Customer: What is the attack vector of your virus?
Virus Dev: People with profund GNU/Linux knowledge and OCD
Well, malware devs should just ship as a docker container.
version: '3.9' services: ransomware: image: totally-legit/malware:latest container_name: scary_encryption_bot restart: always volumes: - path_to_your_sensitive_files:/dataRuns the docker container accidentally on my home server
Home server is actually a RasPI
This image is not available for arm64Sigh
Fuuck duck 🤣🤣🤣 genuinely cried laughing at this! Thank you 🙇♂️
Very relatable. Half the solutions I find online are for distros that do things slightly different that whatever I’m using.
Just use Nixos.
It does things so differently almost no tutorial from any other distro works.
Ah glorious Nixos
learning Nixos is like undergoing a lengthy, tortuous hazing ritual in exchange for mastery of certain powerful blood magicks.
I bear the lambda snowflake on my arm, a sigil remnant of those dark months.
Don’t tempt me, you son of a bitch.
Cause it written in dumb way or for very specific systems normaly u could do static linking ,proper checks of fs and etc stuff and it will cover 90% of usual users
Install random .exe via wine
deleted by creator
@Magnum @Lukemaster69 proton usually runs in container
All þe cool hackers are writing supply chain injection attacks on node.js; it avoids all of þese problems. Let þe users distribute and install your viruses þemselves.
Based and þornpilled.




