Bookmarks
Bookmarks Bar
- scrible Toolbar
- Google
- SHODAN - Computer Search Engine
- SHODAN - Computer Search Engine
- Gmail : la messagerie de Google
- Sign In
- twitter.com
- Bienvenue sur Facebook. Connectez-vous, inscrivez-vous ou découvrez!
Mai
Art and Design
Computer
Coding
ASM
ASP
BASH
Basic
C
C#
C++
HTML
Java
Javascript
Mircscript
Perl
PHP
Python
Ruby
TCL
Visual Basic
Cryptography
Database
Hacking
Cracking
- Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica
- littleblackbox - Database of private SSL/SSH keys for embedded devices - Google Project Hosting
DoS
- Watch: A Website Getting Hacked Into Oblivion | Co.Design: business + innovation + design
- No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow
Exploit
- Craigslist Gold - SQL Injection Vulnerability
- Joomla DJ Classifieds Extension 2.0 - Blind SQL Injection Vulnerability
- Linux Kernel open-time Capability file_ns_capable() - Privilege Escalation Vulnerability
- Linux PERF_EVENTS - Local Root Exploit
- Linux Kernel open-time Capability file_ns_capable() Privilege Escalation
- Index of /~sd/warez
- Linksys WRT160nv2 apply.cgi Remote Command Injection
- D-Link DIR615h OS Command Injection
- Linksys WRT160nv2 apply.cgi Remote Command Injection
- Veil - A Payload Generator to Bypass Antivirus
Maping
Virus
- Ruby on Rails Exploit Harvests IRC Botnet | Threatpost
Warez
Web
- CyberGuerrilla soApboX » #ro0ted Sandcat Browser – Pen-Test Oriented Web Browser
- Injection SQL via Android | Korben
Wifi
- Android for Penetration Testers - PwnPad Goodness
- Three wireless security myths – busted! [VIDEO] | Naked Security
Vulnerability
- Microsoft Internet Explorer CVE-2013-1347 Use-After-Free Remote Code Execution Vulnerability
- Joomla! DJ-Classifieds Extension 'se_regs' Parameter SQL Injection Vulnerability
- Linux Kernel CVE-2012-6549 Local Information Disclosure Vulnerability
- WordPress Gallery Plugin 'filename_1' Parameter Remote Arbitrary File Access Vulnerability
- Oracle Java SE CVE-2013-2436 Security Bypass Vulnerability
- Xen CVE-2013-1964 Local Denial of Service Vulnerability
- Xen CVE-2013-1952 Local Denial of Service Vulnerability
- Mozilla Firefox/Thunderbird CVE-2013-1674 Remote Code Execution Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1670 Cross Site Scripting Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1680 Use After Free Memory Corruption Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-0801 Memory Corruption Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1678 Memory Corruption Vulnerability
- Oracle Java SE CVE-2013-2384 Remote Code Execution Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1675 Information Disclosure Vulnerability
- Microsoft Internet Explorer CVE-2013-1312 Use-After-Free Remote Code Execution Vulnerability
- SecurityFocus
- Oracle Java SE CVE-2013-2424 Remote Java Runtime Environment Vulnerability
- Linux Kernel 'fs/compat_ioctl.c' Information Disclosure Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1681 Use After Free Memory Corruption Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1679 Use After Free Memory Corruption Vulnerability
- Mozilla Firefox/Thunderbird CVE-2013-1672 Local Privilege Escalation Vulnerability
- Oracle Sun Products Suite CVE-2013-1530 Local Security Vulnerability
- Wireshark ASN.1 BER Dissector Denial of Service Vulnerability
- Wireshark DCP ETSI Dissector NULL Pointer Dereference Denial of Service Vulnerability
- Wireshark ETCH Dissector Denial of Service Vulnerability
- Wireshark Websocket Dissector Denial of Service Vulnerability
- Wireshark Websocket Dissector 'packet-websocket.c' Denial of Service Vulnerability
- WordPress Traffic Analyzer Plugin 'aoid' Parameter Cross Site Scripting Vulnerability
- Oracle Java SE CVE-2013-2383 Remote Code Execution Vulnerability
- Oracle Java SE CVE-2013-0401 Remote Code Execution Vulnerability
- Full Disclosure: SEC Consult whitepaper :: Blackberry Z10 Research Primer - "Dissecting Blackberry 10 - An initial analysis"
