dark term definition definition source
0day A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who should be interested in mitigating the vulnerability (including the vendor of the target software). https://en.wikipedia.org/wiki/Zero-day_(computing)
a-squared A-squared Free is a useful safety tool that allows you to keep your computer safe against any kind of malware. https://a-squared-free.en.uptodown.com/windows
adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process. https://en.wikipedia.org/wiki/Adware
aircrack Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. https://en.wikipedia.org/wiki/Aircrack-ng
anti-sec Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of the hacking group LulzSec and Anonymous, and others inspired by the announcement of the operation.  https://en.wikipedia.org/wiki/Operation_AntiSec
autoit AutoIt is a freeware programming language for Microsoft Windows. In its earliest release, it was primarily intended to create automation scripts for Microsoft Windows programs but has since grown to include enhancements in both programming language design and overall functionality. https://en.wikipedia.org/wiki/AutoIt
backdoored A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. https://en.wikipedia.org/wiki/Backdoor_(computing)
bcos (Internet slang, text messaging) Abbreviation of because. https://en.wiktionary.org/wiki/bcos
bfbot Bf Bot Manager is software designed to help you automate your betting and trading at Betfair betting exchange. Bf Bot Manager allows you to run unlimited number of strategies/bots at the same time. You can have one strategy betting on favourites, second one trading on horse races, third one betting on tennis matches and several strategies betting on football events or tipster tips. https://betfair-datascientists.github.io/thirdPartyTools/BfBotManager/BfBotManager/
bhai Translated from hindi/gujarati (plus others) as brother. https://www.urbandictionary.com/define.php?term=bhai
bhw BlackHatWorld (BHW) is an internet forum focused on black-hat search engine optimization (SEO) techniques and services, often known as spamdexing. https://en.wikipedia.org/wiki/BlackHatWorld
blackhatworld BlackHatWorld (BHW) is an internet forum focused on black-hat search engine optimization (SEO) techniques and services, often known as spamdexing. https://en.wikipedia.org/wiki/BlackHatWorld
blackhole The Blackhole exploit kit is, as of 2012, the most prevalent web threat, where 29% of all web threats detected by Sophos and 91% by AVG are due to this exploit kit.[1] Its purpose is to deliver a malicious payload to a victim's computer. https://en.wikipedia.org/wiki/Blackhole_exploit_kit
blackshades Blackshades is a malicious trojan horse used by hackers to control infected computers remotely. https://en.wikipedia.org/wiki/Blackshades
booga A term of endearment https://www.urbandictionary.com/define.php?term=Booga
bootkit A bootkit is a type of malicious infection which targets the Master Boot Record located on the physical motherboard of the computer. Attaching malicious software in this manner can allow for a malicious program to be executed prior to the loading of the operating system. https://blog.malwarebytes.com/detections/bootkit/
botnet A botnet is a number of Internet-connected devices, each of which is running one or more bots. https://en.wikipedia.org/wiki/Botnet
bruteforcer BruteForcer is a client-server multithreaded application for bruteforce cracking passwords. http://bruteforcer.sourceforge.net/
bruter Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. https://sourceforge.net/projects/worawita/
btc Bitcoins. Online currency https://www.urbandictionary.com/define.php?term=BTC
c99 C99 is an informal name for ISO/IEC 9899:1999, a past version of the C programming language standard. https://en.wikipedia.org/wiki/C99
cat-quickheal Quick Heal Technologies Ltd, is an Indian cybersecurity software company headquartered in Pune, Maharashtra, India. https://en.wikipedia.org/wiki/Quick_Heal
cept Certified Expert Penetration Tester. Computer security professionals who specialize in the offensive, intrusive and evasive methods, techniques and strategies within the field. https://www.urbandictionary.com/define.php?term=CEPT
clamav Clam AntiVirus is a free software, cross-platform and open-source antivirus software toolkit able to detect many types of malicious software, including viruses. https://en.wikipedia.org/wiki/Clam_AntiVirus
