GitHub exploit user calls their payload virus
GitHub exploit user calls their payload virus
Had this user try to do a PR on my webbian
project in hopes of an auto-accept. They literally have a repo called virus
. Reported, of course, but found it funny.
You're viewing a single thread.
I suspect that's not the actual payload , the
anggur-
repo appears to be more suspicious , might try to analyse that4 0 Replyhere is the extracted payload : https://gist.github.com/MinekPo1/af9bfd787c35ea5ff8b22165e9a05a6d
2 0 Replythe other mentioned repo has the same payload soooo
2 0 Replyalso : https://github.com/Kingcy78/NEW/blob/main/1#L551-L570
high quality malware !
2 1 ReplyI can't help but wonder given the lewd imagery if the name kingcy is a play on "kinky"...
1 0 Replydoubt it , since they shorten their username to CY78 , for example on their youtube channel profile or in the vaguely lewd unicode art
1 0 Reply
Haha, in the past IRC was the way to control puppets, now it seems Telegram is the way. 😅
0 0 Reply