GitHub exploit user calls their payload virus
GitHub exploit user calls their payload virus
Had this user try to do a PR on my webbian
project in hopes of an auto-accept. They literally have a repo called virus
. Reported, of course, but found it funny.
11
comments
28 0 Reply... rm -rf /sdacrd/androind ...
I don't even think this guy tested his own virus lol
30 0 Replymaybe it was all crappy and obvious on purpose, to prove how easy it could be
2 0 Reply
I suspect that's not the actual payload , the
anggur-
repo appears to be more suspicious , might try to analyse that4 0 Replyhere is the extracted payload : https://gist.github.com/MinekPo1/af9bfd787c35ea5ff8b22165e9a05a6d
2 0 Replythe other mentioned repo has the same payload soooo
2 0 ReplyHaha, in the past IRC was the way to control puppets, now it seems Telegram is the way. 😅
0 0 Reply
You've viewed 11 comments.
Scroll to top