As the main page states, the Hacker Bibliography seeks to enumerate all the advances of the (in)security world. Ultimately, one will be able to query on a topical tag to bring up a list of the past hacker presentations (and academic papers) relevant to that topic. Essentially, the bibliography seeks to organize the wealth of information and exploits hackers have contributed.

Currently, the Bibliography is stored as flat files in the YAML format, to both facilitate readability/editability via humans and data analysis or translation into other formats via scripts.

Eventually, the content itself will be available on its own webpage,, in a more browsable format as well as the raw data files.

Samples of work, person, and source content, with some notes: sample

Current Content

Currently, all DefCon presentations have been noted by title and presenters in "sources."

The files are available under:

Rest assured, the current small state of the content will not last. This Bibliography is the project of a dedicated (if novice) hacker historian, and will not stagnate.

Current Analysis

Some current analysis:

RFC, actually

Your comments are requested.

General information on joining the Community, or getting in contact.

In terms of the Bibliography specifically, you can especially contribute in the following ways:

  • verifiable content in YAML format
  • answering the questions: what content is important? should we really keep track of hackers? is some of the suggestion information (education, past workplaces) a privacy violation, or not? The historian says this is great data, the hacker is a little worried.
  • interesting analysis or ideas for such (feel free to keep that on your site, but it'd be great to know and link here)
  • suggestions of (automated) translations into other useful formats, or supply of such
  • any general suggestions, ideas, or comments!
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License