By r0gu3Sec | December 26, 2016 - 23:54 | Posted in CyberGuerrilla | Comments Off on Basics of Making a Rootkit: From syscall to hook!

This tutorial is for educational purposes only, and by NO MEANS should you actually be malicious when (or after) making a rootkit. I thought I’d share how to do this for any security minded people who would like to learn more on how to prevent or look for rootkits. This will be done in C on Linux, probably Read more » 


By Anonymous | November 19, 2016 - 18:59 | Posted in /b/ | 1 Comment

Target: www.aea.be Admin panel: www.aea.be/administrator User: Anonymous Password: Anonymous Salute Anonymous AntiSec  


By Anonymous | April 6, 2015 - 17:29 | Posted in AnonyNews | 2 Comments

When authorities block Twitter, Facebook or other, here how u can go around blockade. Most of the time, your ISP automatically assigns a primary and secondary DNS server when your router or computer requests network information via DHCP. But what if those ISP-provided DNS servers aren’t working properly or “they” block certain sites? Ways to Read more » 


 2 Users Online