Similar sites like defcon.org


DEF CON® Hacking Conference Home

The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest.
Annual hacker gathering in Las Vegas, Nevada. DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt, and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. https://en.wikipedia.org/wiki/Defcon.org
Categories: Information Security, Information Technology
Topics: def con, defcon, defcon 2017, defcon 2018, defcon 25

Facebook ♡: 3
Share
defcon.org
defcon.org Reviews


Sites similar to defcon.org - Top 26 defcon.org alternatives

blackhat.com

blackhat.com blackhat.com           
Black Hat | Home
Black Hat
Computer hacker with malicious intent. A black hat (black hat hacker or blackhat) is a computer hacker who usually violates laws or typical ethical standards. The term originates from 1950s westerns, when bad guys typically wore black hats and good guys white hats. Black hat hackers aim to hack into any system for their own profit or out of malice. A black hat is contrasted with a white hat. A third category is the gray hat, a person who hacks with good intentions but sometimes without permission.

Semrush Rank: 35,226 Facebook ♡: 5,889
Categories: Information Security, Information Technology
Similar? Yes 0 No 0
infosec-conferences.com

infosec-conferences.com infosec-conferences.com           
Cybersecurity Conferences 2024 - 2025 | Official Mega List
Come and visit our Mega List of Cybersecurity Conferences. We have over 700+ events at any given time in literally every InfoSec niche imaginable!


Moz DA: 38 Moz Rank: 4.7 Semrush Rank: 560,642 Facebook ♡: 408
Categories: Computers/Hacking, Computers/Programming/Languages, Reference/Education, Business, Information Technology
Similar? Yes 0 No 0
hackerone.com

hackerone.com hackerone.com           
HackerOne | #1 Trusted Security Platform and Hacker Program
Reduce the risk of a security incident by working with the world’s largest community of trusted ethical hackers. HackerOne offers bug bounty, VDP, security assessments, attack surface management, and pentest solutions.


Semrush Rank: 39,426 Facebook ♡: 4,202
Categories: Information Security, Information Technology
Similar? Yes 0 No 0
defconwarningsystem.com

defconwarningsystem.com defconwarningsystem.com           
The DEFCON Warning System - The DEFCON Warning System
Ongoing Geointel, OSInt, and Analysis in the theater of nuclear war. Established 1984. DEFCON level alert code for the public.


Moz DA: 43 Moz Rank: 4.6 Semrush Rank: 748,874 Facebook ♡: 2,624
Categories: Public Information, Political Organizations
Similar? Yes 0 No 0
shodan.io

shodan.io shodan.io           
Shodan Search Engine
Search Engine for the Internet of Things
American web search engine. Shodan is a search engine that lets users search for various types of servers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server. Shodan collects data mostly on web servers (HTTP/HTTPS – ports 80, 8080, 443, 8443), as well as FTP (port 21), SSH (port 22), Telnet (port 23), SNMP (port 161), IMAP (ports 143, or (encrypted) 993), SMTP (port 25), SIP (port 5060), and Real Time Streaming Protocol (RTSP, port 554). The latter can be used to access webcams and their video streams.It was launched in 2009 by computer programmer John Matherly, who, in 2003, conceived the idea of searching devices linked to the Internet.

Semrush Rank: 47,400 Facebook ♡: 5,352
Categories: Computers/Internet/Searching, Computers/Security, Computers/Internet/Chat, Information Security, Information Technology
Similar? Yes 0 No 0
msspalert.com

msspalert.com msspalert.com           
Home: Managed Security Services Provider News, Cybersecurity Research - MSSP Alert
MSSP Alert: News & research for Managed Security Services Providers (MSSPs), MSPs & cybersecurity professionals who safeguard customer data & networks.


Facebook ♡: 0
Categories: Business, Information Technology
Similar? Yes 0 No 0
wallofsheep.com

wallofsheep.com wallofsheep.com           
Wall of Sheep
Wall of Sheep, your one stop shop for security related information, lan taps, lock picks, bump keys, spy gear, security awareness, hack gadgets and more.



