open/close all folders
Anime and Manga
- Battle Royale: In a slightly more heroic example, formerly Playful Hacker Shinji Mimura decides to use his skills for something a bit more serious after being forced into the Program. In all three versions, he attempts to hack into the government's computer system to disable the collars in order to make an escape attempt: he is caught in the manga and novel versions halfway through his plan due to the microphones in the collars; but in the movie, he does succeed in doing so. His uncle, particularly in the manga version, is also an example of this trope. It is revealed at the end of the novel version that Shogo Kawada hacked into the computers before the Program in order to get the specs for the collars. Whether this makes him a Playful Hacker or The Cracker is up to the reader.
- Dengeki Daisy: The plot is driven by a mysterious cracker.
- Digimon Adventure 02: The Digimon Kaiser, using his programing skills to conquer the Digital World.
- Digimon Tamers: Mitsuo Yamaki, whose goal is to seek and destroy Digimon (at first). Inverted that he's working for the government, and using his skills to stop what he considers a abomination to existence.
- Get Backers: Makubex paired his computer skills with Infinity Fortress's warped reality to set himself up as a dictator. He escaped karmic death with a Heel–Face Turn.
- Lady Jewelpet: In the backstory, Luea hacked into the school's system to insert an illegal student (Lillian) at the behest of Joker as part of their plan to instill chaos in the Lady system and Jewel Land.
- Magical Girl Lyrical Nanoha StrikerS: The Numbers Cyborgs had two crackers as part of their team. Uno, who could break into any computer without being detected as part of her intelligence gathering capabilities, and Quattro, who can screw up any computer as an extension of her illusion skills.
- Mahou Sensei Negima!: Chachamaru took this role during the Mahora Festival arc, hacking into the school's security main computer to screw around with the communications network and shut down the barrier around the school that prevents Chao's
Evasdemon-powered Humongous Mecha from working. The level of her skill forced Playful Hacker Chisame to form a Pactio with Negi and gain the abilities of a Technopath.
- Psycho-Pass: Choe Gu-Sung apparently conceives all the technical means to Makishima's schemes.
- The Calculator in The DCU.
- Bookhunter features 1970's-appropriate hacking: The criminal uses the phone lines to break into and alter the library's computer records.
- The DCU's Psyber-Rats are a rare example of a kind-of-heroic version; they hack for criminal purposes, rather than just the fun of it, but they see themselves as Just Like Robin Hood.
- Oliver Wendell Jones in Bloom County is both this and a Playful Hacker, depending on his mood; he has often done things that have caused chaos on a national—or global—scale, but has occasionally also done things to benefit people.
- And sometimes he messes it up too. For example, one time, in a strip released in the early 1980's, he hacked into the headquarters of Russia's state-owned newspaper and changed the headline to what he thought was, "Gorbachev Urges Disarmament! Complete! Total!". What he had actually changed it to (his translation being rather off) was "Gorbachev Sings Tractors! Turnips! Buttocks!"
- The Punisher's friend and ally David "Microchip" Lieberman was sort of an Anti-Villain version (given how he was helping Frank). Formerly a legendary hacker in the early days of computer hacking, he finally messed up and was almost caught, leading to his nephew's death at The Kingpin's orders. He'd later hook up with the Punisher and use his skills to manage and launder his finances (i.e., the money Frank took from the criminals he kills), set-up and equip safehouses, train Castle in more "specialized" skills for his war on crime, obtain hard-to-get ammunition and equipment, and at times, be the voice of reason for Castle, who was far-more obsessed than he was. Sadly, a falling out between the two led to Micro's death at the hands of rogue S.H.I.E.L.D. agent Derek "Stone Cold" Smalls, Micro's later resurrection by the Hood during the Dark Reign, and a full Face–Heel Turn and crossing the Moral Event Horizon by murdering G.W. Bridge, making him and his former friend enemies.
