Top Hacker Sites


Social Engineering
Description: Social Engineering (SE) is both incredibly complex and amazingly simple. What really is social engineering? We define it as the act of influencing a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action. It may also include positive forms of communication such as with parents, therapists, children, spouse and others.

Description: Exploit-ID is the Exploit Information Disclosure which has the objective to share about security in the area of network and computer. Initial stand Exploi-ID is the founder of the first accident that has aspirations to create an archive exploit. From that idea has received positive responses from some senior hackers in Indonesia, so as to forming a team to work on the Exploit-ID. Hopefully Exploit-ID can be a useful solution for the exploits archive.

Description: Phrack is an ezine written by and for hackers first published November 17, 1985. Described by Fyodor as “the best, and by far the longest running hacker zine,” the magazine is open for contributions by anyone who desires to publish remarkable works or express original ideas on the topics of interest. It has a wide circulation which includes both hackers and computer security professionals. Originally covering subjects related to phreaking and telephone system hacking, anarchy and cracking, the articles also cover a wide range of topics including computer and physical security, hacking, cryptography and international news. Phrack “has had its finger on the pulse of hacker culture”, and is considered both a handbook and a manifesto for hackers.


Description: AnonNewsis an independent and uncensored (but moderated) news platform for Anonymous. Anyone is welcome to post a submission, and can do so by clicking the “Add” button for a category.

Hacker's Online Club

Hacker’s Online Club
Description: Hacker’s Online Club Is All About To Learn Hacking, Cyber Security, Cyber Forensic.

Defcon Logo

Description: DEF CON is one of the oldest continuous running hacker conventions around, and also one of the largest.


Description: Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this information in a easy to understand format.


The Exploit Database
Description: The Exploit Database (EDB) is an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.
Also now part of The Exploit Database is the Google Hacking Database (GHDB)


Google Hacking Database (GHDB)
Description: Originally created by Johnny Long of Hackers for Charity, Google Hacking Database (GHDB) is an authoritative source for querying the ever-widening reach of the Google search engine. In the GHDB, you will find search terms for files containing usernames, vulnerable servers, and even files containing passwords. When The Google Hacking Database was integrated in The Exploit Database, the various googledorks contained in the thousands of exploit entries were entered into the GHDB. The direct mapping allows penetration testers to more rapidly determine if a particular web application has a publicly available exploit.


Hack a Day
Description: Hack a day is an online magazine which publishes hacks each day as well as a special How-To hack each week. A hack here refers to modifications of a product or software as well as creation of something entirely new for convenience, novelty, function or creativity. Hack a Day was founded in 2004 as a web magazine for Engadget devoted to publishing and archiving “the best hacks, mods and DIY (do it yourself) projects from around web” Hack a Day has since split from Engadget and is currently powered by In 2007 Computerworld magazine ranked Hack a Day #10 on their list of the top 15 geek blog sites.


Cult of the Dead Cow
Description: Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled “Cult of the Dead Cow”. New media are released first through the blog, which also features thoughts and opinions of the group’s members.


Description: Hacktivismo is an international group of hackers, human rights workers, lawyers and artists that evolved out of THE CULT OF THE DEAD COW (cDc), a publishing and computer security group. We believe that privacy and access to information are basic human rights. Hacktivismo assumes as an ethical point of departure the principles enshrined in the Universal Declaration on Human Rights and the International Convention on Civil and Political Rights. We also support the Free Software and open-source movements.
The Hacker News

The Hacker News
Description: Originally founded in November 2010 by Mohit Kumar, The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers. Supported and endorsed by administrators and members of various underground hacking groups and communities worldwide, The Hacker News (THN) has become a worldwide leader in information security.

Hackers for Charity

Hackers for Charity
Description: Hackers for Charity is a non-profit organization that leverages the skills of technologists. We solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world’s poorest citizens.

Hackers Home Page
Description: This site offers hacker products including Gambling Machine Jackpotter, Vending Machine Defeater, EMP Electromagnetic Pulse Device, Magnetic Stripe Reader Writer, Smartcard Reader Writer, Lock Picks, Blackjack Card Counting Computer, Fruit Machine Cheats. We offer devices designed to win at slots, beat the casino, win at blackjack, win at gambling, cheat cherry master, cheat pot o gold, and also sell portable card reader.

Black Hat
Description: Black Hat