A secure world is a better world. Our data has to be secure. Our privacy has to be un-touchable. Defending freedom is our cause. (Read more) (Browse Projects)



This tool finds undocumented and secret commands implemented in a smartcard. (Read more)


Our 20th anniversary is coming up! We will do an event together with BerlinSides from the 29th-31st May 2015 in Berlin! Everybody is welcome, entry is free. Events, networking, talks, party! Stay tuned for information here :-) #TAXX https://www.thc.org


After 9 years of downtime THC is happy to announce its public IRC server back online! Feel free to join and exchange your ideas with the Hacking Community. https://ircs-web.thc.org


This proof of concept tool exploits a vulnerabity in SSL. It can knock of a server off the internet by exhausting the CPU power. This tool is by far not complete and can be greatly enhanced to further the impact..(Download Tool, Press Release)

David Maciejak's HYDRA ARTICLE

This article explains how to use Hydra to check for weak passwords. It is a powerful real-time brute force tool for hackers and network administrators alike. Hydra can automatically crack email passwords, gain access to routers, windows systems, telnet or ssh protected servers, ...(Read more).

(Download Article, Video 1, Video 2, Video 3, Video 4)

*** Vodafone Phone Hacking Scandal ***

Vodafone customers are exposed to phone tapping. THC reveals secrets of Vodafone's insecure Femto equipment.

Crappy and braindead design of femto puts customers at risk. Problem can not be fixed by hardening femto. Redesign (e.g. removing mini RNC from the femto) is the only secure way forward. Vodafone urget to improve security.

3G/UMTS/WCDMA has such nice security features. Shame to see how one operator can fuck it up so badly...

(Read Blog, Read Wiki)

Controlling motors, LEDs, count down timers, mini robots or sniffing protocols is what hackers like to do.

The Arduino is a nifty little hardware kit. It comes with many Input/Output pins and can run off a battery for weeks!

The hardware can be programmed in standard C. Projects exists for ethernet, rfid, wifi, temperature sensor, power consumption meters, IR sensor/transmitter, ...
(Read more)

T-Shirts are a great way to show your support for THC. This limited edition of 50 pieces is available to members and close friends. A few are left so contact us if you did not get one yet! (Read more)

The bearer of this t-shirt is an honourable member of the hacking community.


THC has assembled novel hackers from around the world. Our mission is to expose fishy security products and make sure that your rights are protected. Founded in 1995 THC has published over 70 papers and software releases. In contrast to most security companies, THC aims at analyzing and preventing novel, emerging security problems. The group fosters independent research not driven by commercial interests and paradigms. Currently, THC is among the top non-commercial security groups worldwide.


THC does not stop when you pull the plug. We have scheduled real-life meetings to discuss matter of importance. THC members have participated in the following events (move your mouse over the images).

Camp 1999 HAL 2001 ManilaCon 2003 PH-Neutral 2003 Camp 2003 Hack In A Box 2003 What The Hack TAX - 10th Anniversary of THC EUSecWest 2006 RuxCon 2006  2007




You can search the complete web site of The Hacker's Choice using a search service provided by Google.