website about malware
VX Underground
vx-underground, also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware. The site was launched in May, 2019 and has … Wikipedia
Factsheet
Founded May 2019
URL vx-underground.org
Factsheet
Founded May 2019
URL vx-underground.org
🌐
Wikipedia
en.wikipedia.org › wiki › Vx-underground
vx-underground - Wikipedia
December 20, 2025 - vx-underground, also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware. The site was launched in May, 2019 and has grown to host over 35 million pieces of malware samples.
🌐
Vx Underground
vx-underground.org
Vx Underground
Malware Analysis · Papers · Samples · Updates · Supporting free access to knowledge · Toggle view mode · Archive · Art · Builders · Malware Analysis · Papers · Samples · Updates · 7 folders • 0 files ·
Discussions

VX-Underground is now selling Physical Copies of their archive!
Hopefully they make enough from this to help cover the donation interruption More on reddit.com
🌐 r/Malware
12
53
November 10, 2023
Where do malware analysts get their malware from?
Thanks to vx underground we have a complete backup from June 2024 on https://infocon.org in the mirrors directory. It’s available at a torrent as well, about 6+ TB in size. A great resource, thanks Smelly! More on reddit.com
🌐 r/cybersecurity
61
95
August 27, 2024
VX underground - empezando
Focus on what interests you and start building it out rather than focusing on reading papers. You will have no shortage of material to read when you are going through a detailed blog post and building something based on the information. It is really helpful to do, especially when source code is provided alongside the article so you can check your work or just play with it. You should always be using a VM and take advantage of the snapshot feature to roll back when you inevitably fuck something up (it happens to all of us). Your VM is your lab setting to test things without worrying about breaking your computer. Snapshots allow you to roll back if something breaks. FlareVM is what I use for MalDev on Windows. It really depends on your level of experience with a particular platform where you should start. Using Windows as an example, you would want to understand executable type files to learn the answer to questions such as: what are the file extensions that can execute code? what is an exe? what is a dll? how does an exe load dlls? what is a batch file and how does it work? what is a powershell script and how does it work? what other options do I have for scripting, downloading and executing code? What tooling exists on the OS that can be helpful such as: Cmd, Powershell mshta.exe -> what is an hta file and how does it work? Bonus: what is a chm file, what loads it, and how does it work? What executable files already exist (living off the land) that can initiate a download or decode base64 for me? (certutil, lolbins, lolbas) Where do things automatically start such as: Startup folder Scheduled tasks (like cron jobs) Registry CurrentVersion\Run key What the registry is and how it works: What is the difference between HKLM and HKCU? Where can I find the settings for a scheduled task? Where can I add/remove startup entries? Where can I see the settings for background services? When you understand stuff like this, it is much easier to build software to use those features to your advantage. You get this understanding through spending time using the OS and practicing what you learn about. Learning a technique without understanding the underlying functionality will limit you greatly, so it's important to learn how something works in the first place if you want to subvert and abuse it effectively. That's not to say you have to take a deep dive into OS internals to comprehend the important parts of an exploit, but you should have a grasp on how it works enough to give a rough overview if you were in a position to have to explain it. I strongly recommend MalDevAcademy and a somewhat related youtube channel called Cr0w Academy, as well as the discord linked in his video descriptions. Lsecqt is another solid youtube channel that is beginner-friendly and also has a Discord with some talented people in it. Vx-Underground has a Red Team Discord server that I pop into to answer questions from time to time, I do the same in the others I mentioned. None of these places have a shortage of idiots who get dismissed, ignored, or fucked with because they ask stupid questions. The best advice I can give you is to leverage the community with this caveat: the community will help you, but not if you ask stupid questions or are obviously trying to do blackhat shit like spreading or asking stuff like "How do I get past Defender?" with no other context. Do your research on a topic, learn about it, and ask based on that. The gist of being someone who always gets answers is not asking a question easily answered with a simple Google search or asking ChatGPT - instead use your searches and research as a jumping off point to ask a more targeted question. Most of the papers on Vx-Underground are intermediate to advanced if I had to put a label on them. You are better off with MalDevAcademy and the youtube channel resources I posted above. This is not really a beginner-friendly topic as a whole if you don't understand the OS you are attacking, so keep that in mind. You may want to consider looking into some blue team resources to gain a better understanding of the OS. TryHackMe is a decent resource for that and you can use the topics they cover to expand your knowledge beyond the course by Googling, using ChatGPT, or asking people in the community for more information about whatever the course covers. Thank you for coming to my TED talk. More on reddit.com
