mdblist.com logo Movie Search


Ratings
Between
and
Between
and
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Between
and
With at least
votes
Additional filters
m
Lists, Streaming Services, Cast and more
Create List (24 items)

Login to create a dynamic list


poster
MGM Plus
82
8.7
/2224544/
87
/73505/
82
/27316/
4.2
/2579588/
83
/209/
85
/1307885/
73
/36/
cc age 15+

The Matrix (1999)
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
poster
Netflix
81
7.7
/664074/
76
/21337/
75
/11291/
4.0
/1744865/
90
/264/
77
/27625/
79
/40/
cc age 18+

Zodiac (2007)
Over the course of a decade, editors of the San Francisco Chronicle entice themselves in the murders of the Zodiac Killer. However, as time runs its course, interest in the case dwindles in the eyes of the professionals. The Killer stops interacting with the public. However, believing he has the answers, an amateur cartoonist from the initial sightings races against time to prevent what he believes is another murder.
poster
HBO Max Amazon Channel
80
7.8
/913734/
76
/35420/
76
/11577/
4.0
/3662836/
85
/527/
87
/9068/
72
/68/
cc age 14+

The Batman (2022)
In his second year of fighting crime, Batman uncovers corruption in Gotham City that connects to his own family while facing a serial killer known as the Riddler.
poster
Kanopy
80
7.7
/10944/
78
/1450/
73
/248/
3.7
/4790/
90
/73/
75
/51/
77
/23/

Zero Days (2016)
Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.
poster
Kanopy
79
7.1
/120391/
76
/6168/
70
/2072/
3.5
/98030/
93
/46/
76
/1989/
77
/15/
cc age 11+

WarGames (1983)
High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
poster
73
7.4
/66316/
75
/2763/
75
/1668/
3.5
/45240/
74
/47/

Who Am I (2014)
Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
poster
Amazon Prime Video
71
7.7
/126036/
77
/4318/
74
/3235/
3.7
/98461/
72
/25/
85
/1307/
54
/12/

The Name of the Rose (1986)
14th-century Franciscan monk William of Baskerville and his young novice arrive at a conference to find that several monks have been murdered under mysterious circumstances. To solve the crimes, William must rise up against the Church's authority and fight the shadowy conspiracy of monastery monks using only his intelligence; which is considerable.
poster
Disney Plus
69
6.7
/144754/
70
/7158/
66
/2646/
3.1
/166240/
60
/162/
69
/4428/
58
/13/
cc age 10+

Tron (1982)
When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
poster
72
69
7.2
/7761/
73
/313/
68
/222/
3.5
/3882/
78
/102/

23 (1998)
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
poster
Netflix
64
6.5
/59378/
63
/3285/
64
/1547/
3.5
/263631/
58
/159/
58
/235/
60
/31/
cc age 17+

Under the Silver Lake (2018)
Young and disenchanted Sam meets a mysterious and beautiful woman who's swimming in his building's pool one night. When she suddenly vanishes the next morning, Sam embarks on a surreal quest across Los Angeles to decode the secret behind her disappearance, leading him into the murkiest depths of mystery, scandal and conspiracy.
poster
65
61
6.4
/8818/
65
/200/
63
/177/
3.3
/6072/
75
/20/
53
/92/
69
/6/

Arabesque (1966)
When a plot against a prominent Middle Eastern politician is uncovered, David Pollock, a professor of ancient hieroglyphics at Oxford University, is recruited to help expose the scheme. Pollock must find information believed to be in hieroglyphic code and must also contend with a mysterious man called Beshraavi. Meanwhile, Beshraavi's lover, Yasmin Azir, seems willing to aid Pollock -- but is she really on his side?
poster
Amazon Prime Video
61
6.3
/13583/
66
/620/
65
/442/
3.1
/11358/
50
/8/
60
/338/

City Hunter (1993)
A self-indulgent private investigator winds up on a cruise ship full of rich patrons, gorgeous women, murderous terrorists, and scarce food.
poster
Amazon Prime Video
60
6.2
/80928/
72
/5506/
64
/1417/
3.3
/87664/
34
/47/
68
/3821/
46
/14/
cc age 14+

