Bookmarks
Bookmarks Bar
Aout
Art and Design
Computer
Coding
ASM
ASP
BASH
Basic
C
C#
C++
HTML
Java
Javascript
Mircscript
Perl
PHP
Python
Ruby
TCL
Visual Basic
Cryptography
Database
Hacking
Cracking
- Psst. Your Browser Knows All Your Secrets. | Diary Discussions | Community Forums | SANS Internet Storm Center; Cooperative Network Security Community - Internet Security
DoS
- EchoVNC Viewer Remote DoS Vulnerability
- Samba nttrans Reply - Integer Overflow Vulnerability
Exploit
- achelois.tweakers.net/~crisp/nu.html
- Wordpress Booking Calendar 4.1.4 - CSRF Vulnerability
- Metasploit: Here's that FBI Firefox Exploit for... | SecurityStreet
- D-Link Devices Unauthenticated Remote Command Execution
- Firefox onreadystatechange Event DocumentViewerImpl Use After Free
- OpenX Backdoor PHP Code Execution
- Open-FTPD 1.2 Arbitrary File Upload
- MiniWeb (Build 300) Arbitrary File Upload
- Ultra Mini HTTPD Stack Buffer Overflow
- Joomla Media Manager File Upload Vulnerability
- Java storeImageArray() Invalid Array Indexing Vulnerability
- Mozilla Firefox 3.5.4 - Local Color Map Exploit
- Mozilla Firefox 3.6 - Integer Overflow Exploit
- VLC Player 2.0.8 (.m3u) - Local Crash PoC
- freeFTPd 1.0.10 (PASS Command) - SEH Buffer Overflow
- Oracle Java BytePackedRaster.verify() Signed Integer Overflow
- Joomla! VirtueMart Component 2.0.22a - SQL Injection
- PenturaLabs/Linux_Exploit_Suggester · GitHub
- WinAmp 5.63 (winamp.ini) - Local Exploit
- Firefox XMLSerializer Use After Free
- Oracle Java ByteComponentRaster.verify() Memory Corruption
- Mac OS X Sudo Password Bypass
- OSX <= 10.8.4 - Local Root Priv Escalation (py)
- How to Inject Shellcode from Java | Strategic Cyber LLC
Maping
- Wireshark basics 101: A very simple tutorial for beginners
Virus
- AndroRAT drives the rise for DIY Android hacking tools
Warez
Web
- DEF CON Hackers Unveil a New Way of Visualizing Web Vulnerabilities - Slashdot
- Pay Attention To Me: Hacking PHP sessions by running out of memory
Wifi
- ▶ Computers {Wireless Computer Hacking} - YouTube
- marxy's musing on technology: Reverse engineering network traffic with a Raspberry Pi
Vulnerability
- Apache HTTP Server CVE-2013-1896 Remote Denial of Service Vulnerability
- Apache HTTP Server CVE-2013-2249 Unspecified Remote Security Vulnerability
- Apache suEXEC Privilege Elevation / Information Disclosure
- Billy Cole (ZeroSkewl) sur Twitter
- Bitcoin : Alerte de sécurité pour les wallets sous Android | UnderNews
- Bitcoin Bitcoind 'bitcoinrpc.cpp' Password Information Disclosure Vulnerability
- Chrome’s insane password security strategy • elliottkember
- D-Link DIR-600 and DIR-300 Multiple Security Vulnerabilities
- D-Link DIR-600 and DIR-300 Multiple Security Vulnerabilities
- Dropbox a Public enemy | PhrozenBlog
- Google Chrome CVE-2013-2883 Use After Free Remote Code Execution Vulnerability
- Google Chrome CVE-2013-2884 Use After Free Remote Code Execution Vulnerability
- Google Chrome CVE-2013-2886 Multiple Unspecified Security Vulnerabilities
- Google Chrome CVE-2013-2900 Remote Code Execution Vulnerability
- Google Docs Clickjacking Vulnerability
- https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt
- IBM Java CVE-2013-3009 Unspecified Arbitrary Code Execution Vulnerability
- IBM Java CVE-2013-4002 Unspecified Security Vulnerability
- Joomla redSHOP Component 1.2 - SQL Injection
- Joomla Sectionex Component 2.5.96 - SQL Injection Vulnerability
- Joomla! 'media.php' Arbitrary File Upload Vulnerability
- Linux Kernel 'perf_event.c' Local Privilege Escalation Vulnerability
- Linux Kernel Ceph CVE-2013-1059 Remote Denial of Service Vulnerability
- Linux Kernel CVE-2013-4127 Use After Free Memory Corruption Vulnerability
- Linux Kernel CVE-2013-4163 Local Denial of Service Vulnerability
- Linux Kernel CVE-2013-4220 Multiple Local Denial of Service Vulnerabilities