codecanyon Discover 34956 Plugins, Code and Script for Bootstrap, Javascript, PHP, Wordpress, HTML5 and more. Save time, buy Code on CodeCanyon! https://codecanyon.net/
conficker Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems. https://whatis.techtarget.com/definition/Conficker
cpanel cPanel is the web hosting control panel, or software that facilitates the management of a web hosting server, developed by cPanel, L.L.C., an American corporation. https://en.wikipedia.org/wiki/CPanel
crypter A crypter is a type of software that can encrypt, obfuscate, and manipulate malware, to make it harder to detect by security programs. It is used by cybercriminals to create malware that can bypass security programs by presenting itself as a harmless program until it gets installed. https://www.trendmicro.com/vinfo/us/security/definition/crypter
cryptsy Cryptsy was an Internet startup operated by Project Investors, Inc. focusing on the exchange of Crypto-Currency commonly known as Bitcoin and it's derivatives. https://en.bitcoin.it/wiki/Cryptsy
cvv2 A card security code (CSC), card verification data (CVD), card verification number, card verification value (CVV), card verification value code, card verification code (CVC), verification code (V-code or V code), or signature panel code(SPC)[1] is a security feature for "card not present" payment card transactions instituted to reduce the incidence of credit card fraud. https://en.wikipedia.org/wiki/Card_security_code
cybergate CyberGate is one of many remote access tools (RATs) that allow users to control other connected computers remotely. https://www.pcrisk.com/removal-guides/15607-cybergate-rat
cyberghost CyberGhost is the best VPN service in 2020. With more than 6700 servers, it offers top privacy for all devices, Windows, iOS, Mac, Android, or Linux. https://www.cyberghostvpn.com/en_US/
darkode dark0de a.k.a. Darkode, is a cybercrime forum and black marketplace described by Europol as "the most prolific English-speaking cybercriminal forum to date". https://en.wikipedia.org/wiki/Dark0de
ddosing In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. https://en.wikipedia.org/wiki/Denial-of-service_attack
dilaudid Brand name for a strong opioid drug, called hydromorphone. Prescribed for severe pain. https://www.urbandictionary.com/define.php?term=dilaudid
doxing Doxing, or doxxing, is the Internet-based practice of researching and publicly broadcasting private or identifying information about an individual or organization. https://en.wikipedia.org/wiki/Doxing
droidjack DroidJack, originally referred to as SandoRAT by Symantec, is an Android trojan allegedly created by former Android app developers. https://www.cyber.nj.gov/threat-center/threat-profiles/trojan-variants/droidjack
dwolla Dwolla is a United States-only e-commerce company that provides an online payment system and mobile payments network. https://en.wikipedia.org/wiki/Dwolla
elcomsoft Founded in 1990, ElcomSoft Co. Ltd. is a developer of digital forensics tools. https://en.wikipedia.org/wiki/ElcomSoft
equivalentexchange People cannot gain anything without sacrificing something. You must present something of equal value in order to gain something. https://www.urbandictionary.com/define.php?term=equivalent%20exchange
eth0 eth0 is the first Ethernet interface. https://www.computerhope.com/unix/uifconfi.htm
ewhore eWhoring is the term used by offenders to refer to a social engineering technique where they imitate partners in virtual sexual encounters, asking victims for money in exchange for pictures, videos or even sexual-related conversations (also known as sexting). https://arxiv.org/pdf/1905.04576.pdf
f-secure F-Secure Corporation is a Finnish cyber security and privacy company based in Helsinki, Finland. https://en.wikipedia.org/wiki/F-Secure
fortinet Fortinet is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity products and services, such as firewalls, anti-virus, intrusion prevention and endpoint security. https://en.wikipedia.org/wiki/Fortinet
fpu A floating-point unit (FPU, colloquially a math coprocessor) is a part of a computer system specially designed to carry out operations on floating-point numbers. https://en.wikipedia.org/wiki/Floating-point_unit
ftw For the win, used as an expression of affirmation or strong approval. https://www.lexico.com/en/definition/ftw
fullz Fullz is slang for "full information," a term criminals who steal credit card information use to refer to a complete set of information on a fraud victim. https://www.investopedia.com/fullz-definition-4684000
