THC Members

. Freeworld Members
Dimitri   (dimitri at thc dot org)Public Key
 

Tool Coder, Writer

DJ RevMoon   (djrevmoon at thc dot org)Public Key
 

UNIX Coder

Marvel   (marvel at thc dot org)Public Key
 

NT Coder, Writer

RD   (rd at thc dot org)Public Key
 

UNIX Coder, Writer

VonJeek   (vonjeek at thc dot org)Public Key
 

Writer, Oracle Expert

Yang   (yang at thc dot org) 
 

UNIX Coder, Writer

. Invisible Members
0xe28aa8bd   (members at thc dot org) 
 

Maintainer, Supporter

0x0507daae   (members at thc dot org) 
 

Writer

0x3d6e1fae   (members at thc dot org) 
 

UNIX Coder, Writer

. Non-freeworld Members
Doc Holiday   (holiday at thc dot org)Public Key
 

NT Coder

Gamma   (gamma at thc dot org)Public Key
 

UNIX Coder, Phreaker

Gemfire   (gemfire at thc dot org) 
 

PC Coder, Writer

Johnny Cyberpunk   (jcyberpunk at thc dot org)Public Key
 

Tool & Exploit Coder, Writer

Mindmaniac   (mindm at thc dot org)Public Key
 

UNIX Coder, Low Tech

Nil   (nil at thc dot org)Public Key
 

Tool Coder, Writer

Skyper   (skyper at thc dot org)Public Key
 

UNIX Coder, Server Maintainer

Tick   (tick at thc dot org) 
 

UNIX Coder, Writer

Van Hauser   (vh at thc dot org)Public Key
 

UNIX Coder, PC Coder, Writer

Whyking   (whyking at thc dot org)Public Key
 

UNIX Coder

Wilkins   (wilkins at thc dot org)Public Key
 

Writer

 
 

Membership Application

We are always looking for computer enthusiasts to enhance and extend our team. If you are interested in IT security in terms of theory and practice, and like to share and exchange experiences, ideas and fun with others, join the team of THC. Drop a mail.

Please note that THC is not an 'underground hacking' club for illegal activities. Our team consists of open-minded, friendly people concerned with real problems, that enjoy to chat and laugh. If you prefer doing your stuff alone in the dark or seek to conflict with laws, THC is not your group.

 
 

 
 

Mailing List

The Hacker's Choice offers a public mailing list for announcements of new THC releases, papers and exploits. You can subscribe to the list by entering your email address in the field below.


Subscribe