Promotion

Alternatives to Thc.org

Discover websites similar to Thc.org. Optimized for ultra-fast loading.

Change view:

Top Thc.org Alternatives (Prioritized Matches)

kitploit.com favicon

Discover top cybersecurity tools and resources

48%

Kitploit shares cybersecurity tools and resources for penetration testing, ethical hacking, and security research. Currently under maintenance.

capturetheflag.withgoogle.com favicon

Solve real security challenges online

47%

Google CTF is an online cybersecurity competition where you solve security challenges, test your hacking skills, and learn about digital security.

sweet32.info favicon

Understand birthday attacks on 64-bit ciphers

46%

Learn about the Sweet32 cryptographic attack and its impact on 64-bit block ciphers used in protocols like TLS and OpenVPN. Security insights included.

attrition.org favicon

Explore unique computer security archives and news

46%

Eclectic site offering internet and computer security resources, breach info, commentary, and archives for security enthusiasts and researchers.

blackarch.org favicon

Access 2800+ security tools on Arch Linux

46%

BlackArch Linux offers a lightweight, Arch-based operating system with thousands of penetration testing and cybersecurity tools for security professionals.

thunderspy.io favicon

Check if your device is vulnerable to Thunderspy

46%

Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.

shell-storm.org favicon

Discover shellcode and reverse engineering tools

46%

Explore shellcode, program analysis, and reverse engineering resources, tools, and entries for low-level security research and learning.

offsec.almond.consulting favicon

Explore real-world offensive security case studies

46%

Read in-depth articles and case studies on offensive security, bug bounties, and vulnerability research from the Almond security team.

heartbleed.com favicon

Understand the Heartbleed vulnerability

45%

Learn about the Heartbleed Bug, a major security flaw in OpenSSL that exposed encrypted data. Find details, risks, and how to protect your information.

offensiveosint.io favicon

Discover offensive OSINT tools and insights

45%

Explore open-source intelligence and cyber security tools, research, and resources focused on offensive OSINT techniques and surveillance insights.

cybervillains.com favicon

Test social media security in a safe space

45%

A hands-on Mastodon server for security pros to explore, test, and learn about privacy and safety issues in social media in a controlled environment.

thunderclap.io favicon

Understand Thunderbolt security risks in seconds

45%

Learn about Thunderclap vulnerabilities that let attackers exploit Thunderbolt ports to compromise computers, plus get technical details and security guidance.

httpoxy.org favicon

Understand and fix the httpoxy vulnerability

45%

Learn about the httpoxy vulnerability in PHP and CGI apps, how it works, and how to protect your web applications from related security risks.

llm-attacks.org favicon

Discover real-world attacks on AI language models

45%

Explore research on how language models can be attacked, with real examples, ethical considerations, and resources for understanding AI vulnerabilities.

put.as favicon

Discover reverse engineering tips for macOS

45%

Explore reverse engineering tips, security tricks, and technical guides—especially for macOS—shared by an enthusiast passionate about software internals.

pentestlab.blog favicon

Learn penetration testing techniques step-by-step

44%

Explore tutorials, guides, and resources on penetration testing techniques, red teaming, and cybersecurity methodologies for security professionals and enthusiasts.

thehackerblog.com favicon

Explore real-world hacking stories and security tips

44%

A personal blog sharing stories, guides, and technical insights on hacking, security exploits, and penetration testing for infosec enthusiasts.

