GitHub
github.com › vxunderground › MalwareSourceCode
GitHub - vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of different programming languages. · GitHub
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Starred by 17.9K users
Forked by 2K users
Languages Assembly 91.6% | Limbo 2.2% | C 2.0% | Roff 1.3% | Eiffel 0.3% | Lex 0.3%
Factsheet
Founded May 2019
URL vx-underground.org
Founded May 2019
URL vx-underground.org
Wikipedia
en.wikipedia.org › wiki › Vx-underground
vx-underground - Wikipedia
December 20, 2025 - vx-underground, also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware. The site was launched in May, 2019 and has grown to host over 35 million pieces of malware samples.
Vx Underground
vx-underground.org
Vx Underground
The largest collection of malware source code, samples, and papers on the internet.
GitHub
github.com › vxunderground › VX-API
GitHub - vxunderground/VX-API: Collection of various malicious functionality to aid in malware development · GitHub
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Starred by 1.8K users
Forked by 313 users
Languages C++ 82.1% | C 17.9%
Bakerstreetforensics
bakerstreetforensics.com › tag › vx-underground
VX-Underground – Baker Street Forensics
We can utilize a Python script to recursively go through the contents of our malware folder and unzip all the password protected files, while keeping those files in their original directories. You may have noticed in the first screenshot that I have a script called ExtractSamples.py in my APT directory. We will use this for the recursive password protected extractions. ... A flurry of code goes by, and you congratulate yourself on you Python prowess. Now if we look again at our contents, we’ve got the extracted sample and the original zip file.
GitHub
github.com › vxunderground
vxunderground - Overview
The largest collection of malware source code, samples, and papers on the internet. ... Contact GitHub support about this user’s behavior. Learn more about reporting abuse. Report abuse ... Collection of malware source code for a variety of platforms in an array of different programming languages. ... Research code & papers from members of vx-underground...
Qualys
blog.qualys.com › vulnerabilities-threat-research › 2023 › 11 › 23 › unveiling-the-deceptive-dance-phobos-ransomware-masquerading-as-vx-underground
Phobos Ransomware Masquerades as VX-Underground | Qualys
November 23, 2023 - Fig 1. vx-underground · AntiRecuvaAndDB.exe (763b04ef2d0954c7ecf394249665bcd71eeafebc3a66a27b010f558fd59dbdeb) The sample is being distributed with a masqueraded name (AntiRecuvaAndDB.exe) of a legitimate software suite known as Recuva, which is a very popular data recovery software. This file name has been used multiple times in the past by threat actors to distribute malware samples and has recently been seen to be abused by the Phobos ransomware family.
Reddit
reddit.com › r/malware › vx-underground is now selling physical copies of their archive!
r/Malware on Reddit: VX-Underground is now selling Physical Copies of their archive!
November 10, 2023 -
Whats included?
37,745 APT papers and samples
7,147 archived materials (papers, old software, malware builders)
11,460 malware papers
36,000,000+ malware samples (5.06TB)
3,197 malware source code(s) file(s)
$500 (this includes shipping)
Handwritten thank you letter
10TB Seagate external HDD
Worldwide shipping
Delivery times vary (location, queue, ???)
https://www.vx-underwear.org/products/vx-underground-collection-hdd
X
x.com › vxunderground › status › 1828185264881045557
vx-underground on X: "We've updated the vx-underground Malware Ingestion feed. All ingested malware samples from May, June, and July are now present and available for bulk download. *All samples named appropriately via VirusTotal API. May, 2024: - 90.3GB (compressed) - 358,067 malware samples June," / X
May, 2024: - 90.3GB (compressed) - 358,067 malware samples June, 2024: - 118.3GB (compressed) - 354,248 malware samples July, 2024: - 103.4GB (compressed) - 379,219 malware samples August, 2024 (1st - 16th) - 416GB (uncompressed) - 668,422 malware ...
X
x.com › vxunderground › status › 1634583543224442881
vx-underground on X: "We've archived the vx-underground APT collection for the year 2022. You can now download every APT sample and paper from the year 2022 in bulk. - 4,848 malware samples - 480 papers - 6.47GB (compressed) Check it out here: https://t.co/r8qKRpQzXs https://t.co/9KrfPeOEZ4" / X
We've archived the vx-underground APT collection for the year 2022. You can now download every APT sample and paper from the year 2022 in bulk. - 4,848 malware samples - 480 papers - 6.47GB (compressed) Check it out here: https://samples.vx-underground.org/samples/Blocks/APT Collection/…
GitHub
github.com › RXHem › vxunderground
GitHub - RXHem/vxunderground: Collection of malware source code for a variety of platforms in an array of different programming languages.
managed by vx-underground | follow us on Twitter | download malware samples at the VXUG/samples page
Author RXHem
BleepingComputer
bleepingcomputer.com › home › news › security › vx-underground malware collective framed by phobos ransomware
VX-Underground malware collective framed by Phobos ransomware
November 20, 2023 - However, that does not mean it is not a big operation, as it sees wide distribution through many affiliated threat actors and accounts for 4% of all submissions to the ID Ransomware service in 2023. Phobos submissions to ID Ransomware over the past month Source: ID Ransomware · Today, ransomware hunter PCrisk found a new variant of the Phobos ransomware that attempts to frame the VX-Underground community. When encrypting files, the malware will append the .id[[unique_id].[staff@vx-underground.org].VXUG string, with the email being legitimate and the final extension 'VXUG,' standing for VX-Underground.
Stairwell
stairwell.com › resources › quick-n-dirty-detection-research-building-a-labeled-malware-corpus-for-yara-testing
Quick n’ dirty detection: Building a labeled malware corpus for YARA testing — Stairwell
June 10, 2025 - With a quick check to the corpus, we can see a variety of malware families, operations, campaigns that have used API hashing with crc32, and we can pick and choose which ones we examine for more specific bit and byte details. steve@CEO-MBP ~ % yara -r apihashing_crc32.yar /vx-underground.org/APTs Methodology_APIHashing_crc32 /vx-underground.org/APTs/2015/2015.10.15 Fin Fishers/Samples/e2ecf89a49c125e0b4292645a41b5e97c0f7bf15d418faeac0d592205f083119 Methodology_APIHashing_crc32 /vx-underground.org/APTs/2015/2015.10.15 Fin Fishers/Samples/94abf6df38f26530da2864d80e1a0b7cdfce63fd27b142993b89c52b3