Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Nice... Can't wait to see the final project... Any plans after pyHak? I plan to get started on an mmorpg within the next year... Gonna be in C of course...
What is the possibility
With using the proper connection, injection, and exploit methods. Any box (both *nix, and commercial), is hackable within just minutes. Still to this day there is a way to get past any firewall... Without the use of a rootkits, virus's, trojans…
Best Hacking/Security Books?
Hacking the art of exploitation - I have to say is a great read, I have the paper back. I haven't gotten the chance to read it all the way through; but it is very in-depth. a few others (not all about security or hacking, but as rx said, 90% o…
SQL Injection in MySQL Databases
Nice article... Good read
IPTables, Avast (not the best, but in conjunction with windows firewall, and a proper set of policies it works wonders)
Network in Fluxbox
You can also use dhclient... Force the dhcp connection... (this is works on multiple distros, both RJ45 con's and wireless; just know which device you are trying to use)
Need someone to make Highscores system
Xinapse... I saw your post on webdevforums. If your still looking, I might be up for the challenge... My contact info is on my website tetralogica.com. Looking forward to hearing from you.