0xsp.com favicon

Dive into hands-on security research and tutorials

43%

Explore in-depth security research, technical analyses, and offensive cybersecurity tutorials focused on vulnerabilities, red teaming, and threat techniques.

gtfobins.github.io favicon

Discover security bypass techniques with Unix tools

40%

Browse a curated list of Unix binaries that can help bypass local security restrictions in misconfigured systems. Useful for security testing and research.

ired.team favicon

Explore practical red teaming and security notes

40%

Find practical notes and resources on red teaming and offensive security to support learning, research, and hands-on cybersecurity activities.

dirtycow.ninja favicon

Explore Dirty COW vulnerability details and exploits

40%

Learn about Dirty COW (CVE-2016-5195), a Linux privilege escalation vulnerability, with details, exploits, and resources for security researchers.

gibsonsec.org favicon

Explore computer security insights and guides

40%

Gibson Security shares insights, guides, and resources on computer security, privacy, and technology topics for those interested in digital safety.

netsec.ws favicon

Learn network security and hacking basics

40%

Explore cybersecurity tools, tutorials, and resources for learning about network security, ethical hacking, and digital defense techniques.

phrack.org favicon

Explore legendary hacking articles and research

39%

Phrack Magazine shares articles, research, and news about hacking, cybersecurity, and digital underground topics for tech enthusiasts and researchers.

breakdev.org favicon

Discover top offensive security tools and guides

39%

Explore offensive security tools and in-depth research to support your red teaming and cybersecurity testing activities. Resources for security professionals.

computest.nl favicon

Explore real-world cybersecurity exploit research

39%

Sector 7 shares in-depth research and technical writeups on cybersecurity exploits, focusing on vulnerabilities in automotive and IoT devices.

backtrack-linux.org favicon

Learn about BackTrack, the predecessor to Kali Linux

39%

BackTrack Linux was a popular security-focused operating system for penetration testing, now continued as Kali Linux. Site offers legacy info and links.

io.netgarage.org favicon

Practice real-world hacking challenges

39%

Explore security challenges and hacking tutorials focused on reverse engineering, binary exploitation, and cybersecurity exercises.

breachattack.com favicon

Understand and mitigate SSL BREACH attacks

39%

Learn about the BREACH attack on SSL/TLS, including how it works, its security implications, and ways to protect your site from this vulnerability.

exploit-db.com favicon

Browse the latest public exploits and vulnerabilities

38%

Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.

Worldwide Thc.org Alternatives

systemweakness.com favicon

Learn ethical hacking from real security experts

74%

System Weakness publishes articles and guides on cybersecurity, ethical hacking, and infosec, helping readers learn about security and vulnerabilities.

s1gnalcha0s.github.io favicon

Explore practical insights in app security

47%

Signal Chaos shares insights and posts on application security, offering observations, guides, and resources for those interested in cybersecurity topics.

52pojie.cn favicon

Join China’s top reverse engineering tech forum

44%

A Chinese-language forum for software reverse engineering, cybersecurity, and sharing technical knowledge among enthusiasts and professionals.

legalhackers.com favicon

Discover legal hacking research and advisories

40%

Explore legal and ethical hacking, security advisories, and independent research focused on information security and vulnerability disclosures.

imagetragick.com favicon

Understand ImageMagick security risks

40%

Learn about ImageMagick vulnerabilities and their security risks. Discover how attackers exploit image processing flaws and how to protect your web services.

millersmiles.co.uk favicon

See real phishing scams and spoof emails

40%

Browse a large collection of phishing scams and spoof emails to stay informed and protect yourself from online fraud and email scams.

cryptofails.com favicon

See real-world cryptography mistakes explained

40%

Crypto Fails highlights examples of poor cryptography implementations, helping users learn from real-world mistakes in digital security.

vulnerability-lab.com favicon

Find real security vulnerabilities and bug bounties

39%

Vulnerability Lab shares research on security vulnerabilities, bug bounty programs, and responsible disclosure for ethical hackers and researchers.

krackattacks.com favicon

Understand Wi-Fi vulnerabilities with KRACK demos

39%

Learn about KRACK, a major Wi-Fi security vulnerability, with clear explanations, research papers, demos, and tools focused on WPA2 protocol weaknesses.

seclists.org favicon

Access real-time security mailing list archives

38%

Browse and search archives of top security and hacking mailing lists, featuring real-time updates, message excerpts, and easy RSS access.

Explore More Cybersecurity Exploitation Resource Alternatives

Discover tools and services similar to thc.org

Related Categories

Explore related tools and services in these categories