'step 2: code the malware and prepare the attack. as of now the malware's encryption code, encryption key code and protonmail message is done, the code is now being wrapped with the gui or graphical user interface.
Gay, Gay Romance, No-Yiff, Story Progression, Tsociety, hacking
"now launch the malware," kit said as trent unloaded the malware and activated it to make sure they have admin access to their servers without them even realising it.
Gay, No-Yiff, Story Progression, Tsociety, hacking
"i've told the rest of tsociety to launch the ddos attacks to render the server useless while the malware is spreading, by the time they are finished with the ddos attack the malware would already be done" he said while driving off to a
Cuddling, Gay, Gay Romance, No-Yiff, Story Progression, Tsociety, hacking
#8 of tsociety profile database
profile: christopher cailin biton
skillset: metasploit framework use, android rooting and spyware, rootkit coding, remote access tools, sleight of hand, malware coding, cryptography, python coding, c coding, java coding, and
Profile, Tsociety
"sigh, screw it, i'm just going to use an online template" i said and looked online to get a template for coding malware and started to code the malware following a template on a website.
No-Yiff, Story Progression, Tsociety, hacking
Henro delivered a briefing stating that this was happening due to a malware infection, but every time anyone has conducted a post-mortem evaluation there has been no trace of any kind of malware! there is something seriously wrong happening here.
Disaster, Protogen, Sci-Fi, Science, bioengineering, research
"is the malware ready yet?" arron asked.
"almost, i just need to convert it to an executable with pyinstaller," trent said as he booted into debian which was what the servers would most likely run.
Gay, No-Yiff, Story Progression, Tsociety, hacking
Support: healing and buffing their allies is their bread and butter, and even though they are the weakest when it comes to direct combat, their virus/malware extermination abilities are above all the others.
Internet, cyber, manual