FREE US Shipping for Orders  $70+

Hacker Tapestries

Filter

Safe Search on hides explicit content. Safe Search off shows all results, including explicit content.
hacker Tapestry
Main Tag:  

Description: para los hackers de la informática

Tags: hackers, information technology, gift, science, informatics

hacker Tapestry

by Magditasea

$30

hacker Tapestry
Main Tag:  

Description: space hacker

Tags: computer, programmer, cybersecurity, mr robot, developer

hacker Tapestry

by Magditasea

$30

Hacker Tapestry
Main Tag:  

Description: Hacker in Aurebesh

Tags: computer, hack, hacker culture, hackers, hacking

Hacker Tapestry

by The Bantha Barn

$30

hacker Tapestry
Main Tag:  

Description: hacker in WPAP Style

Tags: anonymous, anonymous hacker, code, coding, computer

hacker Tapestry

by Suroto

$30

Hacker Tapestry
Main Tag:  
Tags: security, mr robot, hacking, information security, hackers

Hacker Tapestry

by Shiny Bad Guys

$30

Hacker Brewing Tapestry
Main Tag:  

Description: Hacker Pschorr Brewery

Tags: beer, brewing, hacker pschorr, munich, oktoberfest bier
Hacker Tapestry
Main Tag:  

Description: nobody can stop the future

Tags: anonymous, hack, mr robot, fsociety, e corp

Hacker Tapestry

by ramonagbrl

$30

HACKER Tapestry
Main Tag:  

Description: Hacker will definitely get you notice.

Tags: hacker anonymous, hacker culture, hacker gift, hackerman, hackers

HACKER Tapestry

by JONKACREATIONS

$30

Hacker fingerprint Tapestry
Main Tag:  

Description: Dime en que trabajas y te diré que tienes entre manos.

Tags: geek, humor, funny, joke, fingerprint
Hacker Tapestry
Main Tag:  
Tags: hackers, security, infosec, information security

Hacker Tapestry

by Shiny Bad Guys

$30

Hacker DDoS Attack Tapestry
Main Tag:  

Description: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.

Tags: metasploit, hacker sticker, ddos, anonymous, kali

Hacker DDoS Attack Tapestry

by Cyber Club Tee

$30

Hacker Tapestry
Main Tag:  

Description: Hacker

Tags: computer, programmer, hacking, developer, cybersecurity

Hacker Tapestry

by SNZLER

$30

Roses Are Red... Error Tapestry
Main Tag:  

Description: If you code all day, you get used to expecting the unexpected...

Tags: developer, programming, coding, java, l33t
Dark Web Hacker Tapestry
Main Tag:  

Description: The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed. The dark web is a part of the internet that isn't indexed by search engines.

Tags: fsociety, freedom fighter, tor, onion, hacking

Dark Web Hacker Tapestry

by Cyber Club Tee

$30

hacker Tapestry
Main Tag:  

Description: hacker

Tags: hacking, computer, it, cybersecurity, programmer

hacker Tapestry

by mega281

$30

Hacker Operating A Laptop Tapestry
Main Tag:  

Description: Hacker Operating A Laptop

Tags: back catalog, boy, cartoon, computer, developer
HACKER Tapestry
Main Tag:  

Description: Hacker Inside

Tags: geeks, hipster, nerdy gifts, hacking, programming

HACKER Tapestry

by nightowl

$30

Fortran 56 Tapestry
Main Tag:  

Description: Originally developed by IBM in the 1950s for scientific and engineering applications, FORTRAN came to dominate this area of programming early on and has been in continuous use for over half a century in computationally intensive areas such as numerical weather prediction, finite element analysis, computational fluid dynamics, computational physics, crystallography, and computational chemistry. It is a popular language for high-performance computing and is used for programs that benchmark and rank the world's fastest supercomputers.

Tags: 1956, 1950s, unix, developer, linux

Fortran 56 Tapestry

by JCD666

$30

I Am Not A Hacker. Honest. Tapestry
Main Tag:  

Description: Perfect tee for anyone who works in cyber security and infosec. Reads - I Am Not A Hacker... I Am A Security Professional. Honest.

Tags: information security, hackers, security, infosec, cyber
Deep Web Hacker Tapestry
Main Tag:  

Description: The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing. Medical records, fee-based content, membership websites, and confidential corporate web pages are just a few examples of what makes up the deep web. Estimates place the size of the deep web at between 96% and 99% of the internet. Only a tiny portion of the internet is accessible through a standard web browser—generally known as the “clear web”.

Tags: hackers, tor, dark net, anonymous, onion

Deep Web Hacker Tapestry

by Cyber Club Tee

$30

Hacker DDoS Attack Boom! Tapestry
Main Tag:  

Description: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.

