> make post about trying to contact Tren De Aragua
> get DMs
> "Uhhh hey, Smelly. TdA is very dangerous. I really don't think you should get involved with them
Bro, you think I'd actually try to contact them? They fucking murder people.
Also, I don't judge a book by it's cover, okay? I don't wanna sound like a hater but these individuals do not look friendly and I have a feeling they won't like my cat pictures
> get DMs
> "Uhhh hey, Smelly. TdA is very dangerous. I really don't think you should get involved with them
Bro, you think I'd actually try to contact them? They fucking murder people.
Also, I don't judge a book by it's cover, okay? I don't wanna sound like a hater but these individuals do not look friendly and I have a feeling they won't like my cat pictures
π58π€£48π19π«‘13π’7π₯°5β€3π2β€βπ₯1π₯1π€1
vx-underground
On Monday someone sent me a URL to a website trying to do click-fix targeting MacOS. I missed the message because the X DM system is a broken piece of shit. The website is 100% malicious, but the final C2 part is dead. Staging payload still works. I MISSEDβ¦
Here is your free MacOS malware delivering using something akin to click fix and masquerading: mac-faster[.]com/app1/
The 'download' script does a CURL on ballfrank-dot-space
It delivers an obfuscated payload.
Deobfuscated: https://pastebin.com/PCz1cxMU
The 'download' script does a CURL on ballfrank-dot-space
It delivers an obfuscated payload.
Deobfuscated: https://pastebin.com/PCz1cxMU
Pastebin
Pastebin.com - Locked Paste
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
π€―45π₯16π₯°9β€6π€£3π’1
Chat, we've got FREE MACOS malware. Big news for malware nerds
https://malwaresourcecode.com/home/my-projects/write-ups/free-macos-malware-for-everyone-hurry-up-before-google-patches-it
https://malwaresourcecode.com/home/my-projects/write-ups/free-macos-malware-for-everyone-hurry-up-before-google-patches-it
Malwaresourcecode
Free MacOS malware for everyone! Hurry up before Google patches it! | malware source code
π€―44π18π₯9β€3π₯°3
This media is not supported in your browser
VIEW IN TELEGRAM
Wow, wrestling has changed A LOT since I was a kid
β€78π€£24π’16π₯°9π€―6π€6π₯4π4
Media is too big
VIEW IN TELEGRAM
Who is this man and why does he speak in silly voices
π€£90β€12π₯°8π3π₯2π’2
Epstein files were released by the Department of Justice today.
So many people tried to view it at once the DoJ had to implement anti-DDoS measures.
The amount of data they've released is INSANE.
So many people tried to view it at once the DoJ had to implement anti-DDoS measures.
The amount of data they've released is INSANE.
π₯70π€£38β€5π₯°5π1π’1
vx-underground
Epstein files were released by the Department of Justice today. So many people tried to view it at once the DoJ had to implement anti-DDoS measures. The amount of data they've released is INSANE.
I'm uploading them to vx-underground if you don't feel like dealing with the DoJ. It's on vx-underground under /tmp/ and named DataSet1,2,3,4
Crime scene evidence:
Crime scene evidence:
π59β€22π₯°16π₯4π«‘2π’1
Behold my magnum opus. Here is my malware analysis paper collection
Papers:
2006 - 2 papers
2007 - 6 papers
2008 - 4 papers
2009 - 15 papers
2010 - 46 papers
2011 - 60 papers
2012 - 127 papers
2013 - 140 papers
2014 - 170 papers
2015 - 355 papers
2016 - 480 papers
2017 - 793 papers
2018 - 801 papers
2019 - 1056 papers
2020 - 1989 papers
2021 - 2634 papers
2022 - 2607 papers
2023 - 1450 papers
2024 - 1153 papers
2025 - 800 papers
Don't you EVER ask "whAts A GooD pLaCe To LeaRn MaLwaRe aNalYsiS?". I've got 14,869 malware analysis papers curated and organized. Most the papers have the samples with them too.
It's the muthafuckin' library of Alexandria for malware. This shit took half a decade.