gdp An acronym for "Grand Daddy Purps", a potent strain of marijuana popular in California. Praised quite often by the Bay Area rap scene. https://www.urbandictionary.com/define.php?term=GDP
gecko Gecko is an embeddable browser, developed as part of the Mozilla open source project and based on W3 Standards rather than the proprietary approaches of the past https://developer.mozilla.org/en-US/docs/Archive/Mozilla_Gecko_Compatibility_Handbook
gox Mt. Gox was a bitcoin exchange based in Shibuya, Tokyo, Japan. https://en.wikipedia.org/wiki/Mt._Gox
h4ck3r Totally 31337 spelling of "hacker" https://www.urbandictionary.com/define.php?term=h4ck3r
hackforums Hack Forums is an internet forum. The website ranks as the number one website in the "Hacking" category in terms of web-traffic by the analysis company Alexa Internet. https://en.wikipedia.org/wiki/Hack_Forums
hax0rz Elite/l33t/31337 hax0rz are hackers. https://www.urbandictionary.com/define.php?term=hax0rz
haxors Originated from hacks = hax -> hackers/haxors https://www.urbandictionary.com/define.php?term=haxors
heihachi "Heihachi" cybercrime gang https://tron-delta.org/content/news-articles/anonymous-anonops-and-heihachi-en.html
hmu Hit me up or (Text, hangout, call) me. https://www.urbandictionary.com/define.php?term=HMU
honeypots In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. https://en.wikipedia.org/wiki/Honeypot_(computing)
htdocs htdocs (or www) is the directory that the Apache web server looks for files to serve on your domain by default. https://www.quora.com/Why-must-PHP-files-be-stored-in-the-htdocs-folder-Is-there-any-restriction-on-this-Can-we-store-them-anywhere-in-the-computer-and-access-them
hwnd HWND is a "handle to a window" and is part of the Win32 API . HWNDs are essentially pointers (IntPtr) with values that make them (sort of) point to a window-structure data. https://stackoverflow.com/questions/1635645/what-is-hwnd-in-vc
hyip A high-yield investment program (HYIP) is a type of Ponzi scheme, an investment scam that promises unsustainably high return on investment by paying previous investors with the money invested by new investors. https://en.wikipedia.org/wiki/High-yield_investment_program
ice9 ICE-9(.exe) is a computer virus developed by the DoD for unknown purposes. According to the Machine, it is "the world's most lethal virus", capable of "bringing Samaritan to its knees".  https://personofinterest.fandom.com/wiki/ICE-9
icq ICQ is a cross-platform messenger and VoIP client. The name ICQ derives from the English phrase "I Seek You". https://en.wikipedia.org/wiki/ICQ
ids An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. https://en.wikipedia.org/wiki/Intrusion_detection_system
ipn Instant Payment Notification (IPN) is a message service that automatically notifies merchants of events related to PayPal transactions. https://developer.paypal.com/docs/api-basics/notifications/ipn/
ircd An IRCd, short for Internet Relay Chat daemon, is server software that implements the IRC protocol, enabling people to talk to each other via the Internet (exchanging textual messages in real time). It is distinct from an IRC bot that connects outbound to an IRC channel. https://en.wikipedia.org/wiki/IRCd
istealer Riskware.iStealer is Malwarebytes’ detection name for a commercial system monitor application distributed by Kizar Labs. Riskware.iStealer may have the capabilities to harvest stored credentials, keystrokes, screenshots, network activity, and more from computers where the software is installed. https://blog.malwarebytes.com/detections/riskware-istealer/
jack Jack is high-risk ransomware that belongs to a family of ransomware infections called Dharma. https://www.pcrisk.com/removal-guides/15038-jack-ransomware
jtag A modified Xbox 360 Console that allows it to run custom homwbrew. XeXMenu is an example. All JTAGED Xbox Consoles allow it to run unsigned code via freeBoot https://www.urbandictionary.com/define.php?term=JTAG
keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. https://en.wikipedia.org/wiki/Keystroke_logging
kik Kik Messenger, commonly called Kik, is a freeware instant messaging mobile app from the Canadian company Kik Interactive, available free of charge on iOS and Android operating systems. https://en.wikipedia.org/wiki/Kik_Messenger
klonopin A sedative medication prescribed for people with PTSD, OCD, and the myriad other anxiety disorders.  https://www.urbandictionary.com/define.php?term=klonopin