- The Joker himself develops this talent right before Batman: No Man's Land. With only a skeleton staff on duty at Arkham and only inexperienced orderlies able to distribute medication to the inmates, he hacks into the system and makes sure everyone gets stuff they clearly should not have. Killer Croc is given stimulants, manic depressive patients get depressants, and the Joker himself is exempt from any meds. (And possibly as a nasty joke, the Ventriloquist is given prescription-strength laxatives.) As he planned, complete pandemonium ensues and he seizes control of the place.
- Mega Man: Defender of the Human Race has Tiesel Bonne, as well as Mr. Wire.
- The Shadowchasers Series has Shadowjacks, hackers who can use magical skills in combination with technology to surf the net. Not all Shadowjacks qualify for this Trope, but many do. One fic in the series, Shadowchasers: Torment, mentions Black Jack, the greatest Shadowjack of all who clearly fits this Trope, although eventually he had to flee the country and hide out in some place with no extradition treaties after his intrusions were discovered. Still, he's willing to help any other Shadowjacks with the knowledge to find him, his skills at hacking so great, he was even able to find information on someone who was assigned to Area 51.
- Three Months a Fox has Ricker Tavy, a sociopathic mongoose who, before being captured by The Purpose to design a sophisticated cyber-spy network to track and monitor the movements of every predator in Zootopia, was a hacker who made a living selling his considerable skills to whoever was willing to pay, regardless of the illegality.
- Die Hard
- The first film features Theo, the wisecrack-spouting computer tech who cracks through all but the final layer of corporate security. He's a more realistic example than most, however, since his "cracking" consisted of figuring out the password for the first layer, then taking a big power drill to the next five. He outright admits he can't break the final layer due to the electromagnetic seal which is what Hans's desire for the FBI to cut power to the building is all about.
- In Live Free or Die Hard / Die Hard 4.0, the main villain is a rogue cracker, while the sidekick is more of a Playful Hacker.
- Ozzie from Masterminds starts off this way, downloading a game before it goes on the market to sell illegal copies. Later, though, he turns more Playful Hacker when he attempts to foil Bentley's hostage plot.
- In Superman III, Richard Pryor, of all people, plays a wage-slave who gets some basic computer training and is soon able to crack into anything. The character was originally supposed to be Brainiac in disguise, explaining his abilities, but Executive Meddling turned the character into comic relief.
- In Swordfish Hugh Jackman plays a computer criminal who got caught cracking CARNIVORE, went to jail, and is banned from using computers ever again. He's hired/forced to break into computers for John Travolta at the risk of his daughter's life.
- James Bond:
- Stephen in The Score.
- In Catherine Jinks' Evil Genius Trilogy, Doctor Vee (AKA The Virus) is a consumate example of a Cracker, having built a nasty reputation on the creation of fabulously destructive viruses. As such, the Axis Institute employs him as a teacher to the hero of the story, Cadel.
- Despite being the protagonist of Neuromancer, Case is more this than Playful Hacker—he takes a very cold and methodical approach to his job that Molly remarks on as unusual.
- Dulcinea Anwin of Tad Williams' Otherland series, is a Black Hat, a criminal hacker who breaks into systems for fun and profit. Used to working for nefarious employers, she's always managed to remain aloof from the dark side of her profession, but she bites off more than she can chew when she hires herself out to John Dread, and learns just exactly how bad bad really is.
- Phate ( Jon Holloway) from Jeffery Deaver's The Blue Nowhere is a prime example.
- Albermarle is the werewolf hunter's Cracker in Curse of the Wolfgirl. If only he had kept to the mission instead of playing Stalker with a Crush to the woman who rejected him in college he might have been more successful.
- The Spectrum in the second Spaceforce book is a notorious cyber-criminal who is hired by terrorists to hack into security cam recordings to cover the kidnapping of an alien prince. Before being forced to reform, series protagonist Andri did much the same kind of thing.
- Sarah Swan in the Doctor Who Expanded Universe novel Blue Box by Kate Orman. She's a dark legend in the small world of 1981 computer hackers; a powerful businesswoman who became first a phone-phreaker and then a hacker to gain power over others, and who uses her skills to destroy anyone who crosses her.
