List Of Hacking And Cyber Security Movies

adihacks Aditya Rawat
15 min readJan 1, 2021


Guys here is the list of hacking and cybersecurity movies you must watch.

You can visit for more hacking stuff:)

1965 — Alphaville — A secret agent goes to the futuristic city of Alphaville to find a missing person and eventually stop the ruling dictator, professor von Braun, and his sentient computer system, Alpha 60.

1968 — Hot Millions — Peter Ustinov plays an embezzler who bypasses a mainframe computer’s security system to pay invoices from his fictitious companies.

1969 — The Computer Wore Tennis Shoes — Dexter Reilly (Kurt Russell) fixes a computer during an electrical storm and gets shocked. The computer’s brain has fused with his, and he’s a genius.

1969 — The Italian Job — A robber (Michael Caine) recently released from prison gets help from a group of Britain’s most infamous computer hackers to steal gold bullion from underneath the noses of the Italian police and mafia. One of the film’s most famous scenes is a massive traffic jam caused by hacking the city’s traffic control computer.

1970 — Colossus: The Forbin Project — Massive computer systems from the U.S. — “Colossus” — and Russia — “Guardian” — connect to each other. Nuclear war is threatened.

1971 — Paper Man — Five bored college students take advantage of a computer glitch and create a fictitious person, but the prank backfires.

1974 — The Conversation — Gene Hackman plays a surveillance expert using high-tech equipment (back in the day) to spy on a couple he fears may be in danger. Nominated for three Oscars.

1975 — Three Days of the Condor — CIA codebreaker Robert Redford tries to figure out why his own agency wants him dead.

1982 — Tron — One of the earliest hacking films. A computer engineer learns an executive at his company has been stealing his work and is launched into the world of virtual reality.

1983 — Superman III — Richard Pryor plays Gus Gorman, a hacker who is caught skimming from his company’s payroll through a program he developed and is then blackmailed to help turn Superman evil.

1983 — War Games — High school student (Matthew Broderick) hacks into a military supercomputer in this classic and activates the U.S. nuclear arsenal, at a time when most people didn’t know what hacking was.

1984 — Cloak and Dagger — When 11-year-old Davey sees the murder of an FBI agent, the dying man hands him an Atari video game cartridge with military secrets. With Dabney Coleman.

1984 — Electric Dreams — Set in San Francisco, this science fiction romantic comedy is about a love triangle between an architect, a cellist, and a personal computer.

1984 — Hackers: Wizards of the Electronic Age — This documentary about the hacker community includes footage of interviews with some of the programmers that created the PC revolution, including Steve Wozniak, co-founder of Apple. Filmed at a hacker conference held in Sausalito, Calif.

1984 — Hide and Seek — A young computer enthusiast develops a kind of artificial intelligence program named “Gregory P1.” To ensure its survival, the computer contacts other computers and begins to fight the humans. It also hooks into the mainframe computer of a nuclear power plant.

1985 — Prime Risk — Computer-savvy lovers scam Automated Teller Machines and plot to sink the Federal Reserve.

1985 — Weird Science — Teenagers Gary and Wyatt design their ideal woman on a computer, and a freak electrical accident brings her to life in the form of the lovely, superhuman Lisa.

1986 — Ferris Bueller’s Day Off — A high school student (Matthew Broderick) who wants the day off breaks into his school’s computer system and changes grades and attendance records.

1991 — Terminator 2: Judgment Day — A cyborg protects Sarah Connor’s teenage son John from another cyborg intent on killing him.

1992 — Single White Female — A woman (played by Bridget Fonda) advertises for a roommate. She soon discovers that her new roommate is a hacker (Jennifer Jason Leigh) intent on stealing her identity.

1993 — Jurassic Park — Not a hacking movie… BUT Seinfeld’s nemesis “Newman” (Dennis Nedry) plays an IT guy who hacks his way into a coup that involves him stealing dinosaur DNA to sell to the highest bidder.