lammer A Person who knows very little about computers/computing. https://www.urbandictionary.com/define.php?term=lammer
layer7 Layer 7 refers to the seventh and topmost layer of the Open Systems Interconnect (OSI) Model known as the application layer. This is the highest layer which supports end-user processes and applications. https://www.techopedia.com/definition/20338/layer-7
lighttpd Developers describe lighttpd as "A secure, fast, compliant, and very flexible web-server that has been optimized for high-performance environments". https://stackshare.io/stackups/lighttpd-vs-litespeed
litespeed LiteSpeed is detailed as "*A drop-in Apache replacement and the leading high-performance, high-scalability server *". https://stackshare.io/stackups/lighttpd-vs-litespeed
lmk Let me know https://www.urbandictionary.com/define.php?term=LMK
localbitcoins LocalBitcoins is a peer to peer bitcoin marketplace based in Helsinki, Finland. https://en.wikipedia.org/wiki/LocalBitcoins
mbr The Master Boot Record (MBR) is the information in the first sector of any hard disk or diskette that identifies how and where an operating system is located so that it can be boot (loaded) into the computer's main storage or random access memory. https://whatis.techtarget.com/definition/Master-Boot-Record-MBR
mdac Microsoft Data Access Components is a framework of interrelated Microsoft technologies that allows programmers a uniform and comprehensive way of developing applications that can access almost any data store. Its components include: ActiveX Data Objects, OLE DB, and Open Database Connectivity. https://en.wikipedia.org/wiki/Microsoft_Data_Access_Components
metasploit The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. https://en.wikipedia.org/wiki/Metasploit_Project
metus MeTuS bots are easily created using host booster kits available online and also involved in DDoS attacks. They also have some encryption capabilities. https://www.eweek.com/cloud/arbor-networks-researchers-find-u.s.-based-ddos-botnet
modded Modding is a slang expression that is derived from the verb "modify". Modding refers to the act of modifying hardware, software, or virtually anything else, to perform a function not originally conceived or intended by the designer, or achieve a bespoke specification. https://en.wikipedia.org/wiki/Modding
ms08-067 This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. https://support.microsoft.com/en-us/help/958644/ms08-067-vulnerability-in-server-service-could-allow-remote-code-execu
msr An MSR is a device that converts information on the magnetic stripe of a credit card into data that can be understood by retail software. https://www.collinsdictionary.com/us/dictionary/english/msr
mtgox Mt. Gox was a bitcoin exchange based in Shibuya, Tokyo, Japan. https://en.wikipedia.org/wiki/Mt._Gox
mw3 Call of Duty: Modern Warfare 3 is a 2011 first-person shooter video game, jointly developed by Infinity Ward and Sledgehammer Games and published by Activision. https://en.wikipedia.org/wiki/Call_of_Duty:_Modern_Warfare_3
netcat netcat is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. https://en.wikipedia.org/wiki/Netcat
nod32 ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. https://en.wikipedia.org/wiki/ESET_NOD32
opcodes In computing, an opcode is the portion of a machine language instruction that specifies the operation to be performed. https://en.wikipedia.org/wiki/Opcode
pastebin A pastebin or text storage site is a type of online content hosting service where users can store plain text, e.g. to source code snippets for code review via Internet Relay Chat (IRC). https://en.wikipedia.org/wiki/Pastebin
perfectmoney Perfect Money payment system discovers the safest and easiest financial service to make money transfers worldwide. https://perfectmoney.com/?welcome=1
phishing Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. https://en.wikipedia.org/wiki/Phishing
phpbb phpBB is an Internet forum package in the PHP scripting language. The name "phpBB" is an abbreviation of PHP Bulletin Board. https://en.wikipedia.org/wiki/PhpBB
phrack Phrack is an ezine written by and for hackers, first published November 17, 1985. Described by Fyodor as "the best, and by far the longest running hacker zine," the magazine is open for contributions by anyone who desires to publish remarkable works or express original ideas on the topics of interest. https://en.wikipedia.org/wiki/Phrack
pl0x A slight variation of plox (Means please). The "0" was added purely as a way to annoy the hell out of everyone who reads it. https://www.urbandictionary.com/define.php?term=pl0x