Tags: ddos, cyber security, hacking, linux, pentesting
Hacker Cat Cyberpunk Tapestry
Main Tag:  

Description: Nerd shirt for hackers Unleash your inner cyberpunk with our unique Hacker Cat design. Featuring a sleek black cat donning a hoodie, this design is perfect for anyone who wants to express their love for technology and hacking culture. Show off your edgy style and love for all things cyber with our Hacker Cat design today!

Tags: geek, dystopian, aigenerated, nerd, aiartwork

Hacker Cat Cyberpunk Tapestry

by Shaaniartworks

$30

Hacker Tapestry

Description: An cool design of hackers shows the look of hackers with hat and mask on face.

Tags: cracker, social engineer, developer, hacker programming, hacking

Hacker Tapestry

by mangobanana

$30

Hacker zone Tapestry
Main Tag:  

Description: show off your hax!

Tags: geek, it, computer, nerdculture, hackerzone

Hacker zone Tapestry

by TheContactor

$30

Nightlife in Kolkata Tapestry
Main Tag:  

Description: A tiger in a hood... In the hood. Hand-drawn using pencil.

Tags: big cat, badass, gangster, tiger, calvin and hobbes

Nightlife in Kolkata Tapestry

by PerrinLeFeuvre

$30

MITM - Man in the middle Tapestry
Main Tag:  

Description: Man-in-the-middle attacks (MITM) are a common type of cybersecurity attack that allows attackers to eavesdrop on the communication between two targets. The attack takes place in between two legitimately communicating hosts, allowing the attacker to “listen” to a conversation they should normally not be able to listen to, hence the name “man-in-the-middle.”

Tags: pen testing, man in the middle, hackers, hack, mitm
Have You Tried Turning It Off and On Again Tapestry
Main Tag:  

Description: That should fix anything that can be turned on and off!

Tags: popular
Cyber security - Ethical Hacker Tapestry

Description: A white hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing

Tags: pen tester, cyber security, linux, hacker, sansdfir
Hacker | Rainbow Colors Tapestry
Main Tag:  

Description: Cool hacker design in rainbow colors :) | Perfect for T-shirts, hoodies, mugs, stickers etc!

Tags: h4x0r, bug bounty, bug bounty hunter, ethical hacker, cybersecurity
Hacker Tapestry
Main Tag:  

Description: Proudly display your ethical hacker side with this "I Hack For Good" t-shirt. Perfect for cybersecurity professionals, tech enthusiasts, or anyone in the white hat hacking community, this shirt celebrates the positive impact of hacking for security. With its bold and straightforward message, it's a fun and empowering tee for those who are committed to protecting the digital world.

Tags: coding, cybersecurity, ethical hacker, hack, hacker culture

Hacker Tapestry

by NomiCrafts

$30

Commonly Hacked Ports Tapestry
Main Tag:  

Description: TCP port 21 — FTP (File Transfer Protocol) TCP port 22 — SSH (Secure Shell) TCP port 23 — Telnet TCP port 25 — SMTP (Simple Mail Transfer Protocol) TCP and UDP port 53 — DNS (Domain Name System) TCP port 443 — HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL) TCP port 110 — POP3 (Post Office Protocol version 3) TCP and UDP port 135 — Windows RPC TCP and UDP ports 137–139 — Windows NetBIOS over TCP/IP

Tags: ports, http, sql, dns, smtp

Commonly Hacked Ports Tapestry

by Cyber Club Tee

$30

The Ultimate hacker tool a brain Tapestry
Main Tag:  

Description: The Ultimate hacker tool a brain

Tags: developer, coding, programmer, coder, hacking
Anonymous - Do Not Trust Tapestry
Main Tag:  

Description: With the dire need for justice and accountability, and a complete lack of action from the very systems that are supposed to keep the people safe, it is comforting to know that the collective known as ANONYMOUS has returned to hold those systems accountable as well as the elites that control them. "Unfortunately, We do not trust your Corrupt Organization to carry out Justice"

Tags: vendetta, hacker, activist, guy fawkes, anti government
LimeWire P2P 2000 Tapestry
Main Tag:  

Description: LimeWire was a peer-to-peer file sharing (P2P) platform that launched with its own client in 2000. LimeWire utilized the gnutella network and BitTorrent protocol to allow users share content by uploading and downloading content through the client. LimeWire offered both a free version and a paid enhanced version called LimeWire Pro, which, somewhat ironically, could be acquired through the regular LimeWire software as paid users shared their copies of Pro with the platform. LimeWire had a solid ten-year run before a lawsuit back by music industry heavyweights resulted in the company, and it's software client, being shut down in 2010.