- The Smoking Gnu in the Discworld book Going Postal go from Playful Hackers to a noble version of this after they realize that, having discovered a way of sending code that physically damages the equipment, they can try to use this dangerous code to destroy the system from the inside out until the Corrupt Corporate Executives in charge are forced to abandon the company at a loss, allowing people who want it to work rather than make money to swoop in and magically fix everything (Moist eventually comes up with a plan that will accomplish the same goal without ending up with the company back under similarly predatory investors).
- In Vernor Vinge's classic novella, "True Names", all the members of The Cabal fall into this category as well as the Playful Hacker. They're all prankers, but they're all criminal prankers. Some are more criminal than others, so we eventually get to a Dueling Hackers climax.
- Brian Gragg aka Loki Stormbringer from Daniel Suarez' Daemon is one of these.
- Danny in Wizardry Compiled and subsequent books is both Lovable Rogue and Playful Hacker. He started with editing game character files, then cracking protection of games he couldn't afford, and by 16 was a competent self-taught programmer. His colleagues distrust him early on, but recognize the talent. And need to watch lest he get carried away.
"Yep, it's an 800 number. Direct line to the Wizard's Keep from any phone in the USA. Just don't use it unless you really need to."[...]"Is this legal?"Wiz hesitated. "Like I said, it was one of Danny's projects."
- In Superhuman Samurai Syber-Squad and its Japanese counterpart, Denkou Choujin Gridman, one of the main villains is a cracker who creates computer viruses that are then brought to life by the evil sentient AI program he partners with, and are then sent into various electrical devices, causing problems the protagonists then have to solve..
- Nevel, a villain from iCarly, he repeatedly breaks into and causes problems for the iCarly.com website.
- On Leverage, Chaos Manson has this role, contrasted with Hardison's playful hacker style. The CIA calls him the Kobyashu Maru.
- Enter from Tokumei Sentai Go-Busters.
- Part of the Five-Bad Band in Unnatural History.
- Person of Interest: Root, a misanthropic genius with an obsession with the Machine, and has the computer skills to provide a perfect nemesis for Finch. Oddly enough, she actually becomes a heroic character by the fourth season, as she becomes redeemed through her work for The Machine and her cooperation with the rest of the heroes, especially Finch.
- Christopher Pelant, self-proclaimed "Hacktivist" and recurring villain in Season 7 of Bones, combined this trope with Serial Killer. He used his computer savvy to frame Dr. Brennan for one of his murders.
- In Criminal Minds Garcia was this before she was forced to work for the FBI.
- In Breaking In the main character was one, using his skills to hack into his university's system to take classes for free.
- Seeing as the Monsters of the Week in Power Rangers Zeo were all robots, it was natural that there'd be one who could do this. Mean Screen was created with the intent to crash every computer system in the city, and could infect a system with a virus by just looking at it. (And seeing as the Rangers used computerized weaponry, this was rather dangerous. Still, he wasn't able to counter an anti-viral program that Angel Grove High's resident computer whiz had thought up.)
- Crash Zone has "Sabretooth", whose identifying mark is leaving a teeth-mark image on the websites of the hacked companies. It turns out to be Lisa Grey, a reputable security expert.
- Avon in Blake's 7 was initially this: he met the revolutionary hero in jail where he was sent for a massive computer-aided fraud. As the series went on he got better at combat but he never lost his hacking skills.
- In Agents of S.H.I.E.L.D., Skye started out as a member of a hacktivist organization called the Rising Tide that opposed SHIELD's secrecy, before she was captured by SHIELD and recruited for her skills in the pilot. Another first season episode featured a second Rising Tide hacker who was more antagonistic to "the Man" but overall portrayed as kind of naïve and gullible, as he sold out for a big paycheck on one job and his client had successfully fooled him into thinking they were benevolent or at least benign. We're not sure how "evil" the Rising Tide is as a whole - Skye's heart is in the right place, at least - but taking on an international security organization puts you closer to this than a Playful Hacker. In any case, they've been forgotten since Skye became completely loyal to SHIELD.
