skip to main content

DEF CON Hacking Conference


If you want your URL added, just send them to neil at, but be sure to tell us what category you want to have it listed under!

Social Media Links

DEF CON 27 Video from Packet Hacking Village on YouTube

DEF CON 27 Video from Social Engineer Village on YouTube

DEF CON 27 Video from Wireless Village on YouTube

DEF CON 27 Video from Main Tracks on YouTube

DEF CON 28 Hotel Registration link is now LIVE!

DEF CON 27 Kali Hardware Hacking Village live CD torrents are live!

Demo-Lab-A-Day! PCAPXRAY by Srinivas Babu

The DEF CON TOOOL lockpick village Call for Staff is live! Come teach lockpicking with us in Vegas, Aug 8-11!

The Unofficial DEF CON Shoot Registration is now LIVE!

More CFP action - this time from DroneWarz!

For DroneWarz we welcome the array of unmanned and remote piloted systems. Fly, swim, roll, hop or some combination of them all. The speakers selected for the DroneWarz village will have the opportunity to demo their research in the Village area before or after their speaking time. Bring your new research or novel applications to the Call for Papers.

LIDAR, swarms, payload delivery, taco delivery, remote takeover of systems, and legal or ethical issues will all stand out. If you have demos or videos of your work that you want to present let us know.

Bonus points for your submission if you know the biggest drone threat identified by our panelists last year.

The Call for Papers closes on June 30 and speakers will be announced July 8.

Aviation Village - Brand new for DEF CON 27!

DEF CON 27 Packet Hacking Village News
The first batch of accepted Packet Hacking Village Talks for DEF CON 27 is LIVE on the DEF CON Forums! Get over there and see what's up with the PHV!

Hacker Culture on the Web

Tinkernut's YouTube Channel
Hack some fun into your weekend!

Put together by a band of IT ninjas, security professionals and hardcore gamers, Hak5 isn’t your typical tech show. We take on hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Then we wrap it all up with a healthy dose of cocktails and geek comedy. Damn the warranties, it’s time to Trust your Technolust.

Clownsec is the natural evolution of activism, artists, hackers, phreaks, musicians and various freedom fighters who show their appreciation for humor in an otherwise dreary world of protesting and hactivism. We realize the power of parody and remember that if you forget to enjoy life and smile you already lost the fight!

ISC Cert Advisories
Put together by a band of IT ninjas, security professionals and hardcore gamers, Hak5 isn’t your typical tech show. We take on hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Then we wrap it all up with a healthy dose of cocktails and geek comedy. Damn the warranties, it’s time to Trust your Technolust.

picoCTF is a computer security game targeted at middle and high school students. The game consists of a series of challenges centered around a unique storyline where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. The challenges are all set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.

Tutorials, reviews, videos, forums for all your security needs.

Exploit Db
The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.

The Hacker News
Originally founded in November 2010 by Mohit Kumar, The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers. Supported and endorsed by administrators and members of various underground hacking groups and communities worldwide, The Hacker News (THN) has become a worldwide leader in information security.

R4v3N’s Blog
Top-Hat-Sec was founded by "R4v3N" and "GalaxyNinja". We have taught hundreds of people all over the world, everyone from enthusiasts, hobbyists, professionals, and from complete beginners to top level seasoned IT veterans. Some of our courses and training also come with certification!

Darknet is a group of like-minded individuals founded around 1999 sharing knowledge in password cracking, racking, cryptography, programming (C++, VB, Delphi, C, Pascal, Assembly, Python, PERL, Bash and so on), network security, Linux, Windows, UNIX and more.

It started off on EFNet IRC network back in the days when being a script kiddy was moderately cool, packet wars were in and lame DOS attacks like WinNUKE and the ath0++ modem drop were cool.


How to Become a Hacker

What is Hacking? An Introduction

A forum for kernel-mode exploration

Security News Portal
The SecurityNewsPortal is a non-profit educational resource dedicated to providing the most comprehensive gathering of the latest news on security, viruses, trojans, hackers, hackings and other things of interest to security professionals.

Cult of the Dead Cow
Based in Lubbock, Texas, CULT OF THE DEAD COW (cDc) is the most-accomplished and longest-running group in the computer underground. Founded in 1984 and widely considered to be the most elite people to ever walk the face of the earth, this think tank has been referred to as both "a bunch of sickos" (Geraldo Rivera) and "the sexiest group of computer hackers there ever was" (Jane Pratt, _Sassy_ and _Jane_ magazines). The cDc is a leading developer of Internet privacy and security tools, which are all free to the public. In addition, the cDc created the first electronic publication, which is still going strong.