Categories: Information Security, Entertainment
Similar? Yes 0 No 0
defcongroups.org

defcongroups.org defcongroups.org           
DEF CON Groups - DEF CON Forums
DEF CON Groups


Semrush Rank: 1,499,170 Facebook ♡: 0
Categories: Business, Information Technology
Similar? Yes 0 No 0
ctftime.org

ctftime.org ctftime.org           
CTFtime.org / All about CTF (Capture The Flag)
Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups


Semrush Rank: 312,908
Categories: Internet Services, Information and Computer Security
Similar? Yes 0 No 0
eventegg.com

eventegg.com eventegg.com           
Business and Academic Events Worldwide - Eventegg.com
Eventegg is an event finder, provides travel and support services to attendees who wish to attend congresses, conferences, trade shows, fair and exhibitions


Moz DA: 42 Moz Rank: 4.4 Semrush Rank: 2,182,334 Facebook ♡: 0
Categories: Business, General Organizations
Similar? Yes 0 No 0
stotan.org

stotan.org stotan.org           




Categories: Information Technology
Similar? Yes 0 No 0
the-parallax.com

the-parallax.com the-parallax.com           
The Parallax View
News, features, and more on health care and cybersecurity.


Semrush Rank: 298,572
Categories: Blogs/Wiki, Information Technology
Similar? Yes 0 No 0
irongeek.com

irongeek.com irongeek.com           
Irongeek.com
Irongeek's Information Security site with tutorials, articles and other information.


Semrush Rank: 875,379 Facebook ♡: 421
Categories: Computers/Software/Operating Systems, Computers/Security, Computers/Hacking, Technical/Business Forums, ???
Similar? Yes 0 No 0
introversion.co.uk

introversion.co.uk introversion.co.uk           
Introversion Software
Introversion Software is one of the UK's most-respected and successful independent game developers and publishers. Founded in 2001 by three university students, we have gone on to create five critically acclaimed video games including cult classics Prison Architect, Uplink, DEFCON, Darwinia and Multiwinia.



Categories: Games, Games
Similar? Yes 0 No 0
darkreading.com

darkreading.com darkreading.com           
Dark Reading | Security | Protect The Business
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.


Moz DA: 80 Moz Rank: 5.6 Semrush Rank: 86,338 Facebook ♡: 2,155
Categories: Business/Information Technology, Computers/Hacking, Computers/Hardware, Technical Information, Information Technology
Similar? Yes 0 No 0
social-engineer.org

social-engineer.org social-engineer.org           
The Official Social Engineering Hub - Security Through Education
The Official Social Engineering Hub is an online resource for security professionals, adversarial simulators (pentesters), and enthusiasts.


Semrush Rank: 885,202 Facebook ♡: 607
Categories: Technical/Business Forums, Information Technology
Similar? Yes 0 No 0
hak5.org

hak5.org hak5.org           
Hacking Gear & Media | Hak5 Official Site
Hak5 — industry leading hacker gear & award winning hacking shows for red teams, cyber security students and IT professionals. Creators of the WiFi Pineapple, USB Rubber Ducky & more. Home to an inclusive information security community. Established in 2005.


Moz DA: 63 Moz Rank: 5.3 Semrush Rank: 62,650 Facebook ♡: 4,950
Categories: Information Security, ???,Hacking
Similar? Yes 0 No 0
hackers-arise.com

hackers-arise.com hackers-arise.com           
Blog | hackers-arise
Blog | hackers-arise


Moz DA: 34 Moz Rank: 4.2 Semrush Rank: 435,808 Facebook ♡: 150
Categories: Education/Reference, ???
Similar? Yes 0 No 0
darknet.org.uk

darknet.org.uk darknet.org.uk           
Darknet - Hacking Tools, Hacker News & Cyber Security
Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.


Moz DA: 59 Moz Rank: 4.8 Semrush Rank: 1,291,724 Facebook ♡: 1,514
Categories: Computers/Hacking, Computers/Security, Computers/Programming/Languages, Information Security, ???
Similar? Yes 0 No 0
bugcrowd.com

bugcrowd.com bugcrowd.com           
#1 Crowdsourced Cybersecurity Platform | Bugcrowd
Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.