- Mozilla Firefox and Thunderbird CVE-2013-1677 Out of Bounds Memory Corruption Vulnerability
- Cisco Wireless LAN Controller CVE-2013-1235 Remote Denial of Service Vulnerability
- Cisco WebEx Social CVE-2013-1245 Multiple Security Bypass Vulnerabilities
- Cisco Unified Communications Manager CVE-2013-1240 Local Information Disclosure Vulnerability
- Mozilla Firefox and Thunderbird CVE-2013-1669 Memory Corruption Vulnerability
- Mozilla Firefox CVE-2013-1671 Information Disclosure Vulnerability
- Adobe Flash Player and AIR CVE-2013-3333 Remote Memory Corruption Vulnerability
- Apache Tomcat CVE-2013-2071 Information Disclosure Vulnerability
- Apache Tomcat CVE-2013-2067 Session Fixation Vulnerability
- Apache Tomcat CVE-2012-3544 Denial of Service Vulnerability
- Google Chrome CVE-2013-2849 Cross Site Scripting Vulnerability
- Apple QuickTime CVE-2013-0989 Buffer Overflow Vulnerability
- Microsoft Windows 'HTTP.sys' Remote Denial of Service Vulnerability
- Microsoft Internet Explorer CVE-2013-1308 Use-After-Free Remote Code Execution Vulnerability
- Cisco Nexus 1000V NX-OS CVE-2013-1211 Authentication Bypass Vulnerability
- Cisco NX-OS Software for Nexus 1000 Series CVE-2013-1210 Remote Denial of Service Vulnerability
- Microsoft Internet Explorer CVE-2013-3140 Use-After-Free Remote Code Execution Vulnerability
- Apple QuickTime CVE-2013-1017 Buffer Overflow Vulnerability
- Adobe Reader and Acrobat CVE-2013-2550 Use After Free Remote Code Execution Vulnerability
- Cisco Nexus 1000V NX-OS CVE-2013-1208 Security Bypass Vulnerability
- Cisco Nexus 1000V NX-OS CVE-2013-1212 SSL Certificate Validation Security Bypass Vulnerability
- Cisco Nexus 1000 Series Switches NX-OS CVE-2013-1209 Remote Authentication Bypass Vulnerability
- Oracle Java SE CVE-2013-1563 Remote Java Runtime Environment Vulnerability
- Oracle Java SE CVE-2013-2435 Remote Java Runtime Environment Vulnerability
- Oracle Java SE CVE-2013-2428 Remote Code Execution Vulnerability
- Oracle Java SE CVE-2013-2429 Remote Java Runtime Environment Vulnerability
- Oracle Java SE CVE-2013-1569 Stack Buffer Overflow Vulnerability
- Oracle Java SE CVE-2013-2421 Remote Java Runtime Environment Vulnerability
- Linux Kernel CVE-2013-2850 Heap Based Buffer Overflow Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0797 Local Privilege Escalation Vulnerability
- CyberGuerrilla soApboX » #ro0ted BT Still Works: Attacking on Windows, Linux or MAC PC using Java Applet Method Handle Remote Code Execution
- CyberGuerrilla soApboX » #ro0ted Sql Injection Tools: BSQL Hacker
- CyberGuerrilla soApboX » #ro0ted Sql Injection Tools: The Mole
- CyberGuerrilla soApboX » #ro0ted Sql Injection Tools: Safe3SI
- CyberGuerrilla soApboX » #ro0ted Hack Remote Windows Passwords in Plain Text with WCE
- Samsung Galaxy S4 already hacked - The H Security: News and Features
- Researcher Unlocks Galaxy S4 Bootloader For AT&T, Verizon Phones - Slashdot
- LG Optimus G - Une faille de sécurité inquiètante - Android et Vous !
- Comment rooter le Samsung Galaxy S4
- Cyber crime statistics and trends [infographic] - Holy Kaw!
Networking
Operating System
Android
- InfoSec Institute Resources – Transforming your Android Phone into a Network Pentesting Device
- dSploit - Android Network Penetration Suite
Autres
Black Berry
Bootloader
BSD
Linux
Mac
Windows
- Review of Start8 and Pokki: Bringing an Old Start to a New Windows - WSJ.com
Security
Software
- AndroVM blog | Running Android in a Virtual Machine
- CyberGuerrilla soApboX » #ro0ted Microsoft Attack Surface Analyzer
- CyberGuerrilla soApboX » #ro0ted How to View Last Activity of Your PC
- Buycott : une application pour mieux voter avec son argent
- vFeed® – The Open Source Correlated & Cross-Linked Vulnerability XML Database | ToolsWatch.org - The Hackers Arsenal Tools | Repository for vFeed and DPE Projects
- Un service génial pour envoyer et recevoir ses textos « TECHNOSTÉRONE Le blogue de Pascal Forget
- Cyberfox : un Firefox survitaminé !