Tags: p2p, 2000s, limewire, made in the 00s, 2000s pop culture
Fatal Brain Damage Tapestry

Description: In a near future, we may meet death with this fatal error message on it!

Tags: city, cyberpunk, error message, fail, fatal

Fatal Brain Damage Tapestry

by PowKapowCreations

$30

HACKER! Tapestry
Main Tag:  

Description: Rock your mad skillz and show the planet you mean serious bizness. See you on the BBS.

Tags: computer nerd, hackers, hacking, modem

HACKER! Tapestry

by City Under Ceej Designs

$30

Anonymous Hacker Mask Emoji Tapestry
Main Tag:  

Description: Hacker mask style emoji face with mustache and beard on yellow background

Tags: freedom, software developer gift, hack, hacker, anonymus
Hack the Planet - Blue Globe Design for Computer Hackers Tapestry
Main Tag:  

Description: This cool design for computer hackers/programmers shows an earth globe with partial outlines of the landmasses of the Americas, Europe and Africa plus a graticule. In the center it reads "hack the planet" in capital letters surrounded by some secret code. Do you love to hack computer code and break things? Can you determine which program is the origin of the binary dump? Hint it is from a large open source project. Show the planet that you are a hacker. Great for work, tech conferences and events.

Tags: code, admin, sysadmin, security, software

Hack the Planet - Blue Globe Design for Computer Hackers Tapestry

by Geeksta - Cool and Funny IT Geek Designs

$30

Resist Tapestry
Main Tag:  

Description: Follow Anonymous in support of the protests against racial inequality across the globe.

Tags: activist, end racism, hacker, resist, hacktivist

Resist Tapestry

by Notorious Apparel

$30

Yes Im a Hacker Girl NO I will not fix ur computer Tapestry
Main Tag:  

Description: Dont you hate when everyone ask you to fix their computer

Tags: geeky, geek, hackers, ninja hacker goddess, computer hacker
NCSA Mosaic Tapestry
Main Tag:  

Description: NCSA Mosaic, or simply Mosaic, is the web browser that popularized the World Wide Web and the Internet. It was also a client for earlier internet protocols such as File Transfer Protocol, Network News Transfer Protocol, and Gopher. The browser was named for its support of multiple internet protocols. Mosaic was also the first browser to display images inline with text instead of displaying them in a separate window and while it is often described as the first graphical web browser, though it was preceded by WorldWideWeb, the lesser-known Erwise, and ViolaWWW.

Tags: 1990s, 1993, browser, mosaic, hackerman
Terms & Conditions - LIAR Tapestry
Main Tag:  

Description: This is the biggest lie on the internet. Have you really read and agreed to the Terms and Conditions?

Tags: code, coder, coding, computer, data

Terms & Conditions - LIAR Tapestry

by TinyCult/GeekyCult

$30

BonziBuddy 1999 Tapestry
Main Tag:  

Description: If you’re old enough to remember BonziBuddy, you may recall that he was one of the web's early virtual assistants (think Clippy, but for browsing the web). BonziBuddy's virtual desktop assistant featured an on-screen avatar of a talking purple gorilla that could interact with its users and run simple utility services like text-to-speech and finding online shopping deals. Released in 1999, the application was actually pretty impressive for the time, and garnered notoriety for its early forays into what we now know as targeted advertising. This early personalizing of ad content was more akin to spyware, adware, and scareware than anything, so it's not surprising that the developer faced several lawsuits and fines from the FTC.

Tags: bonzibuddy, it, monkey, gorilla, internet
Phishing Email Hacker Cybersecurity Tapestry
Main Tag:  

Description: Scare anyone with this spooky costume - a phishing email! An original and funny fancy dress idea!

Tags: halloween, hacking, scam, phishing email, nerd fancy dress
Non-traditional collector of IP Tapestry
Main Tag:  

Description: an eloquent way of describing someone who steals IP

Tags: collector, computers, concepts, funny, gatherer
How Accounts Actually Get Hacked Tapestry
Main Tag:  

Description: How accounts actually get hacked. Forgot to logout. Game password to crook. Account actually got hacked.

Tags: hackers, cyber security, security, hacked, hacking
Computer Nerd Geek Hacker Tapestry
Main Tag:  

Description: Computer nerd hacking away plugged into the matrix.

Tags: pc, technology, data, matrix, hacker
ANONYMOUS HACKER Tapestry
Main Tag:  

Description: Cyber Netizens T-Shirt.

Tags: anonymous clothes, anonymous legion, gift idea, hacker, anonymous hackers

ANONYMOUS HACKER Tapestry

by FernandoSala

$30

Close Click to close this dialog.

Cart Preview (0)

You're $70.00 Away from FREE US Shipping!
$0
$70

Adult Apparel

Kids Apparel

Accessories