Collection of malware source code for a variety of platforms in an array of different programming languages.
Find a file
vxunderground 7e1607c8d7
Merge pull request #61 from omache/patch-1
Update HackTool.Python.Doxing.a
2022-09-29 01:55:49 -05:00
Android updates and additions 2022-08-09 16:38:46 -05:00
Engines Add files via upload 2021-02-03 01:30:18 -06:00
Java Add files via upload 2022-08-20 04:16:29 -05:00
Javascript Add files via upload 2021-09-04 01:12:34 -05:00
LegacyWindows push 2022-08-21 03:57:43 -05:00
Libs add 2022-08-21 06:30:49 -05:00
Linux updates and additions 2022-08-09 16:38:46 -05:00
MacOS updates and additions 2022-08-09 16:38:46 -05:00
MSDOS mov fix 2022-08-21 04:30:30 -05:00
Other additions 2022-08-07 02:16:25 -05:00
Panel mv 2022-08-22 11:02:58 -05:00
Perl Delete Virus.Perl.WhiteNoise.a 2020-11-14 01:41:00 -06:00
Phishing Add files via upload 2022-07-27 21:42:17 -05:00
PHP Delete Cythosia.7z 2020-11-03 00:02:03 -06:00
PointOfSales mov 2022-05-13 07:23:41 -05:00
Python Update HackTool.Python.Doxing.a 2022-09-20 12:08:15 +03:00
Ruby Delete Virus.Ruby.Badbunny.a 2020-10-17 15:48:45 -05:00
Win32 leak add 2022-09-15 02:16:57 -05:00
logo.png Changed the picture used for logo 2020-10-16 22:46:34 +02:00
README.md Update README.md 2022-09-15 06:54:01 -05:00

VXUG logo managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page

Liability Disclaimer:

To the maximum extent permitted by applicable law, vx-underground and/or affiliates who have submitted content to vx-underground, shall not be liable for any indirect, incidental, special, consequential or punitive damages, or any loss of profits or revenue, whether incurred directly or indirectly, or any loss of data, use, goodwill, or other intangible losses, resulting from (i) your access to this resource and/or inability to access this resource; (ii) any conduct or content of any third party referenced by this resource, including without limitation, any defamatory, offensive or illegal conduct or other users or third parties; (iii) any content obtained from this resource

Notes

All source code which is packaged may or may not be set with the password 'infected' (without the '). Individual files are likely not packaged. Please do not comment asking for the password - it was placed all over vx-underground.org and the official vx-underground Twitter account.

File structure

  • Android
    • Generic Android OS malware, some leaks and proof-of-concepts
  • Engines
    • BAT
    • Linux
    • VBS
    • Win32
  • Java
    • Some java infectors, proof-of-concept ransomware
  • Javascript
    • In-browser malware
  • Legacy Windows
    • Win2k
    • Win32
    • Win95
    • Win98
    • Win9x
    • WinCE
  • Libs (libraries)
    • Bootkits
    • DDoS proof-of-concepts
    • Win32 libraries (disassemblers, etc).
  • Linux
    • Backdoors
    • Botnets
    • Infectors
    • Mirai-Family (related and/or spin-offs)
    • Rootkits
    • Tools
    • Trojans
  • MSDOS
  • MSIL
  • MacOS
  • Other
    • Acad malware
    • FreeBSD malware
    • SunOS malware
    • Symbian OS malware
    • Discord-specific malware
  • PHP
    • Albania family
    • C99 family
    • Crewcorp family
    • Defacement Tools
    • PHP Infectors
    • Lanker family
    • Macker family
    • PhpSpy family
    • R57-shell family
  • Panel (web panel collections)
  • Perl
    • Various backdoors, hack tools, and infectors
  • Phishing
    • Collection of various phishing pages
  • Point of Sales malware
  • Python
    • Hacktools, various exotic-malware (such as chastity belt ransomware)
  • Ruby
  • Win32
    • Binders
    • Botnets
    • Crypters
    • Exploit kits
    • Infectors
    • Internet worms
    • Malware families
    • Ransomware
    • Rootkits
    • Stealers

Contributors

Marius 'f0wL' Genheimer
Jan 'Duchy' Neduchal
Eduardo P. Gomez
DartPower
Luca364
TheAnonHackUk
Bruce Ediger
Avv
Alan Wake