🌐 r/Malware
15
21
August 29, 2024
VX underground - getting started
Focus on what interests you and start building it out rather than focusing on reading papers. You will have no shortage of material to read when you are going through a detailed blog post and building something based on the information. It is really helpful to do, especially when source code is provided alongside the article so you can check your work or just play with it. You should always be using a VM and take advantage of the snapshot feature to roll back when you inevitably fuck something up (it happens to all of us). Your VM is your lab setting to test things without worrying about breaking your computer. Snapshots allow you to roll back if something breaks. FlareVM is what I use for MalDev on Windows. It really depends on your level of experience with a particular platform where you should start. Using Windows as an example, you would want to understand executable type files to learn the answer to questions such as: what are the file extensions that can execute code? what is an exe? what is a dll? how does an exe load dlls? what is a batch file and how does it work? what is a powershell script and how does it work? what other options do I have for scripting, downloading and executing code? What tooling exists on the OS that can be helpful such as: Cmd, Powershell mshta.exe -> what is an hta file and how does it work? Bonus: what is a chm file, what loads it, and how does it work? What executable files already exist (living off the land) that can initiate a download or decode base64 for me? (certutil, lolbins, lolbas) Where do things automatically start such as: Startup folder Scheduled tasks (like cron jobs) Registry CurrentVersion\Run key What the registry is and how it works: What is the difference between HKLM and HKCU? Where can I find the settings for a scheduled task? Where can I add/remove startup entries? Where can I see the settings for background services? When you understand stuff like this, it is much easier to build software to use those features to your advantage. You get this understanding through spending time using the OS and practicing what you learn about. Learning a technique without understanding the underlying functionality will limit you greatly, so it's important to learn how something works in the first place if you want to subvert and abuse it effectively. That's not to say you have to take a deep dive into OS internals to comprehend the important parts of an exploit, but you should have a grasp on how it works enough to give a rough overview if you were in a position to have to explain it. I strongly recommend MalDevAcademy and a somewhat related youtube channel called Cr0w Academy, as well as the discord linked in his video descriptions. Lsecqt is another solid youtube channel that is beginner-friendly and also has a Discord with some talented people in it. Vx-Underground has a Red Team Discord server that I pop into to answer questions from time to time, I do the same in the others I mentioned. None of these places have a shortage of idiots who get dismissed, ignored, or fucked with because they ask stupid questions. The best advice I can give you is to leverage the community with this caveat: the community will help you, but not if you ask stupid questions or are obviously trying to do blackhat shit like spreading or asking stuff like "How do I get past Defender?" with no other context. Do your research on a topic, learn about it, and ask based on that. The gist of being someone who always gets answers is not asking a question easily answered with a simple Google search or asking ChatGPT - instead use your searches and research as a jumping off point to ask a more targeted question. Most of the papers on Vx-Underground are intermediate to advanced if I had to put a label on them. You are better off with MalDevAcademy and the youtube channel resources I posted above. This is not really a beginner-friendly topic as a whole if you don't understand the OS you are attacking, so keep that in mind. You may want to consider looking into some blue team resources to gain a better understanding of the OS. TryHackMe is a decent resource for that and you can use the topics they cover to expand your knowledge beyond the course by Googling, using ChatGPT, or asking people in the community for more information about whatever the course covers. Thank you for coming to my TED talk. More on reddit.com