1992 — Sneakers — A Hacker (Robert Redford) leads a team of experts who test the security of San Francisco companies. They discover a black box that can crack any encryption, posing a huge threat if it lands in the wrong hands… including rogue NSA agents.

1993 — Frauds — An insurance investigator (Phil Collins) uses games and gimmicks to manipulate the lives of others, including a couple who make an unusual insurance claim. He approves the claim but makes bizarre demands as ransom.

1993 — Ghost in the Machine — A computer-powered MRI machine extracts a serial murderer’s soul, and becomes a deadly technological weapon.

1994 — Disclosure — A high-tech executive (Michael Douglas) unexpectedly finds himself attempting to hack into his firm’s database to defend his reputation and career and to defeat Meredith (Demi Moore). E-mails from “A Friend” direct his moves.

1995 — GoldenEye — James Bond tries to stop a Russian crime syndicate from using a stolen space-based weapons program and falls into the clutches of an evil genius who plans to rule Earth from cyberspace.

1995 — Hackers — A teenage hacker is back on the scene seven years after being banned from computers for writing a virus that caused the biggest stock exchange crash in history. He and his friends must prove that a sinister super hacker is framing them for a plot to embezzle funds from a large oil company with a computer worm. With Angelia Jolie.

1995 — Judge Dredd — Judge Dredd (Sylvester Stallone) is sent to a penal colony for a murder he didn’t commit. On his way there, he gets an unexpected sidekick when he reunites with Herman “Fergie” Ferguson (Rob Schneider), a hacker he previously busted for destruction of property.

1995 — The Net — A computer programmer (Sandra Bullock) who lives a reclusive life is looking forward to time off when she becomes aware of a conspiracy. Her vacation turns into a nightmare when someone tries to kill her and her identity is stolen. She must prove who she is while trying to figure out why someone wants her dead.

1995 — Ghost in the Shell — In this animated Japanese sci-fi epic, a cyborg policewoman and her partner hunt a cybercriminal called the Puppet Master, who hacks into the brains of cyborgs to get information and use it to commit crimes. (Scarlett Johansson stars in a 2017 live-action remake.)

1995 — Johnny Mnemonic — A computer chip implanted in his brain allows a human data trafficker (Keanu Reeves) to securely store and transport data too sensitive for regular computer networks. When he gets a valuable package that exceeds the chip’s storage capacity, the mnemonic courier must deliver the data within 24 hours or die. Assassins are intent on helping him do just that.

1997 — Masterminds — The new security chief at a prestigious private school plans to even a score by kidnapping several of the wealthy students and holding them for ransom. A teenage computer hacker, expelled from the school for pulling pranks, thwarts his plans.

1998–23 — After an orphan invests some of his inheritance in a home computer, he begins discussing conspiracy theories inspired by a novel on bulletin boards. He’s soon hacking military and government computers with a friend. Based on a true story.

1998 — Enemy of the State — A lawyer (Will Smith) isn’t aware that a videotape in his possession proves a congressman was murdered for opposing surveillance legislation. When he becomes the target of a corrupt NSA official and his life begins to fall apart, he enlists the help of an ex-intelligence operative (Gene Hackman).

1998 — Mercury Rising (Code Mercury) — A renegade FBI agent (Bruce Willis) must protect a 9-year-old autistic boy who has cracked encrypted government code that was supposed to be unbreakable.

1998 — Pi — Is there a mathematical key that can unlock the universal patterns in nature? If found, can that key predict anything — even the stock market? A brilliant, obsessed, and paranoid mathematician who barricades himself in a room filled with computer equipment intends to find that key, but might go mad while doing so.

1998 — Webmaster — In this Danish sci-fi thriller, a powerful crime leader hires a hacker to monitor the security of his computer operations. When someone else hacks into the database, the webmaster must go to extremes to find him, or die within 35 hours.

1999 — Entrapment — A undercover art investigator (Catherine Zeta-Jones) is intent on tracking down and capturing a renowned thief (Sean Connery). They end up attempting a heist together.