- Generate a Random Name - Male, French, Canada - Fake Name Generator
- scrible | smarter online research - annotate, organize & collaborate on web pages
- infographie-histoire-du-seo.jpg (800×5390)
Economy
Entrepreneurship
E-commerce
Financement
- 10 ways to grow your business by 10% (or 20% or 50%) in 12 months
- Bit Angels
Management
Marketing
SEO
- Voici ce que nous réserve Google en terme de SEO en 2013
- SEO Copywriting – 10 Tips for Writing Content that Ranks in 2013 (Infographic)
- 18 Ways to Increase Your Visibility and Your Credibility -- all with less work than you're likely doing now | Sandra Martini
Outsourcing
Job
- Asking for a Raise? Avoid Round Numbers - WSJ.com
Stock Market
Bitcoin
- Why Bitcoin will succeed - Outside the Box - MarketWatch
- Wary of Bitcoin? A guide to some other cryptocurrencies | Ars Technica
- www.zerohedge.com/sites/default/files/images/user3303/imageroot/2013/05/20130512_BTC.jpg
- Russia’s Plan For The BRICS To Dismantle The Dollar System - BlackListedNews.com
- 10 Amazing Charts That Demonstrate The Slow, Agonizing Death Of The American Worker - BlackListedNews.com
- Joe Oliver: The end of fossil fuels would be an economic and social catastrophe - The Globe and Mail
Entertainement
Anime
Audio Book
Brain Fart
Cinema
Comic Strip
E-book
Gaming
Old School
- PopChartLab_Controllers_Print_ZOOM_0419.jpg (3000×4332)
- Daily chart: Game on | The Economist
Geeked
8bits Retro Experiment
- 42 signes qui montrent que vous êtes un vrai geek | Spawnrider.Net :: Blog | Le blog de Yohann CIURLIK ?>
Music
Netcast
News
- Warrior Publications | Purpose: To promote warrior culture, fighting spirit, and resistance movements
Pub
Sport
Travel
XXX
Hardware
Batery
- Une adolescente invente un dispositif capable de recharger un mobile en 20s
DIY
- Bitcoin helps fund world’s first 3D-printed gun, now test fired and available for download - BlackListedNews.com
- Un sabre laser pour de vrai
- zYUocGs.jpg (512×362)
Drone
Hardline
Military
- Pentagon Lifts Veil on 7 New Obscure Chinese Weapons | Danger Room | Wired.com
- Watch Lockheed Martin’s ADAM laser destroy a missile mid-flight | Science! | Geek.com
- A Computer-based Smart Rifle With Incredible Accuracy, Now On Sale - Slashdot
- A New 'Smart Rifle' Decides When To Shoot And Rarely Misses : All Tech Considered : NPR
- Robot Guns, Combat Facebook: The Tech of the Army's 'Last' Afghanistan Brigade | Danger Room | Wired.com
- The £16 gun: Plastic firearm you can make at home from household items is created by 3D printer | Mail Online
Personal Computer
- Casetop, transformez votre smartphone en ordinateur portable ! - FrAndroid
- Jet : les lunettes solaires intelligentes inspirées par Google - CNET France
Radio
Smartphone
TV
- MakerBot and Robohand -- 3D Printing Mechanical Hands - YouTube
- The Jury's Out on Google Glass - Digits - WSJ
- The Official Arduino Robot
- NASA is funding a 3D food printer, and it'll start with pizza | The Verge
Howto TOW
Fondation
IIA
Leetsaber
MSI
Psychohistoire
- We Are Now One Year Away From Global Riots, Complex Systems Theorists Say | Motherboard
SATO
TGL
The Borg Project
Ze Bookmark
Knowledge Ressources
Misc
- Life through Google's eyes - YouTube
Science
Astronomy
- La Nasa enregistre les images des deux plus grosses éruptions solaires de l'année - 20minutes.fr
- Violent Galactic Clash May Solve Cosmic Mystery - Slashdot
- NASA : la création des galaxies enfin révélée [Vidéo]
Biology
- Reuters Next — Scientists create human stem cells through cloning
- Reservoir deep under Ontario holds billion-year-old water : Nature News & Comment
- La fourmi dévoreuse d’électronique
- Researchers Regenerate 400-Year-Old Frozen Plants - Slashdot
- Des embryons de dinosaures donneraient accès à du matériel organique
Chemical
Computer Science
- Google, NASA Open New Lab to Kick Tires on Quantum Computer | Wired Enterprise | Wired.com
- Des chercheurs chinois créent la première mémoire quantique, Google et la NASA mettent sur pied un laboratoire quantique de recherche sur l'IA
