Welcome to The Forum

立即注册以访问我们的所有功能。注册并登录后,您将能够创建主题、发布对现有主题的回复

俄黑客组织向美英等10国"宣战"

俄罗斯黑客组织“Killnet”黑客组织认为,这些西方国家正支持“反俄运动”。

CNHACKTEAM黑客论坛3.0

本论坛为增强用户体验已开发3款主题,分别为极客黑/骇客绿/简约白等更多功能.

HACKER网络安全攻防业务合作

创世信安拥有全球顶尖华人黑客攻防技术团队,涉及多个领域,值得信赖!

  • Welcome to the world's largest Chinese hacker forum

    Welcome to the world's largest Chinese hacker forum, our forum registration is open! You can now register for technical communication with us, this is a free and open to the world of the BBS, we founded the purpose for the study of network security, please don't release business of black/grey, or on the BBS posts, to seek help hacker if violations, we will permanently frozen your IP and account, thank you for your cooperation. Hacker attack and defense cracking or network Security

    business please click here: Creation Security  From CNHACKTEAM

Forums

  1. Network intelligence analysis threat detection

    1. News & Security threats

      As the network security situation becomes more and more complicated, the study of threat intelligence becomes more and more important. All parties involved in threat intelligence perception, sharing and analysis combine their own business processes and security requirements to enhance threat intelligence perception capabilities for core assets.

      220
      posts
  2. CHT Help Center

    1. CHT Help Center

      Here you can submit infiltration/reverse/crack/programming/hacking /CTF/ radio/hardware related topics for help, this section prohibits all advertising, black/grey production, if you violate our rules, we will put your account on the permanent suspended access list.

      271
      posts
  3. C19n37k Team

    1. system notice

      After entering the website, please click here to know the latest official announcement of our forum and the rules of using the website.

      32
      posts
    2. self-introduction

      After registration, new members will pass their information to other members, so that we can better communicate with each other.

      51
      posts
  4. Network technology research and learning

    1. Penetration testing

      对于 Window/ Solaris / AIX / Linux / Adroid / IOS/MS-SQL / Oracle / MySQL / DB2 / Access/WEB / 电子邮件 / 电子商务系统 / 路由器 / 交换机 / 防火墙 进行渗透入侵测试,达到知攻击,懂防御的目的。

      444
      posts
    2. Network technology

      This block contains any technical articles, you can publish here such as IP/NET network technology tutorials or WEB server security vulnerabilities/security project research /IOS Android development/scripting modules /Linux Windows tutorials/processor chips and more technical miscellaneous.

      14
      posts
    3. Vulnerability analysis

      Understand that hackers in all non-damaged state of the website, hardware, software, protocol implementation or system security policy on the defects of vulnerability mining, so that attackers can access or damage the system without authorization.

      106
      posts
    4. Trojan virus

      Analysis reports and solutions for system viruses, worms, Trojans, script viruses, macro viruses, backdoor viruses, virus planting program viruses, destructive program viruses, joke viruses, bundled encryption viruses, etc.

      36
      posts
    5. Capture The Flag

      In this section you can read technical articles on any attack and defense drill system, so that you can better learn penetration testing techniques.

      3
      posts
    6. Reverse engineering

      Reverse analysis of all kinds of system programs, get what you want in reverse, crack all kinds of difficult problems, and increase your skills.

      32
      posts
    7. Hacker Social Engineering

      Hacker social work attack is a way to gain their own interests by deception, injury and other harmful means against psychological traps such as psychological weakness, instinctive reaction, curiosity, trust and greed of the attacked.

      1
      post
    8. Cryptography/encryption/forensics/others

      Access to communications intelligence decryption & cryptography/forensics information, data recovery/malicious mail/computer systems, Linux, Windows, iOS, Android and other technical articles.

      4
      posts
    9. Artificial intelligence (ai)

      Artificial Intelligence (Artificial Intelligence) is a new technical science that researches and develops theories, methods, technologies and application systems for simulating, extending and expanding human Intelligence.

      95
      posts
    10. Hardware/Iot security

      At present, the security of the Internet of Things project is mainly considered from six aspects: data confidentiality, data integrity, data freshness, availability, robustness and access control. Special reinforcement of these aspects is the main method to ensure the security of the Internet of Things.

      6
      posts
  5. Programming development

    1. 1,151
      posts
  6. C19n37K/CNHACKTEAM BBS

    1. 2
      posts