Menu
Submit Site
Home
Computer
Hacking
All sites of Hacking
Freedom to Tinker
Freedom to Tinker- Discussions on the freedom to understand, discuss, repair, and modify the technological devices you own. ...
Hack A Day
Hack A Day- A hardware hack every day. ...
Hacked Gadgets
Hacked Gadgets- A resource for DIY project documentation as well as general gadget and technology news. ...
Tinkerlog
Tinkerlog- Tinkering with electronics and microcontrollers. ...
Karosium
Karosium- DIY Projects, hardware hacking ...
Badflash.com
Badflash.com- Sells most parts needed to turn an I-opener into a Windows or Linux computer. ...
I-Opener FAQ
I-Opener FAQ- Frequently asked questions about modifying the I-Opener. ...
Hackerthreads.org
Hackerthreads.org- Hacker forum with tutorials about networking, system administration and network utilities. ...
Attrition's Newbie Area
Attrition's Newbie Area- Newbie-oriented tutorials about stuff like UNIX and system penetration auditing. ...
UNIX / Net / Hack Page
UNIX / Net / Hack Page- A dated Unix and internet lore, technical docs and programming tutorials site. ...
Security Focus
Security Focus- Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs. ...
Security Tracker
Security Tracker- Archive of exploits and security advisories ...
Fyodor's Exploit World
Fyodor's Exploit World- A large and descriptive exploit archive organized by affected operating systems. ...
Exploiting Caller ID
Exploiting Caller ID- The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID. ...
Metasploit Framework
Metasploit Framework- Open source penetration testing software with a large, active community. ...
HellBound Hackers
HellBound Hackers- Well established resource and forum for exploits, tools and learning the basics of hacking. ...
Piotr Banya
Piotr Banya- TI89.Gaara, Tapion polymorphic engine, Aslan metamorphic engine, articles, and hacking/security stuff (exploits, advisories). ...
Ill Mob
Ill Mob- Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools. ...
Rapid7 Vulnerability and Exploit Database
Rapid7 Vulnerability and Exploit Database- A collection of disclosed exploits and vulnerabilities in various major software products. ...
Adam Back's Homepage: Cypherspace
Adam Back's Homepage: Cypherspace- Find information on some cryptanalytic hacks, breaking weak cryptosystems and links to more cryptography related websites. ...
Canvas Exploit Platform
Canvas Exploit Platform- A commercial exploit platform similar to metasploit. Has built in memory resident shells that are cleared when the machine is rebooted. Perfect for cleaning up after a penetration test. ...
Offensive Security
Offensive Security- Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course. ...
High-Tech Bridge: Security Advisories
High-Tech Bridge: Security Advisories- Database of vulnerabilities in software. ...
Exploit Database
Exploit Database- An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database. ...
SoldierX
SoldierX- A collection of security and exploit resources. Also has a large IRC community. ...
OverTheWire: WarGames
OverTheWire: WarGames- Place for programmers and hackers to hone their technical skills by completing challenging wargames and programming challenges. Includes network programming, defeating PaX, buffer/heap overflows, a ...
Phenoelit
Phenoelit- Collection of older exploits and tools. ...
Computer Hacking and Ethics
Computer Hacking and Ethics- Paper about developing ethics in teenage hackers. ...
Is There a Hacker Ethic for 90s Hackers?
Is There a Hacker Ethic for 90s Hackers?- An article by Steven Mizrach. ...
Handbook of Applied Cryptography
Handbook of Applied Cryptography- Reference work available for free download (with restrictions) from the Web. ...
The Munitions Maker Graphic
The Munitions Maker Graphic- Campaign to distribute image (rsa2d.gif) in protest of ITAR regulations that treat encryption as munitions. ...
Choosing a Good Password
Choosing a Good Password- Tips on choosing a difficult to crack password and pitfalls in password selection. ...
RSA - Hacking and Cracking
RSA - Hacking and Cracking- Discusses security problems and possible attacks against the RSA cryptosystem. ...
International Association for Cryptologic Research (IACR)
International Association for Cryptologic Research (IACR)- Non-profit scientific organisation intended to further research in cryptology. ...
Cryptography FAQ
Cryptography FAQ- Ten part FAQ list that is essential reading for any newcomer to cryptography. ...
Cryptography World
Cryptography World- Introduction to cryptography, including concepts, key management and application. ...
Crkv
Crkv- The article about companion viruses (with two examples) by CrkV ...
International Cryptography Freedom
International Cryptography Freedom- Links to cryptography related downloads and information from around the world. ...
Deschall
Deschall- Articles describing the first crack of a DES-encrypted message, with some source code and mailing list archives. ...
Snake Oil FAQ
Snake Oil FAQ- Guide to evaluating the quality and fitness for purpose of cryptography tools. ...
Randomness and the Netscape Browser
Randomness and the Netscape Browser- Article about cracking the original Netscape encryption algorithm, and links to resources for generating crypto strength randomness. ...
An Overview of Cryptography by Gary C. Kessler
An Overview of Cryptography by Gary C. Kessler- Defines cryptographic terms and concepts, offers crypto scheme comparison, and provides some real world examples. ...
Standard Cryptographic Algorithm Naming
Standard Cryptographic Algorithm Naming- Provides references for a collection of cryptographic algorithms, assigning each an ASCII name and zero or more aliases. ...
Crypto Machines
Crypto Machines- Features machines and systems used in secure communications. Includes brief history on cryptography. ...
A Cryptographic Compendium
A Cryptographic Compendium- Outline of the various types of cipher systems that have been used historically and the relationships between them. ...
Crypto-Gram
Crypto-Gram- Free monthly email newsletter covering developments in cryptography and other computer security issues. ...
Astalavista
Astalavista- Offers security directory and related news. ...
Reverse Engineering Team
Reverse Engineering Team- Contains projects, papers and tools. ...
K's World
K's World- Provides cracking tools and information. ...
Ukrainian Hacker Story
Ukrainian Hacker Story- Ukrainian crime kingpin Maksym Kovalchuk arrested in largest software piracy and computer crime bust. ...
Page 1 of 3.
Next
Last »
Latest sites from Hacking
Freedom to Tinker
Hack A Day
Hacked Gadgets
Tinkerlog
Karosium
Badflash.com
I-Opener FAQ
Hackerthreads.org
Attrition's Newbie Area
UNIX / Net / Hack Page
Security Focus
Security Tracker
Fyodor's Exploit World
Exploiting Caller ID
Metasploit Framework
HellBound Hackers
Piotr Banya
Ill Mob
Rapid7 Vulnerability and Exploit Database
Adam Back's Homepage: Cypherspace
Canvas Exploit Platform
Offensive Security
High-Tech Bridge: Security Advisories
Exploit Database
SoldierX
Send feedback
submit