pmed on various message boards you can PM or "Private Message" someone https://www.urbandictionary.com/define.php?term=PM
popcorn Type of marijuana https://merryjane.com/culture/what-are-popcorn-nugs-and-are-they-considered-high-quality-weed
proftpd ProFTPD is an FTP server. ProFTPD is Free and open-source software, compatible with Unix-like systems and Microsoft Windows. Along with vsftpd and Pure-FTPd, ProFTPD is among the most popular FTP servers in Unix-like environments today. https://en.wikipedia.org/wiki/ProFTPD
prolly Shortened version of "probably". https://www.urbandictionary.com/define.php?term=Prolly
qip qip-crypt allows you to encrypt a password. https://documentation.nokia.com/cgi-bin/dbaccessfilename.cgi/190409044R7.2_V1_VITALQIP%20RELEASE%207.2.pdf
r00t v. To hack/penetrate/admin a machine - most commonly a datacenter system. Commonly used as an xDCC or FTP server because of its fast connection. https://www.urbandictionary.com/define.php?term=r00t
rampage The RAMpage exploit has the potential to give a bad app complete control of your phone. https://www.androidcentral.com/rampage-exploit-android
rat A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.  https://searchsecurity.techtarget.com/definition/RAT-remote-access-Trojan
rdp Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. https://en.wikipedia.org/wiki/Remote_Desktop_Protocol
realitykings One of the more prominent porn networks on the Internet. https://www.urbandictionary.com/define.php?term=Reality%20Kings
refud popular counter antivirus (CAV) service Refud.me https://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-nca-partnership-lead-to-arrests-and-shutdown-of-refud-me-and-cryptex-reborn/
resolver a set of software utilities used to resolve domain names of Internet resources https://en.wikipedia.org/wiki/Resolver_(DNS)
rgh A modified xbox running the TX Coolrunner chip allowing the console to run just like a jtag. https://www.urbandictionary.com/define.php?term=RGH
ring0 On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware such as the CPU and memory. https://en.wikipedia.org/wiki/Protection_ring
runpe RunPE is a trick used by some malware to hide code into a legit process. Learn how it works, and to detect with this step by step tutorial. https://www.adlice.com/runpe-hide-code-behind-legit-process/
sandboxie Sandboxie is an open-source sandboxing program for Microsoft Windows. Sandboxie creates an isolated operating environment in which applications can be run or installed without permanently modifying the local system. https://en.wikipedia.org/wiki/Sandboxie
se7ensins Se7enSins is an online community platform that delivers gaming news, reviews, and tutorials for its users. https://www.crunchbase.com/organization/se7ensins
seamonkey SeaMonkey is a free and open-source Internet suite. It is the continuation of the former Mozilla Application Suite, based on the same source code, which itself grew out of Netscape Communicator and formed the base of Netscape 6 and Netscape 7. https://en.wikipedia.org/wiki/SeaMonkey
seo Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic to a website or a web page from search engines. https://en.wikipedia.org/wiki/Search_engine_optimization
shkval A russian nuclear torpedo, also sometimes used to express a large explosion. https://www.urbandictionary.com/define.php?term=shkval
sikandar Sikandar's crypter is the longest running crypter sold on HackForums.net and is one of the best programs ever sold. http://abelzcybernet.blogspot.com/2012/08/download-sikandars-crypter-v8-cracked.html
skiddie In programming and hacking cultures, a script kiddie, skiddie, or skid is an unskilled individual who uses scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites.  https://en.wikipedia.org/wiki/Script_kiddie
slax Slax is a LiveCD Linux distribution developed by Tomáš Matějíček and based on Debian. Packages can be added by apt package manager or can be prepared as modules. The tagline for Slax refers to itself as "your pocket operating system". https://en.wikipedia.org/wiki/Slax
slowloris Slowloris is a type of denial of service attack tool which allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports. https://en.wikipedia.org/wiki/Slowloris_(computer_security)
snas Streaming Network Analytics System (project SNAS) is a framework to collect, track and access tens of millions of routing objects (routers, peers, prefixes) in real time. https://www.snas.io