Semrush Rank: 146,541 Facebook ♡: 1,666
Categories: Internet Services, Information Technology
Similar? Yes 0 No 0
exploit-db.com

exploit-db.com exploit-db.com           
exploit-db.com
Sucuri WebSite Firewall - Access Denied


Semrush Rank: 69,963 Facebook ♡: 7,395
Categories: Potential Hacking/Computer Crime, Information Technology
Similar? Yes 0 No 0
hitb.org

hitb.org hitb.org           
Hack In The Box : Keeping Knowledge Free for Over a Decade
Hack In The Box : Keeping Knowledge Free for Over a Decade


Facebook ♡: 66
Categories: Non-Profit/Advocacy/NGO, Information Technology
Similar? Yes 0 No 0
sans.org

sans.org sans.org           
Cyber Security Training, Degrees & Resources | SANS Institute
SANS Institute is the most trusted resource for cybersecurity training, certifications and research. Offering more than 60 courses across all practice areas, SANS trains over 40,000 cybersecurity professionals annually.
Font designed to aid retention of the content written using it. Sans forgetica is a variation of a sans-serif typeface, claimed to assist students in retaining the information which they read. Two years after its release and having received a great deal of publicity, the first peer-reviewed study demonstrated that Sans Forgetica was not effective for enhancing memory. Back-slanted and with gaps in the letter forms, the typeface is designed to reduce legibility; it adds reading complexity to learning tasks based on the psychological principle known as desirable difficulty. It is licensed under the Creative Commons Attribution-NonCommercial license.

Moz DA: 76 Moz Rank: 5.8 Semrush Rank: 12,780 Facebook ♡: 2,392
Categories: Education/Reference, Information Technology
Similar? Yes 0 No 0
itspmagazine.com

itspmagazine.com itspmagazine.com           
ITSPmagazine | At the Intersection of Technology, Cybersecurity, and Society.
Welcome To the intersection of technology, cybersecurity, and society |
Join us on our journey into the past, the present, and the future, as we
explore the relationship between technology and humanity. Together we are
going to find out what it means to live in a society where everything is
connected, and the only constant is change. Knowledge is power — now more
than ever.


Semrush Rank: 843,946
Categories: Business, Information Technology
Similar? Yes 0 No 0
danielmiessler.com

danielmiessler.com danielmiessler.com           
Unsupervised Learning
Unsupervised Learning is a Security, AI, and Meaning-focused newsletter & podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.


Moz DA: 59 Moz Rank: 5 Semrush Rank: 59,125 Facebook ♡: 98
Categories: Computers/Data Formats, Computers/Software/Operating Systems, Computers/Internet/On the Web, Technical/Business Forums, Information Technology
Similar? Yes 0 No 0
zenk-security.com

zenk-security.com zenk-security.com           
ZenK-Security :: Communauté de sécurité informatique
Zenk Security est une communauté de hacking et de sécurité informatique francophone basé sur le partage et l'apprentissage.


Moz DA: 42 Moz Rank: 4.2 Semrush Rank: 1,364,717 Facebook ♡: 125
Categories: Technical/Business Forums, Information Technology
Similar? Yes 0 No 0
Suggest Site to this list (defcon.org)
    Please only suggest if the website is similar. We do check suggested websites carefully and only approve if it's completely similar.
We'll never share your email with anyone else. You'll get a confirmation email.

defcon.org Reviews

No reviews have been made yet.
What is sitelike.org?

sitelike.org is a free tool to search and find Similar Websites, alternatives or related to the given site.
It helps you to find similar sites based on keyword overlap and shared audience.
Our team is manually checking and finding similar websites and also our visitors are helping us to find the best similar websites.
"Similar sites like" first finds the best and top keywords for all websites and rank them.
We also use our internal algorithm with analysing the website contents and also several web sources to determine the main topics of websites which are used to find similar websites that have the closest matching set of topics. Our ranking system uses user generated content created by our team, our visitors and also our algorithm.

15
Visited: 15 times