1999 — The Matrix — In a dystopian future, humanity is unknowingly trapped inside the Matrix, a simulated reality created by intelligent machines to distract humans while they use their bodies as an energy source. A computer programmer / hacker known as Neo (Keanu Reeves) discovers the truth and joins forces with other rebels to free humankind.

1999 — Pirates of Silicon Valley — This biographical drama about the development of the personal computer and the rivalry between Apple Computer and Microsoft spans the years 1971–1997. Noah Wyle portrays Steve Jobs and Anthony Michael Hall stars as Bill Gates.

1999 — Office Space — They’re supposed to be part of one big happy family, but three computer programmers hate their jobs and their boss. They concoct a scheme to embezzle small amounts of money from the high-tech company that employs them, but a mistake results in a bigger theft than planned. With Jennifer Anniston.

1999 — NetForce — In the year 2005, NetForce, a division of the FBI, is tasked with protecting the Net from terrorism. A loophole in a browser allows someone to gain control of the Internet and all the information it holds. Now the commander of NetForce must stop him, as he also tracks down a killer.

2000 — Charlie’s Angels — Working for the reclusive millionaire Charlie ( John Forsythe), Angels Natalie (Cameron Diaz), Dylan (Drew Barrymore) and Alex (Lucy Liu) take on the case of a young high-tech genius (Sam Rockwell) who has been kidnapped. Part of the action involves employing a variety of disguises and technological tricks to enter a master computer’s massively protected mainframe.

2000 — Takedown — Also known as “Track Down,” the controversial movie version of the manhunt for legendary hacker Kevin Mitnick is based on the book by Tsutomu Shimomura, “Takedown: The Pursuit and Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw — By The Man Who Did It.”

2000 — Hackers in Wonderland — This documentary on hackers in the United Kingdom and in the United States includes interviews with prominent hackers who reveal what drives them. The hackers include ColdFire, Phobos, and cyberjunkie.

2001 — Antitrust — When a college graduate (Ryan Phillippe) gets a job writing software at a multi-billion dollar computer company, he has no idea that the founder (Tim Robbins) and new mentor is hiding dark secrets. Is there anyone he can trust?

2001 — The Code — This documentary covers the first decade of GNU/Linux and features some of the most influential people of the free software (FOSS) movement.

2001 — Freedom Downtime — This documentary covers the plight of convicted computer hacker Kevin Mitnick, from the standpoint that Miramax misrepresented him in the film “Takedown.” It includes the story of several computer enthusiasts who confront Miramax reps about their discontent with aspects of the script, including the film’s ending.

2001 — Revolution OS — The history of GNU, Linux, and the open source and free software movements is traced in this documentary. It features several interviews with prominent hackers and entrepreneurs.

2001 — The Score — An aging safecracker (Robert De Niro) plans to retire, but his fence (Marlon Brando) talks him into one final score, stealing one of Canada’s natural treasures hidden in the basement of a Customs House. He joins forces with another thief (Edward Norton) who hires someone to hack into the Custom House security system, but things go wrong.

2001 — Secret History of Hacking — The focus of this documentary is phreaking, computer hacking, and social engineering occurring from the 1970s through the 1990s. John Draper, Steve Wozniak, and Kevin Mitnick are prominently featured.

2001 — Swordfish — A spy named Gabriel (John Travolta) plots to steal a large fortune. He enlists Ginger (Halle Berry) to persuade Stanley (Hugh Jackman), who spent two years in prison for hacking an FBI program, to help. But what is Gabriel really up to, and who or what is really behind the plot?

2002 — Catch Me if You Can — Frank Abagnale is one of the world’s most respected authorities on forgery, embezzlement, and secure documents. His riveting story provided the inspiration for Steven Spielberg’s film starring Leonardo DiCaprio as Abagnale and Tom Hanks as the FBI agent fast on his heels.

2002 — Minority Report — It’s 2054 and a specialized Pre-Crime police department in D.C. stops crimes before they are committed based on information from Pre-Cogs, three psychic beings who channel their visions into a computer. When they accuse the unit chief (Tom Cruise) of a future murder, he becomes a fugitive, hunted by his own department.