sniffer A sniffer is a software or hardware tool that allows the user to “sniff” or monitor your internet traffic in real time, capturing all the data flowing to and from your computer. https://www.avast.com/c-sniffer
spamhaus The Spamhaus Project is an international organisation, based in both London and Geneva, founded in 1998 by Steve Linford to track email spammers and spam-related activity. https://en.wikipedia.org/wiki/The_Spamhaus_Project
spyeye SpyEye is a malware program that attacks users running Google Chrome, Opera, Firefox and Internet Explorer on Microsoft Windows operating systems. https://en.wikipedia.org/wiki/SpyEye
stealer A stealer is a Trojan that gathers information from a system. https://www.trendmicro.com/vinfo/au/security/definition/stealer
sux Another style to write "sucks". https://www.urbandictionary.com/define.php?term=sux
tnx Short for Thanks https://www.urbandictionary.com/define.php?term=tnx
torrentleech TorrentLeech (TL) is a Private Torrent Tracker for 0DAY / GENERAL. TorrentLeech is the internal tracker for multiple release groups. https://opentrackers.org/torrentleech/
track2 Track2 is an American Banking Association (ABA) format for storing information on the magnetic stripe on your credit card. https://medium.com/@ryandeangraham/track2-character-encoding-61d6150ecb95
triggerbot A Triggerbot is a cheat that automatically shoots for a user when a crosshair is placed over an enemy. https://www.kitguru.net/gaming/matthew-wilson/triggerbot-users-arent-pleased-about-their-overwatch-bans/
truecrypt TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file, or encrypt a partition or the whole storage device.  https://en.wikipedia.org/wiki/TrueCrypt
uac Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. https://attack.mitre.org/techniques/T1548/002/
ub3r UB3R-B0T was created by moiph as an IRC bot in 2005 using mirc scripts. Then in like college or something my friend Jerry was all like "i have a php irc bot" and i was like "sweet dude" so then we reworked that code to make an irc bot framework (hotnsour) and then UB3R-B0T used that to become UB2R-B0T. https://ub3r-b0t.com
udid UDID is an acronym for Unique Device Identifier. The UDID is a feature of Apple's iOS devices. https://en.wikipedia.org/wiki/UDID
vba32 VBA32 is antivirus software from the vendor VirusBlokAda for personal computers running Microsoft Windows.  https://en.wikipedia.org/wiki/Vba32_AntiVirus
vs2008 Microsoft Visual Studio 2008 https://www.microsoft.com/en-us/download/details.aspx?id=7873
vuln An abbreviation of the word vulnerable. https://www.urbandictionary.com/define.php?term=vuln
vx VX means Virus eXchange, or in our case it means virus coding. So, originally, the term was meant for people who exchanged viruses, who sent them to each other. But nowadays most people use VX as a synonym for virus coding. https://privacy-pc.com/articles/vx-the-virus-underground.html
whitelisted Whitelisting is the practice of explicitly allowing some identified entities access to a particular privilege, service, mobility, access or recognition. https://en.wikipedia.org/wiki/Whitelisting
whmcs WHMCS stands for Web Host Manager Complete Solution. They’re the go-to software that automates all the operations needed for online web hosting and domain registration. https://www.liquidweb.com/blog/whmcs-crucial-reseller-hosting/
winlogon In computing, Winlogon (Windows Logon) is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loading the user profile on logon, and optionally locking the computer when a screensaver is running (requiring another authentication step). https://en.wikipedia.org/wiki/Winlogon
wmr WMR is a WebMoney Transfer title unit equivalent to a Russian ruble. https://wiki.wmtransfer.com/projects/webmoney/wiki/WMR
wu The Western Union Company is an American worldwide financial services and communications company, headquartered in Denver, Colorado. https://en.wikipedia.org/wiki/Western_Union
wupload  one of the "top 5 rogue cyberlocker services" https://en.wikipedia.org/wiki/File_hosting_service
xrumer XRumer is a piece of software made for spamming online forums and comment sections. https://en.wikipedia.org/wiki/XRumer
zend Zend Framework is an open source, object-oriented web application framework implemented in PHP 7 and licensed under the New BSD License. https://en.wikipedia.org/wiki/Zend_Framework
zeus Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. https://en.wikipedia.org/wiki/Zeus_(malware)