Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why would they use their own tools and risk revealing them to the public when they can use a recognized existing tool and mask their full capabilities?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: