Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Hide My Ass! about their logging policy
yeah is wide know that need more than one pxie to anonym the TOR + Proxie chain is the best option
highway to vx development
"Sh3llc0d3" said: I'm struggling to see what you mean by highway to learn vx dev?? thanks for answer i think iam in virus world to create, innovate and do my best so i want to stay focused in/with the diferent tools, and put hands o…
What steps would you recommend??
fist step is prepare your testing lab, download damn vulnerable linux and metasploitable this two vm will be your targets addicionally you can test whit xp and a version of centos this last because many corp have its servers whit redhat u need…
Windows 8 secure boot - the end of dual-booting
microsoft its just triying to continue whit his monopoly, before give huge gifts to companys tfor only sell pc with microsofts operative systems now force to regular users to not dualboot whats nexts
ProxyChains + Tor
good tutorial i use tor and this gona usefull