Papers:
2006 - 2 papers
2007 - 6 papers
2008 - 4 papers
2009 - 15 papers
2010 - 46 papers
2011 - 60 papers
2012 - 127 papers
2013 - 140 papers
2014 - 170 papers
2015 - 355 papers
2016 - 480 papers
2017 - 793 papers
2018 - 801 papers
2019 - 1056 papers
2020 - 1989 papers
2021 - 2634 papers
2022 - 2607 papers
2023 - 1450 papers
2024 - 1153 papers
2025 - 800 papers
Don't you EVER ask "whAts A GooD pLaCe To LeaRn MaLwaRe aNalYsiS?". I've got 14,869 malware analysis papers curated and organized. Most the papers have the samples with them too.
It's the muthafuckin' library of Alexandria for malware. This shit took half a decade.
β€142π€―21β€βπ₯5π5π₯°2π’2
Hello,
The year is coming to a conclusion. Thank you everyone for another wonderful year.
Once the next round of giveaways finish I'll probably be AFK-ish. I am extremely fatigued from work and life. I'm not sure if it's possible, but I would like to be able to nap somewhere between 240 to 480 hours.
Thank you everyone for the fun times and sticking with me while I deal with a vx-underground and a newborn baby. I wholeheartedly appreciate all the kind words and support all of you have shown me. Many of you are great, caring, and compassionate people.
I have some good news and some neutral news. The good news is that I have completed (within reason) collecting every easily discoverable malware analysis paper on the internet. Yes, of course one or two may be missing here or there, but I feel like 14,000 papers over the time span of 2 decades is pretty good.
The neutral news is that moving forward vx-underground will primarily be keeping up to date on things. This isn't necessarily good or bad, but this means updates to vx-underground will be significantly smaller and fewer.
Truthfully, I'm not sure what to do anymore. I started the website with the goal of collecting malware source code, samples, and papers. I've collected 34TB (if decompressed) over 6.5 years. I feel like it would be a betrayal to my audience to continually make silly posts all day, everyday.
I sort of worked myself out of a job, I don't know.
The year is coming to a conclusion. Thank you everyone for another wonderful year.
Once the next round of giveaways finish I'll probably be AFK-ish. I am extremely fatigued from work and life. I'm not sure if it's possible, but I would like to be able to nap somewhere between 240 to 480 hours.
Thank you everyone for the fun times and sticking with me while I deal with a vx-underground and a newborn baby. I wholeheartedly appreciate all the kind words and support all of you have shown me. Many of you are great, caring, and compassionate people.
I have some good news and some neutral news. The good news is that I have completed (within reason) collecting every easily discoverable malware analysis paper on the internet. Yes, of course one or two may be missing here or there, but I feel like 14,000 papers over the time span of 2 decades is pretty good.
The neutral news is that moving forward vx-underground will primarily be keeping up to date on things. This isn't necessarily good or bad, but this means updates to vx-underground will be significantly smaller and fewer.
Truthfully, I'm not sure what to do anymore. I started the website with the goal of collecting malware source code, samples, and papers. I've collected 34TB (if decompressed) over 6.5 years. I feel like it would be a betrayal to my audience to continually make silly posts all day, everyday.
I sort of worked myself out of a job, I don't know.
β€120π«‘28π’14π₯°10π€3β€βπ₯2π―2
The same day the United States Department of Justice partially released details on the Jeffrey Epstein case, the Department of Justice released a few other interesting press releases.
Three of the press releases fall into our domain of cybersecurity, the remainder are related to narcotics or illegal immigration.
There is some speculation however that the large volume of press releases unveiled at the same time were intended to be a distraction from the Epstein file disclosure. However, this is just speculative.
What is not speculative however is the modifications made to the United States Department of Justice Epstein file releases.
Since the release of the files, several files have been removed from the release. People reviewing the files noted that the files redacted contained images of the current United States President.
Some individuals online asserted these statements are false and the United States Department of Justice has made no changes to the Epstein file release. However, what people seem to forget is that the internet does not forget.
After the release of the Epstein files the Department of Justice website implemented a queueing feature to prevent accidental DoS. During this time I archived the Epstein file releases so people interested did not have to wait in line.
Guess who has the original releases which contains data which is now removed? It's on vx-underground under /tmp/, it's listed as DataSet1, DataSet2, DataSet3, and DataSet4. Feel free to compare these raw datasets to the new ones.
Three of the press releases fall into our domain of cybersecurity, the remainder are related to narcotics or illegal immigration.