🌐 r/Malware
16
30
August 29, 2024
🌐
GitHub
github.com › vxunderground › MalwareSourceCode
GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of different programming languages. · GitHub
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Starred by 18K users
Forked by 2K users
Languages   Assembly 91.6% | Limbo 2.2% | C 2.0% | Roff 1.3% | Eiffel 0.3% | Lex 0.3%
🌐
GitHub
github.com › vxunderground › VX-API
GitHub - vxunderground/VX-API: Collection of various malicious functionality to aid in malware development · GitHub
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Starred by 1.9K users
Forked by 315 users
Languages   C++ 82.1% | C 17.9%
🌐
GitHub
github.com › vxunderground
vxunderground - Overview
The largest collection of malware source code, samples, and papers on the internet. ... Contact GitHub support about this user’s behavior. Learn more about reporting abuse. Report abuse ... Collection of malware source code for a variety of platforms in an array of different programming languages. ... Research code & papers from members of vx-underground...
🌐
X
x.com › vxunderground › status › 1811419930157265378
vx-underground on X: "The vx-underground malware families collection is temporarily available for bulk download. - 222GB (compressed) - 234GB (uncompressed) - 123,915 malware samples - 763 malware families - Password: infected For people who are unhappy with the download speed on https://t.co/F60KAJvXVJ" / X
- 222GB (compressed) - 234GB (uncompressed) - 123,915 malware samples - 763 malware families - Password: infected For people who are unhappy with the download speed on vx-underground: if you use a download manager, like Internet Download Manager ...
🌐
Bakerstreetforensics
bakerstreetforensics.com › tag › vx-underground
VX-Underground – Baker Street Forensics
February 1, 2024 - We can utilize a Python script to recursively go through the contents of our malware folder and unzip all the password protected files, while keeping those files in their original directories. You may have noticed in the first screenshot that I have a script called ExtractSamples.py in my APT directory. We will use this for the recursive password protected extractions. ... A flurry of code goes by, and you congratulate yourself on you Python prowess. Now if we look again at our contents, we’ve got the extracted sample and the original zip file.
🌐
Qualys
blog.qualys.com › vulnerabilities-threat-research › 2023 › 11 › 23 › unveiling-the-deceptive-dance-phobos-ransomware-masquerading-as-vx-underground
Phobos Ransomware Masquerades as VX-Underground | Qualys
February 24, 2026 - Fig 1. vx-underground · AntiRecuvaAndDB.exe (763b04ef2d0954c7ecf394249665bcd71eeafebc3a66a27b010f558fd59dbdeb) The sample is being distributed with a masqueraded name (AntiRecuvaAndDB.exe) of a legitimate software suite known as Recuva, which is a very popular data recovery software. This file name has been used multiple times in the past by threat actors to distribute malware ...
Find elsewhere
🌐
X
x.com › vxunderground › status › 1828185264881045557
vx-underground on X: "We've updated the vx-underground Malware Ingestion feed. All ingested malware samples from May, June, and July are now present and available for bulk download. *All samples named appropriately via VirusTotal API. May, 2024: - 90.3GB (compressed) - 358,067 malware samples June," / X
May, 2024: - 90.3GB (compressed) - 358,067 malware samples June, 2024: - 118.3GB (compressed) - 354,248 malware samples July, 2024: - 103.4GB (compressed) - 379,219 malware samples August, 2024 (1st - 16th) - 416GB (uncompressed) - 668,422 malware ...
🌐
Hugging Face
huggingface.co › VX-U
VX-U (vx-underground)
Welcome to vx-underground, the largest collection of malware source code, samples, and papers on the internet. vx-underground was created in May, 2019 by smelly. vx-underground was founded to act ...
🌐
The Record
therecord.media › how-vx-underground-is-building-a-hackers-dream-library
How vx-underground is building a hacker\'s dream library | The Record from Recorded Future News
May 9, 2023 - But over the last couple of years, ... collection of malware source code, samples, and papers on the internet," with about 35 million samples overall....
🌐
Zeltser
zeltser.com › malware-sample-sources
Free Malware Sample Sources for Researchers
December 18, 2025 - A curated list of free sources where malware researchers can obtain samples for analysis, including MalwareBazaar, Hybrid Analysis, VirusShare, and vx-underground. Most require registration, and researchers should take precautions to avoid infecting themselves.
🌐
Reddit
reddit.com › r/malware › vx-underground is now selling physical copies of their archive!
r/Malware on Reddit: VX-Underground is now selling Physical Copies of their archive!
November 10, 2023 -

