Jump to content


  • Content Count

  • Joined

  • Last visited

About Hackerman

  • Rank
  1. Hackerman

    Anonymous reverse shell

    Thanks for your replies! Reverse shell anonymity sounds pretty complicated, so is there another way to take control of victims machine that could be more anonymous than reverse shell? For example is it possible to set victims machine as “server” and then connect to it through tor or VPN? Does anyone have any idea?
  2. Hackerman

    Anonymous reverse shell

    Hi, I was wondering that when I create a reverse shell malware on a machine, wouldn’t I give away my IP address to the victim? Isn’t it pretty easy for victim to track me using my IP, assuming they are smart enough to find out my malware? Is it possible to get around this?