There is some speculation however that the large volume of press releases unveiled at the same time were intended to be a distraction from the Epstein file disclosure. However, this is just speculative.
What is not speculative however is the modifications made to the United States Department of Justice Epstein file releases.
Since the release of the files, several files have been removed from the release. People reviewing the files noted that the files redacted contained images of the current United States President.
Some individuals online asserted these statements are false and the United States Department of Justice has made no changes to the Epstein file release. However, what people seem to forget is that the internet does not forget.
After the release of the Epstein files the Department of Justice website implemented a queueing feature to prevent accidental DoS. During this time I archived the Epstein file releases so people interested did not have to wait in line.
Guess who has the original releases which contains data which is now removed? It's on vx-underground under /tmp/, it's listed as DataSet1, DataSet2, DataSet3, and DataSet4. Feel free to compare these raw datasets to the new ones.
β€90π16π₯°13π€£9π2
vx-underground
The same day the United States Department of Justice partially released details on the Jeffrey Epstein case, the Department of Justice released a few other interesting press releases. Three of the press releases fall into our domain of cybersecurity, theβ¦
Why Donald Trump was removed from the Epstein data release is purely speculative. Based on the nature of the case I believe most reviewers were infer something profoundly nefarious.
It's up to you to decide.
The entire case has drawn international attention and will continue to draw international attention for quite a bit of time. We are living in an extremely significant moment in history which will likely be studied closely in the future.
When your children age and ask you, "Mommy, Daddy, do you remember the Jeffrey Epstein case?". You can proudly respond: "Yes, we used primitive AI to make memes about it to minimize how traumatic and unjust the world is. Now stop asking too many questions before the government turns off your NeuroLink chip"
It's up to you to decide.
The entire case has drawn international attention and will continue to draw international attention for quite a bit of time. We are living in an extremely significant moment in history which will likely be studied closely in the future.
When your children age and ask you, "Mommy, Daddy, do you remember the Jeffrey Epstein case?". You can proudly respond: "Yes, we used primitive AI to make memes about it to minimize how traumatic and unjust the world is. Now stop asking too many questions before the government turns off your NeuroLink chip"
π€£105π₯16π₯°9β€5π’3π―3π2
vx-underground
> be me > spend 3 days working on proof-of-concept > doesnt work > have to try different way
I didn't read documentation close enough. I thought I was galaxy brain (I wasn't galaxy brain).
Basically, I wanted to make a WinRT / Windows COM malware proof-of-concept that only executes when the machine is locked. When it is unlocked the malware stops executing. I've done this before very easily with my "Fever Dream" code snippet (I named it Fever Dream because I was very sick when I wrote it).
Anyway, I have a very small brain and wasted A LOT of time on something I should have noticed way earlier.
The formatting is really messed up. I'm not sure why Pastebin cooked the formatting. Whatever, here is a really shitty proof-of-concept. The code DOES WORK when the user logs out then logs back in. However, if the user logs out the code won't work anyway unless it is running as a service.
https://pastebin.com/raw/L752XNTV
Basically, I wanted to make a WinRT / Windows COM malware proof-of-concept that only executes when the machine is locked. When it is unlocked the malware stops executing. I've done this before very easily with my "Fever Dream" code snippet (I named it Fever Dream because I was very sick when I wrote it).
Anyway, I have a very small brain and wasted A LOT of time on something I should have noticed way earlier.
The formatting is really messed up. I'm not sure why Pastebin cooked the formatting. Whatever, here is a really shitty proof-of-concept. The code DOES WORK when the user logs out then logs back in. However, if the user logs out the code won't work anyway unless it is running as a service.
https://pastebin.com/raw/L752XNTV
π«‘49π₯°9β€5π₯4
vx-underground
I didn't read documentation close enough. I thought I was galaxy brain (I wasn't galaxy brain). Basically, I wanted to make a WinRT / Windows COM malware proof-of-concept that only executes when the machine is locked. When it is unlocked the malware stopsβ¦
tl;dr wasted 3 days because didnt read documentation
π37π’17π€£10π«‘7π₯°5β€1π€―1π±1π€1
Coinbase has historically has received heavy criticism for failing to protect users for scammers and Insider Threats.
