Thanks! How goes the malware hunting? And how do you actually find malware to package and such. I've seen those forums (my mouse has never gone near any of those attached files) but I'm curious as to how you safely harvest. VM?
As for safely harvesting them, the general process is to use a sandbox or virtual machine to prevent any malware which is downloaded from actually infecting your computer (it is either contained in a specific part of your hard-drive or in the case of VM, a virtual computer. With more experience you begin to learn when it is safe to click on a link to download and save malware and when doing so might lead you to an exploit pack which will do the downloading (and the executing) for you.
If you're even more curious than that, let me know and I'll see if I can show you some more examples