- Many of the villains on CSI: Cyber qualify, and two of the heroes are former crackers who have reformed (more or less willingly).
- After Kevin Steen was kicked out of Ring of Honor by El Generico, Steen would hack into the ROH message boards.
- A baby face example was Matt Hardy's electronic high jacking Vendetta Pro Wrestling at the end of 2013, due to the fact one of Vendetta's founders and disputed owners, Billy Blade, had a history of enmity with Hardy, including assaults on his girlfriend and was a Politically Incorrect Villain to boot.
- Another ROH example was when Kevin Kelly lost audio during one of his updates before the camera view switched to Marty Scurll, who promised to bring villainy back to the promotion. Kelly, for his part, was simply amused and saved Scurll's "additions" for use in Scurll's debut video packages later in the year.
- Deckers in Shadowrun, who use their tools to enter virtual reality Cyber Space and wage hand to hand combat with security devices. Depending on edition, the Decker may do all the work off-site from his/her Hacker Cave while the rest of the team is on a run, or be forced to come along in meatspace to hack things on the fly.
- The game Uplink. Breaking into computer systems to steal or destroy information, destroy systems, or worse is just another paying job for you. The game even gives you a Neuromancer rating that is your alignment; scrapping systems For the Evulz and ruining people's lives decreases it.
- The Chinese Hacker from Command & Conquer: Generals, whose job is to crack bank accounts and steal their money. While vulnerable they also can generate infinite money (like GLA Black Markets and USA Drop Zones). They even got a specialised structure to help them out in the expansion.
- Saints Row: The Third has Matt Miller, leader of The Deckers, official hacker of The Syndicate and a personification of the G.I.F.T.. In Saints Row IV however, he made a Heel–Face Turn after being offered amnesty by MI-6.
- Anonydeath from Hyperdimension Neptunia Victory. He is based on Anonymous (see below), but he also skirts around being a Playful Hacker.
- Bentley of Sly Cooper is a computer/tech expert for the Cooper Gang who can hack just about anything that can be hacked.
- The main villains of Metal Slug 4 are a group of cyber-terrorists called the Amadeus Syndicate.
- Watch_Dogs is the Hacker version of GTA - cause traffic accidents, steal thousands of dollars, and get innocent people arrested all from twenty feet away. Press and hold Q to cause mayhem.
- In Watch_Dogs 2, the protagonists are supposedly grey-hat hacktivists who use their abilities to out corporate and political corruption (though the player is still free to unleash chaos like Aiden in the prequel). Their rival group "Prime_Eight" plays this even straighter, being black hats who work with criminals solely for profit.
- The Combat Hacker tree for the Specialist class in XCOM2 is only a criminal because they are part of La Résistance against a Vichy Earth, but it doesn't make them any less prone to causing computer mayhem on the alien ranks. Anywhere from lethally Skulljacking enemy troops with blades to extract useful intelligence before killing their enemy, to shutting down or controlling enemy robotic units to messing with the enemy tactical awareness network to disorient or mind control enemy ground troops, these guys and gals do not play fair by any sense of the word.
- Unknown in Mystic Messenger is this in some routes.
- Amy Sauce from Unwinder's Tall Comics. She claims that she's wanted by the FBI for her activities. At another point, a telepath tried to read her mind, and she proceeded to hack his brain.
- Sollux (aka twinArmageddons), one of the Trolls from Homestuck, takes this to Serial Escalation levels. He's apparently so good at hacking and writing code that he can make computers explode and place curses on the victims. He also is capable of adapting alien software and technology into a reality-warping game.
- He also later writes a program that allows Terezi to use Trollslum to directly contact Doc Scratch. Who lives on the moon. And uses a typewriter. And is actually far in the future.
- In Not a Villain, hackers have caused much mayhem and destruction in the past, so they're the object of paranoia and Witch Hunts.
