Hello. I wan't to hack one webiste with exploit but im scared for my identity. So my question is ho w proxy works for some exploits, Example. I use exploit in terminal on linux and that exploit has no proxy. Im sure my post is understandable, sorry for my english. Btw pls someone tell me what is need for hiding identity for hacking.