2002 — Storm Watch — A champion player of virtual reality games must suddenly race against time to stop a criminal mastermind who has stolen his identify from destroying the world with a weather satellite. Also known as “Code Hunter.”

2002 — Terminal Error — A former employee of a major software company gets even with the president by planting a computer virus on an MP3 and giving it to his son. His plan is to crash the computer terminals, but the virus has a mind of its own and begins to take out large portions of the city. Father and son must create their own virus to stop the chaos.

2003 — In the Realm of the Hackers — This documentary reveals how and why two Australian teenager computer hackers, Electron and Phoenix, stole a restructured computer security list in the late 1980s and used it to break into some of the world’s most classified and secure computer systems.

2003 — The Core — After several bizarre incidents across the globe, a geophysicist and scientists determine that the planet’s molten core has stopped rotating and that the magnetic field will collapse within a year. They devise a plan to bore down to the core and set off nuclear explosions to restart the rotation and enlist a hacker to scour the internet and eliminate all traces of the pending disaster to prevent worldwide panic.

2003 — The Italian Job — After a thief (Edward Norton) turns on his partners and gets away with the gold they’ve stolen in a heist, his former team seeks revenge.

2003 — The Matrix Reloaded — With the help of Neo (Keanu Reeves), Morpheus (Laurence Fishburne), Trinity (Carrie-Anne Moss), and other freedom fighters, more and more humans have been freed from the Matrix and brought to Zion. But 250,000 machines are digging towards the stronghold and will reach them in 72 hours, so they must prepare for war.

2003 — Paycheck — Michael Jennings (Ben Affleck) makes good money working on top-secret projects and then agreeing to have his memory erased, until a payment of $92 million for a three-year-assignment is canceled. With his life in danger, he must get help from a scientist (Uma Thurman) he doesn’t remember dating to figure out the importance of seemingly random items.

2004 — Paranoia 1.0 — A computer programmer receives mysterious empty packages inside his apartment and tries to find out who’s sending them, why, and who he can trust. Also known as “One Point O.”

2005 — V for Vendetta — In a dystopian future, a tyrannical British government imposes a strict curfew following the outbreak of a virus. An anarchist in a smiling Guy Fawkes mask seeks revenge with the help of a young woman and hacks into the television network to urge others to revolt against tyranny.

2006 — Firewall — When his family is taken hostage, a security specialist (Harrison Ford) who designs theft-proof computer systems for financial institutions must break into his own system and steal millions of dollars to pay off their ransom.

2006 — Hacking Democracy — This documentary investigates allegations of election fraud during the 2004 U.S. presidential election. It follows Bev Harris, the founder of Black Box Voting, a nonprofit consumer-protection group, and other citizen-activists who set out to uncover flaws in the voting system.

2006 — The Net 2.0 — A young computer systems analyst arrives in Istanbul to start a new job, but finds out her identity has been stolen. She must catch who did it to get her life back.

2006 — A Scanner Darkly — This computer-animated adaptation of Philip K Dick’s 1977 sci-fi novel is set in the near-future. The U.S.’s war on drugs, particularly a hyper-addictive substance called D (for Death), prompts the enforcement of a police state that uses numberless surveillance scanners.

2006 — Pulse — In this remake of a Japanese horror film, a student is shocked when her boyfriend, a computer hacker, commits suicide. Then she and her friends receive online messages from him, asking for help. Another computer hacker must help her stop a supernatural plague traveling through the network.

2007 — Live Free or Die Hard — As the nation prepares to celebrate Independence Day, a disgruntled government security agent launches an attack on America’s computer infrastructure. Veteran cop John McClane (Bruce Willis) and a young hacker must help the F.B.I.’s cyber division take him down.

2007 — Bourne Ultimatum — Operative Jason Bourne (Matt Damon) teams up with an investigative reporter to find the people who betrayed him, while a ruthless CIA official and his team continue to track him down in the hopes of assassinating him before he gets his memory back.