The Open Organization of Lockpickers
The mission of the Open Organization Of Lockpickers is to advance the general public knowledge about locks and lockpicking. By examining locks, safes, and other such hardware and by publicly discussing our findings we hope to strip away the mystery with which so many of these products are imbued.

The more that people know about lock technology, the better they are capable of understanding how and where certain weaknesses are present. This makes them well-equipped to participate in sportpicking endeavors and also helps them simply be better consumers in the marketplace, making decisions based on sound fact and research.

top of the page

Recommended Social Media Follows:

Eve Adams @HackerHuntress
Recruitrix, bassist, linguist, #Linux fangirl, #infosec dork, bookworm, #Ingress agent, INTJ, gamer, cyclist. Opinions are mine.

Shane MacDougall @tactical_intel
Security researcher Shane MacDougall, 2x DEFCON SECTF winner. If you want my comedy/film acct it is @planet_shane. #OSINT #hacking #security #kittehs

HD Moore @hdmoore
Rapid7 Research // Metasploit Founder.

Dan Tentler @viss
InfoSec / Entrepreneur / Photographer / Gentleman of Fortune / HomeBrewer / Wannabe Visionary / Professional Bad Guy / work:

Kevin Mitnick @kevinmitnick
Security Consultant, Public Speaker, & Author
Whistling ICBM launch codes since 1988.

Gene Spafford @RobotSpaf
Stream of stories on cyber security, privacy and crime.

Nick Farr @Nickf4rr
He has a global posse. ID: YkS9aWW5Zmbp4NbYDeAXjGTCbEB7ZyeG3cQcBV4szJot2

Chris Wysopal @WeldPond
Co-founder, CTO of Veracode. Former L0pht researcher, developer, and de-obfuscator. Passionate about application security & security transparency.

Marcia Hofmann @marciahofmann
Digital rights lawyer with my own private practice. Special counsel to @EFF, adjunct prof @UCHastingsLaw. Views mine. PGP

Dan Kaminsky @dakami
We can fix it. We have the technology. OK. We need to create the technology. Alright. The policy guys are mucking with the technology. Relax. WE'RE ON IT.

Security Twits @securitytwits
A place to find information security folks. For retweets, @ or DM me or tag posts with #infosecjobs for infosec jobs, #infosecq for questions, and #infoseccfp.

Kevin Poulsen @kpoulsen
Contributing editor at WIRED, and the author of Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground.

Kim Zetter @kimzetter
Senior staff writer for @Wired. Author of new book - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Jennifer Granick @granick
96F6 367D DBA1 9960 650D 228B 4CF3 5752 1F7B 8424

Infosec Taylor Swift @swiftonsecurity
Every single tweet should be good. I make stupid jokes and talk about consumer technology security. People still follow me after reading my bio. Yes, I'm Taylor.

top of the page

Commercial and Stuff to Buy

The Source of Knowledge: The official reseller of past Defcon and Black Hat audio and video recordings
Hacker Stickers: Hacker related Stickers and T-Shirts
KeyKatcher Keystroke Loggers: 32k/64k models available
MECO: Govt. Surplus hardware and really neat toys
TCSM: Counter measures.
Smart Shield Protects 'Big Brother' from snarfing your smartcard info.
Think Geek
Bump My Lock Bump Keys, hammers, Lock picks and more (DC17 Vendor)

return to top

Government & Commercial Groups - Computer Security, & Intelligence
Info War a-la Winn Schwartau style. Lots of interesting stuff relating to information warfare.
Central Intelligence Agency (CIA)
National Security Agency (NSA)
International Computer Security Association (ICSA)
Web Site for Private Investigators
Department of Homeland Security

return to top

Groups & Organizations

ISO 17799 User Group: Main international user group of the international computer security standard (6 August 2004)
The Electronic Privacy Information Center keeps you informed about current privacy and legislative issues.
The Electronic Frontier Foundation keeps you informed about current privacy and legislative issues. 
Computer Emergency Response Team. (CERT)

return to top

Information & FAQs

Information Security Glossary: This resource will hopefully prove to be useful in helping you to understand the jargon and terminology used within the information security industry and sector
Xatrix Security: Links, free e-boooks, and lots more. (6 August 2004)
Dsniff white paper in PDF format.
A good ISDN home page on the web at Cal Tech
The Simple Nomad's Nomad Mobile Research (NMRC) site. Looks very cool, contains good information, as well as the unofficial Novell and NT Hack FAQs.
Hack Faq: old but a good place to start.
Federal Guidelines for Searching and Seizing Computers.
A very good source of info for getting started in the wonderful world of amateur SATCOM. Read. Learn. Enjoy! Feeeel the burn! Be one with the RF.
Plans for how to build a pirate radio transmitter can be found here, here, or here at the free radio homesite.
FRM has how-to files, a message board, and I think a pirate log. M.I.T. Gallery of past hacks.

