Hack Ex Wiki


The log is where everything on a user's IP is stored. When a hacker connects to an IP, downloads apps from this IP or uploads anything to it, it is logged in the Log.

You should always clear the logs before you disconnect, as the victim can review the logs, take your IP, and connect to YOUR system, and hack you back.

List of activities recorded in the log, after hacking:

  1. Authorization on the device, then your ip.
  2. Cracking bank with your ip.
  3. Withdrawing with money and ip.
  4. Uploading on device spyware or spam with your ip
  5. Downloading any app from hacked device with your ip.