE SECURITY: MASTER THE DARK ARTS AND BECOME 1337 HACKER (except malware, malware is pure evil, a dark art that should not be taught)" β hacker courses
π68π38π€£21β€8π₯4β€βπ₯3π’3π―1π€1
We received this message on Telegram.
All of us are in our 30's, some are indeed closer to 40 years old. To put it into perspective, I've been coding for 19 years. Based on this message, there is a high probability I've been coding longer than they've been alive.
Β―\_(γ)_/Β―
All of us are in our 30's, some are indeed closer to 40 years old. To put it into perspective, I've been coding for 19 years. Based on this message, there is a high probability I've been coding longer than they've been alive.
Β―\_(γ)_/Β―
β€172π54π€£46π11π€9π―7β€βπ₯2π’2
vx-underground
We received this message on Telegram. All of us are in our 30's, some are indeed closer to 40 years old. To put it into perspective, I've been coding for 19 years. Based on this message, there is a high probability I've been coding longer than they've beenβ¦
We've been told several times our jokes are not funny and we come across as "depressed ass millennials". You're not wrong in that assessment, our sense of humor is (probably) outdated.
tl;dr we're aging, it shows in our humor π
tl;dr we're aging, it shows in our humor π
β€153π29π’10π―9π8π€3π±2π«‘2π€£1
back in the day, when i was in my late-teens/early-20s, instead of taking trash to the dumpster, i would just throw it in my apartment fireplace. every night i burned my trash. i just didnt wanna go outside
π€£91π₯29β€βπ₯5π1π€1π’1π1
Someone sent us this photo. Someone is impersonating us on Telegram (as is tradition).
We'd never call someone "patriot". We're not Facebook schizoboomers. Also, unironically, we initiate most our conversations with a photo of a kitty cat or say "ping".
We'd never call someone "patriot". We're not Facebook schizoboomers. Also, unironically, we initiate most our conversations with a photo of a kitty cat or say "ping".
π€£204β€βπ₯19π11π5π4π4β€2π’2π€2
No disrespect to the artistic nerds, but if you contact us via DM, or e-mail, or whatever β we're always down to potentially buy some artwork. But, we traditionally go with a 80's and/or 90's mall goth computer vibe.
Your gamer profile picture artwork doesn't fit with us.
Your gamer profile picture artwork doesn't fit with us.
π66β€βπ₯23π€£11β€5π3π’2π1
vx-underground
No disrespect to the artistic nerds, but if you contact us via DM, or e-mail, or whatever β we're always down to potentially buy some artwork. But, we traditionally go with a 80's and/or 90's mall goth computer vibe. Your gamer profile picture artwork doesn'tβ¦
We also aren't interested in furry artwork.
We appreciate the pitch and for you thinking of us. But uh, we're just not that group. Bring us some dark edgy retro stuff and we'll happily talk.
We appreciate the pitch and for you thinking of us. But uh, we're just not that group. Bring us some dark edgy retro stuff and we'll happily talk.
π’91π€£52π«‘35π₯18β€13π€8π€7π2π1π―1
Last week Qilin ransomware group hit a small time car dealership in the United States. They were like, "nah, that's not shitty and fucked up enough" and proceeded to ransom a cancer treatment center in Japan.
π₯25.1Kπ’100π€―11π€£9π€3π3π3β€2π2π€2π1
It's time we share some knowledge on the legality of malware in the United States.
We can't speak regarding other countries, but we've had a few recently (also, historically) who have questioned the legality of our website and what we do.
Note: we're not lawyers, but we've consulted with lawyers to make sure we don't do any oopsies
Possessing malware is not illegal. The United States CFAA (Computer Fraud and Abuse Act), which was codified to combat "hacking" or "illegal cyber activity", is vague and doesn't quantify modernized malware well.
1. Possessing, writing, researching, collecting, designing, discussing, archiving malware, etc is not a crime. It does not violate the CFAA. The actions described previously align with goals and ideologies of cyber security researchers, threat intelligence vendors, and students.
2. It IS ILLEGAL to intentionally design, develop, release, or "spread" malicious software with intent to harm others (financially, physically, etc). Additionally, it IS ILLEGAL to knowingly and (depending on context) unknowingly aid and/or abet a person or organization with the design, development, release, or "spread" of malicious software.
tl;dr it's an extremely grey area and you have to "walk the line" so you don't do a whoopsie and catch a felony.
Examples:
πTony thinks malware is cool. He collects it online. He password protects the malicious files. He encourages others to review them too.
πTony has friends who he suspects are committing cybercrime. They ask him to create infrastructure which can be used to house malware payloads. Tony isn't sure on their intent, but he does it anyway.