return to top

Information Search Resources

Australia's phone book.
Infobel has some of the same info for the Netherlands, Belgium, France (small bit) and Germany. Also some maps.
PublicData has a subscription service to search Texas Criminal records, and other public information.
This URL lists all the port numbers.
TRAC Transactional Records Access Clearinghouse. Your source for comprehensive, independent, and nonpartisan information on federal law enforcement.
Netcheck: a kind of internet better business bureau.
Switchboard Free surname searches, address, and telephone number criss-cross lookups.
National Address Server US Post Office Database that actually corrects addresses and gives you zip plus 4. 
SEC Filings search gives you detailed information on companies that trade their stock on the stock exchange. 
Four 11 People Finder is a good place to obtain e-mail addresses.
Inernet Address Finder will locate an e-mail address of almost four million people.
MapQuest Insert an address and get a street map

return to top

Lockpicking Resources

Lockpicking 101 - forum based site where you can learn to "unlock your skills". Lockpicking, Locksmithing, Locks and Picks

return to top

Mac Security Related Resources Free hosting for mac hacking and security web sites. (26 May 2004) Most up-to-date mac hacking and security source. (26 May 2004) Excellent archive of Mac security info
Freaky's Mac Archive: Freaky's collection of all things Mac security related
return to top<

NT Security Related Resources

SomarSoft's homepage has NT security related information.
John Savill's Windows NT FAQ at SavillTech.
Scott Schnoll's Unofficial Microsoft Internet Explorer Security FAQ.

return to top

non-English Security Sites

Hackerz Voice: France based hacker magazine (en français)

return to top

Other People's Pages

The Lair of Helle Chaos.
Pluvius's page.

return to top

Other Security Related Resources

Ninja Palm Syndicate - Your supply of Palm Networking, Security, & Coding tools to get the job done! (29 Aug 2005)
Public WarGames site Liquidmatrix news and links
Cell Phone Hacks: Mobile Phone and Providers modification discussion board.
Hack in the box: Good security news site
Phoneboy: Excellent archive of Checkpoint Firewall -1 FAQs
The CryptLib homepage.
No more CISCO password misery(tm)
How to make TEMPEST eavesdropping difficult using only software.

return to top

Pirate Radio & Alternative Media

Phrack Magazine's homepage, the largest computer underground 'zine.

return to top

Print Publications

The Hackademy Journal - Magazine dedicated to technical articles about computer security and hacking
Private Line magazine's page by Tom Farly
2600 Magazine's Homepage
WiReDS WIRED Security page
Iron Feather Journal: Stevyn and Hanna's Hacker/Phreaker/Raver/PHUN Journal

return to top

Privacy - Crypto - Anonymity

EverCrack (GPL) Open Source Cryptanalysis Engine (Feb 2006)
Proxify: Web-based proxy service with surfer filtering support. (27 May 2004)
erehwon's Strong Cryptography Links
Bennet Yee's Security-Related Net Pointers (from CMU). 
Home Pages of Cryptography Researchers (Kevin McCurley) 
Ron Davie's Electronic Money and Money in History 
Security Resource Net
Spaf's Hotlist on Computer Security, Law, Privacy
World Wide Web Consortium Security Overview 
Yahoo's Security and Encryption Page

return to top

Underground Groups

SecureRoot: Established security and hacking portal and directory (6 August 2004)
Irvine Underground: H/P/V/A/C located in Orange County, Southern California
Cult of the Dead C0W: cDc Communications "World domination through media saturation."
TwistedinterneT ServiceS: Good archive of t-philes. Dare to take the road to knowledge, power, and information.
PLA: Phone Luzers of America! Articles, phone pranks, tapes and all things telco.
SotMesc/GCMS: Puts out a newsletter and holds a conference.  Check them out. 
CCC: Chaos Computer Club. They have excellent information, and hold an annual Christmas convention in Germeny.
Nevada Underground: In Color 
Hack Canada: Canada's more than just maple syrup and hockey, its got hackers too!
The pHreak webhub in the Uk with informative articles on things alterna and semi-cultural.

return to top

Unix Security Related Resources

Packet Storm: up to date exploit code and security news.
Root Prompt: Unix news, lots of good info

return to top