- In the Whateley Universe, there's a notorious cracker named Dr. Abel Palm, who believed that computers would replace humans. He tried to make that happen, and was stopped by a mutant technopath (who is in fact the Assistant to the Headmistress and a badguy at Whateley Academy) But The Palm, as he is now known, is not dead. He used black magics to ensorcel his own soul into an adaptable computer virus which is loose again.
- The title character in The Saga of Tuck routinely starts the school year by breaking in to school, getting the new passwords and changing the class schedule so his friends share lunches. This is when he's not altering grades, installing Trojans or surveillance cameras, etc.
- Electronic thieves-for-hire Deadlock, Keystroke, and E-Beam from the Global Guardians PBEM Universe are all cyberpaths who can jack their minds directly into computer systems. They specialize in this sort of crime.
- La Constructeuse, a French cyborg supervillain with a fetish for high technology, does this sort of thing as well, but its not her primary modus operandi.
- Saint from Worm is talented enough to have repeatedly defeated Dragon, the world's greatest tinker largely because she's really an AI with incomplete programming that he can exploit and even reverse-engineered her equipment.
- Noob has Tenshirock, who wants to "free" people from MMORPGs and interacts with players via an avatar.
- A hacker is anyone who likes to mess around with computers. A cracker is specifically someone who uses computers with malicious intent, usually by breaking security measures.
- Truth in Television - known as Black Hats. Most common form (at least, the stereotype... which, so far, has been true) are people who hack other sites and computers for kicks and prestige, extending to virus makers and malicious program coders. Case in point: Our good buddy Killer Hack.
- Meta example: KiLLeR HaCK (whatever that may mean), the hacker(s) who hacked the Wiki on Nov. 13, 2008. You'd have to ask the Wiki administrators if they thought it was a case of hacking or cracking...
- Another Meta example: A hacker who we shall refer to as "Cap'n Dickless" hacked the accounts of various abridged series makers on YouTube (including Lanipator, hbi2k, Masako X, Team Dattebayo and numerous others), and many of the accounts had to be suspended because of this, but they later got them back, and Cap'n Dickless got what he deserved.
- The Dark Avenger lives in countries where hacking's not illegal. To add insult to injury, he adds completely random clues.
- Dark Avenger is long gone. He was a young, mischievous programmer who was trying to learn new things and experimenting on his Pravetz 82 computer. The only reason anyone in Bulgaria even knew about computer viruses at the time was because of a translated 1988 article in a Bulgarian computer hobbyist magazine (only one at the time, most people in Bulgaria during the '80s had no idea what a computer was anyway), which jumpstarted the brief period of Bulgarian computer virus epidemics from 1989 to 1992. The reason Dark Avenger is still somewhat popular is because of his highly enigmatic persona, impersonators, his odd motivations (he was a grey hat neutral hacker whose exact motivations aren't known, besides his famous hatred of Vesselin Bontchev) and his relationship with Sarah Gordon. Todor Todorov claimed to be him, but was noticeably hostile, which wasn't a trait in the Gordon interview. For all we know, the Dark Avenger was a persona adopted by several virus writers, Bontchev himself, or it was an elaborate stunt.
- Kevin Mitnick, before the poacher turned gamekeeper.
- Anonymous is a loosely-associated network of "hacktivists", that was founded around 2003, committing cyber-crimes as a form of retribution against institutions they claim are corrupt, such as PayPal, MasterCard, Visa, and Sony, and controversial groups like the Westboro Baptist Church, ISIS, the Ku Klux Klan, and most recently, Donald Trump. Similar groups like LulzSec and Operation AntiSec have carried out cyberattacks on US government agencies, media, video game companies, military contractors, military personnel, and police officers. (Of course, these groups claim they aren't malicious but many would disagree.)
- In August 2013, a notorious hacker group called the Syrian Electronic Army who claimed to be sympathizers of the Syrian government, attacked the website of The New York Times, causing a great deal of collateral damage. Apparently a combination of their ability and rather poor security by Melbourne IT, a registrar of domain names, was at fault.