Friday, December 19th, 2025, Coinbase released a statement alongside the Office of the Brooklyn District Attorney Eric Gonzalez, and his Virtual Currency Unit, the indictment of 23-year-old Ronald Spektor of Brooklyn, New York, United States.
Ronald Spektor a/k/a "lolimfeelingevil", "I'm feeling Evil", allegedly impersonated Coinbase staff and scammed users out of an estimated $16,000,000. He deceived victims utilizing fictitious emails, text messages, phone calls, or fake websites.
Mr. Spektor, per court documents, was partially identified due to himself boasting on Telegram about his theft. He was particularly vocal on his Telegram channel, "Blockchain Enemies".
Court records indicate Mr. Spektor resides with his Father and a good portion of the money stolen was spent on online gambling. However, $105,000 in cash was seized and $400,000 in cryptocurrency was seized.
Mr. Spektor has been charged with:
- First-degree grand larceny (PL Β§155.42)
- First-degree money laundering (PL Β§470.20)
- Scheme to defraud (likely first degree, PL Β§190.65)
Additionally, per documents which state Mr. Spektor is facing other "related charges", Mr. Spektor may be facing
- Falsifying business records
- Criminal possession of stolen property
- Identity theft
Based on the charges brought forth, Mr. Spektor is facing over 30 years in prison. However, it should be noted that the current judicial system in the United States often does not do maximum penalties unless someone is a repeat offender.
Mr. Spektor being a first time offender, and assuming he takes a plea deal, is more likely to receive 12 years in prison with a required 85% time served. If Mr. Spektor decides to take the case before a jury and proclaim his innocence, and he is found guilty, he faces 15 - 20 years in prison.
In simplest terms, if Mr. Spektor "snitches" and behaves, he will serve 10 years in prison and be released sometime in 2036.
If he tries to fight the case and is found guilty, he will face 15 - 20 years, but with good behavior could be released somewhere between 2038 - 2043.
Coinbase CEO Brian Armstrong, alongside the Brooklyn District Attorney Eric Gonzalez, released a mugshot of "lolimfeelingevil" a/k/a Ronald Spektor
Friday, December 19th, 2025, Coinbase released a statement alongside the Office of the Brooklyn District Attorney Eric Gonzalez, and his Virtual Currency Unit, the indictment of 23-year-old Ronald Spektor of Brooklyn, New York, United States.
Ronald Spektor a/k/a "lolimfeelingevil", "I'm feeling Evil", allegedly impersonated Coinbase staff and scammed users out of an estimated $16,000,000. He deceived victims utilizing fictitious emails, text messages, phone calls, or fake websites.
Mr. Spektor, per court documents, was partially identified due to himself boasting on Telegram about his theft. He was particularly vocal on his Telegram channel, "Blockchain Enemies".
Court records indicate Mr. Spektor resides with his Father and a good portion of the money stolen was spent on online gambling. However, $105,000 in cash was seized and $400,000 in cryptocurrency was seized.
Mr. Spektor has been charged with:
- First-degree grand larceny (PL Β§155.42)
- First-degree money laundering (PL Β§470.20)
- Scheme to defraud (likely first degree, PL Β§190.65)
Additionally, per documents which state Mr. Spektor is facing other "related charges", Mr. Spektor may be facing
- Falsifying business records
- Criminal possession of stolen property
- Identity theft
Based on the charges brought forth, Mr. Spektor is facing over 30 years in prison. However, it should be noted that the current judicial system in the United States often does not do maximum penalties unless someone is a repeat offender.
Mr. Spektor being a first time offender, and assuming he takes a plea deal, is more likely to receive 12 years in prison with a required 85% time served. If Mr. Spektor decides to take the case before a jury and proclaim his innocence, and he is found guilty, he faces 15 - 20 years in prison.
In simplest terms, if Mr. Spektor "snitches" and behaves, he will serve 10 years in prison and be released sometime in 2036.
If he tries to fight the case and is found guilty, he will face 15 - 20 years, but with good behavior could be released somewhere between 2038 - 2043.
Coinbase CEO Brian Armstrong, alongside the Brooklyn District Attorney Eric Gonzalez, released a mugshot of "lolimfeelingevil" a/k/a Ronald Spektor
π€£51β€10π₯°7π’1