If you love the C64, you’ll love going back to where it all began: prompt, floppy disks, and cunning. Netshacker is an experience built for demanding retrogamers — an authentic terminal, believable logic, no shortcuts.
It’s not a “game pretending to be retro” — it’s a product with an old-school mindset and modern craftsmanship. Every output has meaning. Every mission is solved with brains, not glitches.
The rough idea for this site was to create and provide answers to commonly asked questions and those that aren't currently answered online. It is maintained by hackers. If you do not understand a term, look it up at Wikipedia. If you've come here to find answers or examples, hopefully you will find them. If you have an answer or example, we hope that you will leave those as well. Accounts are free, the only reason we require an email address to register here is to prevent the spam bots from hitting our site.
Ideally everything recommended here is free, open source, and works on most operating systems. If you see a page that you could make easier to understand for most readers, or would like to create one that follows this philosophy, please help us out, accounts are free!
Well, it's been an interesting year, hasn't it? Feel like talking about technology or security? Unfortunately, Pumpcon is happening this year. Pumpcon has a strict no recording policy. We've hosted talks on all sorts of technical, security and hacker things.
ESP32 Bus Pirate is an open-source firmware that turns your device into a multi-protocol hacker's tool, inspired by the legendary Bus Pirate. It supports sniffing, sending, scripting, and interacting with various digital protocols (I2C, UART, 1-Wire, SPI, etc.) via a serial terminal or web-based CLI. It also communicates with radio protocols like Bluetooth, Wi-Fi, Sub-GHz and RFID.
Users interact with the unit over CLI, serial, or over wifi if you connect your laptop to the unit as an access point.
Supports over a dozen interfaces and several dozen different operations.
The cool thing is, if you do electronics you probably have one or two sitting around right now.
During our security research on Unitree robotic platforms, we discovered a critical vulnerability in the Bluetooth Low Energy (BLE) Wi-Fi configuration interface. This vulnerability affects multiple Unitree robot models including Go2, G1, H1 and B2 series robots up to the latest firmware from today [20. September 2025].
The vulnerability combines multiple security issues: hardcoded cryptographic keys, trivial authentication bypass, and unsanitized command injection. What makes this particularly concerning is that it's completely wormable - infected robots can automatically compromise other robots in BLE range. This vulnerability allows the attacker to completely takeover the device.
These are the cryptographic keys:
A universal LD_PRELOAD library that disables TLS certificate verification across multiple TLS libraries and platforms. Single binary adapts to the target platform. Platform-specific optimizations for thread safety. All major TLS implementations covered. Works on embedded systems and old Linux devices.
The Minigotchi firmware ported to the ESP32. Due to a surge in people asking for ESP32 support, I have created this fork. Fundamentally the ESP8266 and ESP32 can perform similar functions, although the ESP32 has more features, memory, computing power, etc. We have more and more ESP32s being supported, feel free to ask me about supporting a device.
A simple recovery menu running on the IOSU for unbricking, which can be booted using udpih.
Some Wii U's don't show any TV output, if it hasn't been configured properly before. If that's the case download the recovery_menu_dc_init file and rename it to recovery_menu. This build does display controller initialization and might fix the issue. Note that this build only outputs 480p and has no GamePad output!
The recovery menu updates the power LED for debugging. The following patterns are used:
A curated list of cutting-edge cybersecurity tools showcased at the Black Hat Arsenal events — covering offensive, defensive, and research-focused security utilities. Whether you're in red teaming, blue teaming, appsec, or OSINT — this list helps you explore and leverage the best tools demonstrated live by security professionals across the world.
The tools are grouped by the location of the Black Hat event (e.g., USA, Europe, Asia). Under each location, tools are further organized by year. Inside the section of every year, you will find the tools organized by track category, each with descriptions, authors, and GitHub links (where available).
This repository covers tools, techniques, and research for hacking open-source, autonomous, FPV (First-Person View), and proprietary drone systems—from telemetry and flight control to hardware, firmware, and communication protocols.
And old-school hacker zine that focuses on exploit development, abusing operating systems in fascinating ways, and various forms of malware.
An archive of all known ports of Doom, what they run on (or as), and how.
Gain another host's network access permissions by establishing a stateful TCP connection with a spoofed source IP. Requires all of the hosts in question to be on the same subnet; uses ARP cache poisoning.
A curated list of search engines useful during penetration testing, vulnerability assessments, red/blue team operations, bug bounties, and more.
FREE-WILi is the embedded development tool you’ve been waiting for. Designed to simplify the process of testing, debugging, and developing electronic systems, FREE-WiLi is packed with a wide array of interfaces and features to handle all your development needs.
Supports I2C, SPI, PIO, UART over GPIO pins. USB interfaces. Programmable voltages. Has an FPGA on board for emulating other devices. SMA connectors for antennae. IR transmission and reception. Speaker and microphone.
They even ported the firmware to the Defcon 32 badge.
The Tick is the next evolution in covert access control system implants. Designed for a seamless integration behind card readers, The Tick silently intercepts, logs, and replays access credentials with greater efficiency and stealth than ever before. Compatible with a wide range of RFID systems, provides invaluable (to red teamers) insights into facility (in)security, while enabling advanced credential injection.
Once installed behind an access control unit, you can interact with it over Bluetooth or wifi to configure it, extract what it's captured so far, and upgrade the firmware.
A shell script to automate the setup of Linux router for IoT device traffic analysis and SSL MITM. It looks like it assumes that you're running it on an OpenWRT device (but I could be wrong).
A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application. This could also be useful if you're trying to reverse engineer the API a mobile app uses.
The Lainzine is a free, not-for-profit zine created (largely) by / for fans of the late-90s anime Serial Experiments Lain and the many relevant communities, websites, and dusty art-projects it has inspired over the last decades. topics covered include "digital life", the intersection of art and computers, cyberpunk themes, programming and opsec, pseudo-religious technobabble, and whatever else people feel like sharing, all presented in a lain-inspired a e s t h e t i q u e format.
If any of the topics above seem interesting to you, have a look at the archive. "production quality" varies a bit, as it's taken a while to figure out how best to present things and make them all pretty, but there's still interesting stuff to read no matter which you pick up.
And, if you like what you see there and have something you want to share as well, please don't hesitate to read the submission guidelines and do so! as a free community project, the lainzine is what people make of it, with those people being anyone at all who feels some sort of affiliation with lain and the many things the name has come to mean. so don't feel like your work or ideas don't belong just because they differ a bit from what's been in past zines. we're all connected, after all.
Hackers Teaching Hackers is an Information Security practitioner conference held annually in Columbus Ohio. Founded in 2014, attendees are offered an array of hands-on educational experiences through villages, capture the flag (CTF) challenges, scavenger hunts, speakers, and general networking opportunities. Anyone with a curious thirst for knowledge is welcome: hackers, defenders, makers, breakers, tinkerers, and hobbyists.
We are all hackers. Always learning, but with something to share.