Searching in Hacking

  • A Adults (18 and older)
  • T Teens (13-17)
  • K Kids (12 and under)

http://www.hackerthreads.org/

Message boards with general discussions, tutorials and programs.

http://www.hackforums.net/

Emphasis on white hat, with categories for hacking, coding and computer security.

http://www.fulldisclosure.org/

Simple text format with users answering questions posed by other users, and discussing the latest hack news.

http://www.garage4hackers.com/

Message board and blogs discussing security and beginner to expert level hacking.

http://www.binrev.com/

Message boards including a section for newbies, programming and general on-topic chat. Includes blogs.

http://www.defcon.org/

Information about the largest annual hacker convention in the US, including past speeches, video, archives, and updates on the next upcoming show as well as links and other details.

http://www.blackhat.com/

Black Hat Conventions put you face to face with people on the cutting edge of network security, and with no vendor pitches.

http://www.phreaknic.info/

A convention for hackers, phone phreaks, cypherpunks, programmers, civil libertarians, ham/scanner enthusiasts, security experts, feds, and culture jammers.

http://www.syscan.org/

The Symposium on Security for Asia Network in Singapore aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScAN intends to be a non-product, non-vendor biased security conference.

http://www.shmoocon.org/

An annual East coast hacker convention hell-bent on offering an interesting and new atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, as well as open discussion of critical information security issues.

http://toorcon.net/

Three-day event held annually in San Diego, California, U.S that features lectures and a competitive game involving simulated network penetration.

http://www.thotcon.org/

Small-venue hacking conference. Calls for papers, speakers, contests, and schedule. Chicago, Illinois, United States.

http://www.astalavista.com/

Offers security directory and related news.

http://www.reteam.org/

Contains projects, papers and tools.

http://www.coprophiliac.de/

Provides cracking tools and information.

http://www.crime-research.org/

Ukrainian crime kingpin Maksym Kovalchuk arrested in largest software piracy and computer crime bust.

http://www.cryptographyworld.com/

Introduction to cryptography, including concepts, key management and application.

http://cypherspace.org/

Find information on some cryptanalytic hacks, breaking weak cryptosystems and links to more cryptography related websites.

http://www.piracy.com/

Links to cryptography related downloads and information from around the world.

http://www.interhack.net/

Articles describing the first crack of a DES-encrypted message, with some source code and mailing list archives.

http://www.garykessler.net/

Defines cryptographic terms and concepts, offers crypto scheme comparison, and provides some real world examples.

http://www.jproc.ca/

Features machines and systems used in secure communications. Includes brief history on cryptography.

http://www.quadibloc.com/

Outline of the various types of cipher systems that have been used historically and the relationships between them.

http://www.fiu.edu/

An article by Steven Mizrach.

http://securitytracker.com/

Archive of exploits and security advisories

http://insecure.org/

A large and descriptive exploit archive organized by affected operating systems.

http://www.artofhacking.com/

The Software Orange Box is a free proof-of-concept tool which can spoof most forms of North American Caller ID.

http://www.metasploit.com/

Open source penetration testing software with a large, active community.

http://www.hellboundhackers.org/

Well established resource and forum for exploits, tools and learning the basics of hacking.

http://www.illmob.org/

Home of a number of 0-day exploit authors. Many creative Trojan droppers and methods are released here, and it carries a huge database of exploits and hacking tools.