Whats included?

  • 37,745 APT papers and samples

  • 7,147 archived materials (papers, old software, malware builders)

  • 11,460 malware papers

  • 36,000,000+ malware samples (5.06TB)

  • 3,197 malware source code(s) file(s)

  • $500 (this includes shipping)

  • Handwritten thank you letter

  • 10TB Seagate external HDD

  • Worldwide shipping

  • Delivery times vary (location, queue, ???)

https://www.vx-underwear.org/products/vx-underground-collection-hdd

🌐
SentinelOne
sentinelone.com › lp › vx-s1
Vx-Underground & SentinelOne Malware Research ...
February 13, 2025 - SentinelOne unifies AI-powered endpoint, cloud, identity, and data protection—enhanced by our Security Data Lake for seamless and efficient cybersecurity.
🌐
BleepingComputer
bleepingcomputer.com › home › news › security › vx-underground malware collective framed by phobos ransomware
VX-Underground malware collective framed by Phobos ransomware
November 20, 2023 - However, that does not mean it is not a big operation, as it sees wide distribution through many affiliated threat actors and accounts for 4% of all submissions to the ID Ransomware service in 2023. Phobos submissions to ID Ransomware over the past month Source: ID Ransomware · Today, ransomware hunter PCrisk found a new variant of the Phobos ransomware that attempts to frame the VX-Underground community. When encrypting files, the malware will append the .id[[unique_id].[staff@vx-underground.org].VXUG string, with the email being legitimate and the final extension 'VXUG,' standing for VX-Underground.
🌐
GitHub
github.com › vxunderground › MalwareSourceCode › blob › main › README.md
MalwareSourceCode/README.md at main · vxunderground/MalwareSourceCode
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Author   vxunderground
🌐
Vx Underground
vx-underground.org › malware_defense.html
vx-underground - Malware Defense
October 6, 2011 - Firm Says 2012-04-05 - Darkshell DDOS Botnet Evolves With Variants 2012-04-10 - OSX-Flashback.O sample + some domains 2012-04-12 - OSX-Flashback.K sample + Mac OS malware study set (30+ older samples) 2012-04-16 - Detailed Analysis Of Sykipot (Smartcard Proxy Variant) 2012-04-18 - DarkMegi rootkit - sample (distributed via Blackhole) 2012-04-20 - Analysis of DarkMegi aka NpcDark 2012-04-23 - BKDR_CYSXL.A 2012-05-28 - The Flame- Questions and Answers 2012-05-31 - Flamer- A Recipe for Bluetoothache 2012-06-04 - Small banking Trojan poses major risk 2012-06-05 - Smartcard vulnerabilities in modern banking malware 2012-06-06 - Tinba - Zusy - tiny banker trojan 2012-06-09 - You dirty RAT!
🌐
Privacy PC
privacy-pc.com › home › articles
VX - The Virus Underground - Privacy PC
September 1, 2022 - But what I want to say when I say we have many criminals: never forget we are talking about the VX scene which is not criminals. ... And what will the future be like? Interesting question. Actually, my crystal ball got broken today, but I guess I saw something like Bluetooth malware and mobile device malware in it.