- Some Scientists Question Whether Quantum Computer Really Is Quantum - Slashdot
Earth
- The Sixth Extinction is Upon Us. | elephant journal
Future
- Want to live forever? Russian billionaire reveals real-life 'avatar' plan - and says he will upload his brain to a hologram and become immortal by 2045 | Mail Online
Physic
- Physicists Create Quantum Link Between Photons That Don't Exist at the Same Time | Wired Science | Wired.com
- A Snapshot of the Inside of an Atom - Slashdot
- Physics - A New Look at the Hydrogen Wave Function
- A Snapshot of the Inside of an Atom - ScienceNOW
- Quantum gravity takes singularity out of black holes - space - 29 May 2013 - New Scientist
Robotic
- The New AI: Where Neuroscience and Artificial Intelligence Meet - Slashdot
Space Exploration
- Unknown Mathematician Proves Elusive Property of Prime Numbers | Wired Science | Wired.com
Social
Common Sense
Engineering
Experiment
History
- Historical linguistics: Eurasiatic? | The Economist
- Resource Wars: Major U.S. military operations/actions to protect oil - BlackListedNews.com
- Georgian War [Documentary] - YouTube
- 2013/05/29 > BE Brésil 145 > Une étude archéologique réalisée dans l'Etat du Piaui pourrait changer l'histoire de l'arrivée des premiers hommes en Amérique
- Wall Street Funded the Bolshevik Revolution - Professor Antony Sutton - YouTube
Manif
Network
Philosophy
Politic
Psychology
Warfare
- The Aviationist » Russia’s NATO to have its own Air Force
- The Aviationist » Russia’s NATO to have its own Air Force
- AR_0513b
- US Army Creates NATO Rapid-Deployment Forces | StratRisks
- Data Footprints by Generations [Infographic]
Underground
Anonymousity
- Protect your privacy on Google | Fox News
- ANONYMOUS – La NSA publie son manuel du parfait cyber-espion | Big Browser
- Comment empêcher Google de vous pister en ligne ? - francetv info
- The New Xbox One Will be a "Monitoring Device Under the Guise of a Gaming Console" - The Vigilant Citizen - The Vigilant Citizen
Conspiracy Theory
- Tomgram: Rosner and Markowitz, Your Body Is a Corporate Test Tube | TomDispatch
- Do You Want the Government Buying Your Data From Corporations? - Bruce Schneier - The Atlantic
- Dying CIA Agent reveals US Government Alien Contact, Area 51 secrets, black ops and UFO knowledge - YouTube
- Microsoft espionnerait-il via Skype ?
- 'Men in Black' Russian UFO-НЛО Documentary Promoted by Prime Minister Dmitry Medvedev - YouTube
- FR - Témoins militaires d'OVNI sur des sites nucléaires - National Press Club (27-09-10) VOSTFR - YouTube
- Oliver Stones: The Untold History Of The United States Episode 10. [Video]
- Engineering Empire: An Introduction to the Intellectuals and Institutions of American Imperialism - BlackListedNews.com
- Bilderberg, Google and the G8: New Global Tax Regime Already in the Works
Cyberwar
- Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies - The Washington Post
- This Pentagon Project Makes Cyberwar as Easy as Angry Birds | Danger Room | Wired.com
- Les pirates chinois s'attaquent aux services secrets australiens et au Pentagone | UnderNews
Lockpicking
Spying
- 5 Russian-Made Surveillance Technologies Used in the West | Danger Room | Wired.com
- Twitter / RT_com : PHOTO: Alleged CIA spy had ...
- Cloak, dagger and a blond wig? FSB says CIA agent nabbed in Moscow (VIDEO, PHOTOS) — RT News
- Encircling Russia with US Military Bases: Moscow Catches CIA Spy Red-Handed | Global Research
Stalking
- CyberGuerrilla soApboX » #ro0ted How to Find Windows 7 PC Location in Google Map
Urban Exploration
- Name.com hacked by the "Hack The Planet" group ; E Hacking News affected - E Hacker News
- Vulnerability analysis, Security Papers, Exploit Tutorials
- Montreal City Police Live Audio Feed
- Operation Hangover : La plus grande activité de cyber-espionnage jamais connue originaire d’Inde | Data Security Breach
- Parastoo Attacks National Nuclear Security Administration