2007 — Breach — This docudrama is based on the events leading up to the capture of FBI Agent Robert Hanssen, convicted of selling secrets to the Soviet Union. A low-level surveillance expert gets promoted and assigned to work with Hanssen, unaware that he is to find proof that he is a traitor.

2016 — Risk — Laura Poitras spent six years making this documentary about WikiLeaks founder Julian Assange, who gave her the opportunity to closely film him but later tried to censor the film.

2016 — Snowden — Joseph Gordon-Levitt stars as Edward J. Snowden in Oliver Stone’s biopic of the former National Security Agency contractor who becomes disillusioned with the intelligence community and leaks classified information, becoming a fugitive from law and a hero to many.

2016 — Zero Days — Alex Gibney’s documentary focuses on Stuxnet, or “Operation Olympic Games,” a malicious computer worm developed by the United States and Israel to sabotage a key part of Iran’s nuclear program.

2017 — Ghost in the Shell — Major (Scarlett Johansson) is saved from a terrible crash and cyber-enhanced as a soldier to stop the world’s most dangerous criminals. She soon discovers that her life was actually stolen and determines to recover her past, find out who did this to her, and stop them before they do it to others.

2017 — Kim Dotcom: Caught in the Web — This documentary tells the story of Megaupload founder Kim Dotcom, a super-hacker, entrepreneur and notorious Internet pirate accused of money laundering, racketeering, and copyright infringement.

2017 — The Circle — Mae (Emma Watson) lands a dream job at a technology and social media company called the Circle. She is soon handpicked by the founder (Tom Hanks) to participate in an experiment that takes transparency to a new level.

2017 — The Crash — The government enlists a team of white-collar criminals to thwart a cyberattack that threatens to bankrupt the United States.

2018 — Anon — In a world where everyone’s lives are transparent, traceable, and recorded by the authorities, causing crime to almost cease, a detective (Clive Owen) tries to solve a series of murders that may involve a mysterious hacker (Amanda Seyfried).

2018 — Assassination Nation — After an anonymous hacker leaks the private information of the people of Salem, suspicion falls on four teenage girls who are targeted by the community.

2018 — The Defenders — A behind-the-scenes look at four famous cyberattacks and the incredible people tasked with keeping our institutions safe from ever-evolving cyber threats.

2018 — The Girl in the Spider’s Web — Computer hacker Lisbeth Salander (who is also an avenging angel for abused women) and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.

2018 — Hacked — After losing his job to a state-of-the-art supercomputer, a disgruntled computer technician decides to test his replacement. In the meantime, a group of hackers infiltrates the building to steal the new technology.

2018 — Johnny English Strikes Again — After a cyberattack reveals the identity of all of Britain’s active undercover agents, MI7 agent Johnny English must come out of retirement to find the mastermind hacker.

2018 — Unfriended: Dark Web — After a teen finds a mysterious laptop, he invites several friends to play a game online. The night turns deadly when they become the target of cyber-terrorism.

2019 — Cyber Crime — In this documentary, 10 leading cybercrime experts discuss how billions of dollars a year are stolen or lost as a result of cybercrime, destroying businesses and lives.

2019 — The Great Hack — This documentary examines the Cambridge Analytica scandal through the roles of several people affected by it.

2019 — Password — A police officer hunts for a cybercriminal who is destroying people’s lives by hacking their passwords.

2020 — KnowBe4: The Making Of A Unicorn — A Cybersecurity Story. How CEO Stu Sjouwerman built a culture of fun and a company worth $1 billion. With Chief Hacking Officer Kevin Mitnick. 23-minute documentary produced by Cybercrime Magazine.

2020 — The Social Dilemma — This documentary explores the dangerous human impact of social networking.

Guys hope you like the blog .. don’t forget to connect me via my social media accounts and also check my book on amazon named HOW TO START HACKING.



adihacks Aditya Rawat

Entrepreneur.. Cs student..Hacker ..Speedcuber… Chessmaster… developer… of How to start hacking