The Hacker’s Choice shares IT security research and public cybersecurity projects, offering resources and insights for the tech and hacker community.
Explore public IT security research and tools
The Hacker’s Choice is a long-standing website dedicated to sharing IT security research and resources with the public. Founded in 1995, it focuses on advancing cybersecurity knowledge and providing open access to its work—never for hire, but always for the greater community.
On this site, you can explore a variety of security-related projects, findings, and tools created by experienced researchers. Whether you're a tech enthusiast, IT professional, or simply curious about cybersecurity, you'll find valuable insights and practical resources here.
The site stands out by making all of its work freely available, fostering learning and collaboration within the hacker and security community. It’s a great place to discover new ideas and deepen your understanding of IT security.
Discover websites similar to Thc.org. Optimized for ultra-fast loading.
Kitploit shares cybersecurity tools and resources for penetration testing, ethical hacking, and security research. Currently under maintenance.
Google CTF is an online cybersecurity competition where you solve security challenges, test your hacking skills, and learn about digital security.
Learn about the Sweet32 cryptographic attack and its impact on 64-bit block ciphers used in protocols like TLS and OpenVPN. Security insights included.
Eclectic site offering internet and computer security resources, breach info, commentary, and archives for security enthusiasts and researchers.
BlackArch Linux offers a lightweight, Arch-based operating system with thousands of penetration testing and cybersecurity tools for security professionals.
Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.
Explore shellcode, program analysis, and reverse engineering resources, tools, and entries for low-level security research and learning.
Read in-depth articles and case studies on offensive security, bug bounties, and vulnerability research from the Almond security team.
Learn about the Heartbleed Bug, a major security flaw in OpenSSL that exposed encrypted data. Find details, risks, and how to protect your information.
Explore open-source intelligence and cyber security tools, research, and resources focused on offensive OSINT techniques and surveillance insights.
A hands-on Mastodon server for security pros to explore, test, and learn about privacy and safety issues in social media in a controlled environment.
Learn about Thunderclap vulnerabilities that let attackers exploit Thunderbolt ports to compromise computers, plus get technical details and security guidance.
Learn about the httpoxy vulnerability in PHP and CGI apps, how it works, and how to protect your web applications from related security risks.
Explore research on how language models can be attacked, with real examples, ethical considerations, and resources for understanding AI vulnerabilities.
Explore reverse engineering tips, security tricks, and technical guides—especially for macOS—shared by an enthusiast passionate about software internals.
Explore tutorials, guides, and resources on penetration testing techniques, red teaming, and cybersecurity methodologies for security professionals and enthusiasts.
A personal blog sharing stories, guides, and technical insights on hacking, security exploits, and penetration testing for infosec enthusiasts.
Explore in-depth security research, technical analyses, and offensive cybersecurity tutorials focused on vulnerabilities, red teaming, and threat techniques.
Browse a curated list of Unix binaries that can help bypass local security restrictions in misconfigured systems. Useful for security testing and research.
Find practical notes and resources on red teaming and offensive security to support learning, research, and hands-on cybersecurity activities.
Learn about Dirty COW (CVE-2016-5195), a Linux privilege escalation vulnerability, with details, exploits, and resources for security researchers.
Gibson Security shares insights, guides, and resources on computer security, privacy, and technology topics for those interested in digital safety.
Explore cybersecurity tools, tutorials, and resources for learning about network security, ethical hacking, and digital defense techniques.
Phrack Magazine shares articles, research, and news about hacking, cybersecurity, and digital underground topics for tech enthusiasts and researchers.
Explore offensive security tools and in-depth research to support your red teaming and cybersecurity testing activities. Resources for security professionals.
Sector 7 shares in-depth research and technical writeups on cybersecurity exploits, focusing on vulnerabilities in automotive and IoT devices.
BackTrack Linux was a popular security-focused operating system for penetration testing, now continued as Kali Linux. Site offers legacy info and links.
Explore security challenges and hacking tutorials focused on reverse engineering, binary exploitation, and cybersecurity exercises.
Learn about the BREACH attack on SSL/TLS, including how it works, its security implications, and ways to protect your site from this vulnerability.
Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.
System Weakness publishes articles and guides on cybersecurity, ethical hacking, and infosec, helping readers learn about security and vulnerabilities.
Signal Chaos shares insights and posts on application security, offering observations, guides, and resources for those interested in cybersecurity topics.
A Chinese-language forum for software reverse engineering, cybersecurity, and sharing technical knowledge among enthusiasts and professionals.
Explore legal and ethical hacking, security advisories, and independent research focused on information security and vulnerability disclosures.
Learn about ImageMagick vulnerabilities and their security risks. Discover how attackers exploit image processing flaws and how to protect your web services.
Browse a large collection of phishing scams and spoof emails to stay informed and protect yourself from online fraud and email scams.
Crypto Fails highlights examples of poor cryptography implementations, helping users learn from real-world mistakes in digital security.
Vulnerability Lab shares research on security vulnerabilities, bug bounty programs, and responsible disclosure for ethical hackers and researchers.
Learn about KRACK, a major Wi-Fi security vulnerability, with clear explanations, research papers, demos, and tools focused on WPA2 protocol weaknesses.
Browse and search archives of top security and hacking mailing lists, featuring real-time updates, message excerpts, and easy RSS access.
Discover tools and services similar to thc.org
Explore related tools and services in these categories