Hackers (1995)
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
poster
Amazon Prime Video
61
57
6.5
/7264/
66
/240/
64
/136/
3.1
/3653/
53
/2657/

Sherlock Holmes and the Secret Weapon (1942)
In the midst of World War II, Sherlock Holmes rescues the Swiss inventor of a new bomb-sight from the Gestapo and brings him to England, where he quickly falls into the clutches of the evil Professor Moriarty.
poster
62
55
6.2
/7426/
66
/428/
61
/174/
3.1
/996/

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
poster
Hoopla
53
6.5
/202608/
68
/6860/
62
/2867/
2.7
/59323/
27
/139/
59
/6247/
32
/33/
cc age 18+

Swordfish (2001)
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
poster
The Roku Channel
49
6.1
/31242/
67
/1284/
60
/558/
2.8
/8233/
23
/105/
50
/948/
31
/29/
cc age 14+

Antitrust (2001)
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
poster
57
23
5.7
/492/
52
/47/
60
/79/
3.0
/430/

Raiders of the Lost Library (2022)
While digging one of the many tunnels for the Moscow metro, Soviet workers unearth ruins of a dungeon. The site is closed, the metro tunnel is diverted, and amidst the bustle no one notices the tunnel workers’ foreman pocketing a little ‘souvenir’ – a book-sized frame made of precious metals featuring an inscription in an unknown language. Decades later, the foreman’s grandson Ilya, who works as a courier, discovers the ancient relic in a pile of old junk. Oblivious to the true value of the family heirloom, he soon learns about it from a mysterious stranger. The relic is the key to the secret location of the priceless ancient library that belonged to Ivan the Terrible. What Ilya doesn’t know is that the search for the lost library has been going on for centuries, and now very powerful people are after him. Ilya and the mysterious stranger decide to try their luck in finding the library.
poster
45
21
4.2
/569/
49
/61/
54
/22/
1.8
/1916/

The Deep Web: Murdershow (2024)
A podcaster’s investigation of his sister’s death leads him to a grisly website, where the highest bidder decides how a chosen victim will be killed.
poster
The Roku Channel
52
?
5.6
/145/
60
/2/
42
/4/

Cipher Bureau (1938)
The younger brother of an officer in a secret government code-breaking unit gets involved with a gang of spies and a beautiful double agent.
poster
63
?
6.3
/236/
66
/51/
62
/9/
3.2
/477/

The Secret of Krakonoš (2022)
The new owner Štěpán arrives at the castle at the foot of the Krkonoš Mountains with his fiancée, the beautiful countess Blanka, and his younger brother Adam. There is another new visitor in the mountain town, the ethnographer Jiráček, who collects local legends and is amazed that the local people still believe in Krakonoš. Štěpán's carriage knocks down a passing girl, whom Adam helps and she falls in love with him. Will Liduška's love for Adam come true? What mystery does the painting at Hůrka Castle hide and what terrible thing once happened in the mountains? Who will decipher the mysterious marks of the Italian book? And who is Krakonoš and what is his biggest secret?
poster
?
5.7
/85/
42
/4/
60
/4/

Key of Keys (1965)
Intelligence director Suritai asks agent Kitami to steal money from anti-government guerrillas.
poster
fuboTV
63
?
6.0
/281/
52
/8/
55
/6/

The Red Machine (2009)
Washington, DC, 1935: At the height of the Great Depression, a charming and irrepressible young thief is forced to help an icy and mysterious United States Navy spy steal a brand new device that the Japanese military is using to encode its top-secret messages. During the mission, which is complicated by the spy's dark past in Tokyo, the two discover that they are pawns in a larger game. Together, they devise an intricate but risky scheme to outwit the people trying to use them.
poster
61
?
6.3
/187/
64
/9/
56
/10/

Men Without Wings (1946)
After an attack against the guard of the Third Reich, Nazi repression intensifies, and the Czechoslovakian resistance's organized sabotage in an aircraft factory leads to Gestapo shootings.


mdblist.com © 2020 | Contact | Reddit | Discord | API | Privacy Policy