πTony likes malware research. He shares a cool proof-of-concept which he thinks may be challenging for security software to detect. He open sources it online and encourages collaboration from others.
πTony likes malware research. He develops a payload he thinks may be challenging for security software to detect. Tony goes online to shady forums and sells the code to people who may abuse it.
πTony receives tips and donations from people for his online malware stuff. People think he is doing cool stuff and want to support him.
πTony agrees to host potentially malicious software for others for a fee. He actively tries to hide the payment "paper trail" by accepting payments in Monero.
πTony goes onto social media to openly discuss on-going security threats. He discusses victims who may be impacted by a large and evolving security threat.
πTony is aware of a large and evolving security threat. Tony speaks privately with criminals and gives them hints and clues to help them hide their presence online.
We can't speak regarding other countries, but we've had a few recently (also, historically) who have questioned the legality of our website and what we do.
Note: we're not lawyers, but we've consulted with lawyers to make sure we don't do any oopsies
Possessing malware is not illegal. The United States CFAA (Computer Fraud and Abuse Act), which was codified to combat "hacking" or "illegal cyber activity", is vague and doesn't quantify modernized malware well.
1. Possessing, writing, researching, collecting, designing, discussing, archiving malware, etc is not a crime. It does not violate the CFAA. The actions described previously align with goals and ideologies of cyber security researchers, threat intelligence vendors, and students.
2. It IS ILLEGAL to intentionally design, develop, release, or "spread" malicious software with intent to harm others (financially, physically, etc). Additionally, it IS ILLEGAL to knowingly and (depending on context) unknowingly aid and/or abet a person or organization with the design, development, release, or "spread" of malicious software.
tl;dr it's an extremely grey area and you have to "walk the line" so you don't do a whoopsie and catch a felony.
Examples:
πTony thinks malware is cool. He collects it online. He password protects the malicious files. He encourages others to review them too.
πTony has friends who he suspects are committing cybercrime. They ask him to create infrastructure which can be used to house malware payloads. Tony isn't sure on their intent, but he does it anyway.
πTony likes malware research. He shares a cool proof-of-concept which he thinks may be challenging for security software to detect. He open sources it online and encourages collaboration from others.
πTony likes malware research. He develops a payload he thinks may be challenging for security software to detect. Tony goes online to shady forums and sells the code to people who may abuse it.
πTony receives tips and donations from people for his online malware stuff. People think he is doing cool stuff and want to support him.
πTony agrees to host potentially malicious software for others for a fee. He actively tries to hide the payment "paper trail" by accepting payments in Monero.
πTony goes onto social media to openly discuss on-going security threats. He discusses victims who may be impacted by a large and evolving security threat.
πTony is aware of a large and evolving security threat. Tony speaks privately with criminals and gives them hints and clues to help them hide their presence online.
β€126π€29π18π―11π«‘11π8β€βπ₯5π3π€£2π₯1π’1
vx-underground
It's time we share some knowledge on the legality of malware in the United States. We can't speak regarding other countries, but we've had a few recently (also, historically) who have questioned the legality of our website and what we do. Note: we're notβ¦
Malware is illegal and for nerds
π€110π70π€£40β€18π11π―8π±5π€4π₯3β€βπ₯2π€2
hot take: people with super fancy pc setups with super clean desks arent actually working
if your desk isnt covered in cigarette ash (or vape juice), deodorant sticks, broken electronics, old batteries, pill bottles, and energy drinks β wtf are you doing? browsing youtube?
if your desk isnt covered in cigarette ash (or vape juice), deodorant sticks, broken electronics, old batteries, pill bottles, and energy drinks β wtf are you doing? browsing youtube?
β€152π―38π₯18π15π12π€£11β€βπ₯9π€8π7π’1π1
vx-underground
hot take: people with super fancy pc setups with super clean desks arent actually working if your desk isnt covered in cigarette ash (or vape juice), deodorant sticks, broken electronics, old batteries, pill bottles, and energy drinks β wtf are you doing?β¦
current desk setup: old spice deodorant stick (gets hot af in office), broken smoke detector, broken xbox controller, a bunch of pill bottles, vitamin pills, vape coils, vape juice, wires (idk where they go), some lego parts, tape measure (idk why), lens cleaner, unopened mail
β€93π15π€9π6β€βπ₯5π₯5π€4π2π2π’1π1
I don't wanna get too political, but honestly we should treat 32bit ASM as historical, like 16bit ASM.
"It's 2025, show the kids r8 and r9", β 2pac, All Eyez On Me
"It's 2025, show the kids r8 and r9", β 2pac, All Eyez On Me
π82π―17π€15π7π4π₯3π’2π€2π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
The visual demonstration illustrating cyber security defense against ransomware
π€£137π«‘11π7β€5π2π€2π1π±1π’1