- Linux Kernel CVE-2013-4247 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3184 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3186 Remote Code Execution Vulnerability
- Microsoft Internet Explorer CVE-2013-3193 Use After Free Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3199 Use After Free Memory Corruption Vulnerability
- Microsoft Security Advisory (2876146): Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure
- Microsoft Windows CVE-2013-3175 Remote Privilege Escalation Vulnerability
- Microsoft Windows Print Spooler CVE-2012-1851 Remote Code Execution Vulnerability
- Microsoft Windows Uniscribe Font Parsing CVE-2013-3181 Remote Code Execution Vulnerability
- Mozilla Firefox and SeaMonkey 'libpr0n' GIF Parser Heap Based Buffer Overflow Vulnerability
- Mozilla Firefox WOFF-Based Font Decoder Integer Overflow Remote Code Execution Vulnerability
- Mozilla Firefox, SeaMonkey, and Thunderbird CVE-2013-1717 Information Disclosure Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0754 Remote Code Execution Vulnerability
- Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-1701 Multiple Memory Corruption Vulnerabilities
- Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-1702 Multiple Memory Corruption Vulnerabilities
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1709 Cross Site Scripting Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1710 Arbitrary Code Execution Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1712 Local Privilege Escalation Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1713 Same Origin Policy Security Bypass Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1714 Same Origin Policy Security Bypass Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2013-63 through -75 Multiple Vulnerabilities
- Mozilla Network Security Services CVE-2013-1620 Information Disclosure Vulnerability
- Multiple Cisco Products CVE-2013-0149 Remote Security Bypass Vulnerability
- Open-FTPD Multiple Command Authentication Bypass Vulnerabilities
- OpenStack Keystone CVE-2013-2013 Password Information Disclosure Vulnerability
- OpenStack Nova CVE-2013-2256 Security Bypass Vulnerability
- OpenStack Nova CVE-2013-4185 Denial of Service Vulnerability
- Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow
- Oracle Java SE CVE-2013-2425 Remote Java Runtime Environment Vulnerability
- Oracle Java SE CVE-2013-2445 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2452 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2470 Memory Corruption Vulnerability
- Oracle Java storeImageArray() Invalid Array Indexing
- Oracle Java storeImageArray() Invalid Array Indexing
- Oracle MySQL Server CVE-2012-0114 Local Security Vulnerability
- Oracle MySQL Server CVE-2012-0487 Remote MySQL Server Vulnerability
- Oracle MySQL Server CVE-2012-3167 Remote Security Vulnerability
- Oracle MySQL Server CVE-2012-3180 Remote Security Vulnerability
- Oracle MySQL Server CVE-2013-2392 Remote Security Vulnerability
- Oracle Solaris CVE-2013-3745 Local Security Vulnerability
- Oracle Solaris CVE-2013-3787 Remote Security Vulnerability
- Oracle Solaris CVE-2013-3799 Local Security Vulnerability
- Oracle Sun Products Suite CVE-2012-3131 Remote Solaris Vulnerability
- PHP 'tidy_diagnose()' NULL Pointer Dereference Denial Of Service Vulnerability
- PHP CVE-2011-4718 Session Fixation Vulnerability
- PHP SSL Certificate Validation CVE-2013-4248 Security Bypass Vulnerability
- PrestaShop : Un défaut de paramétrage rend vulnérable des milliers de sites e-commerce | UnderNews
- PuTTY 'getstring()' Function Multiple Integer Overflow Vulnerabilities
- PuTTY 'modmul()' Function Buffer Underrun Vulnerability
- PuTTY DSA Signature CVE-2013-4207 Remote Buffer Overflow Vulnerability
- PuTTY Private Key 'putty/sshdss.c' Multiple Information Disclosure Vulnerabilities
- PuTTY SSH keyboard Interactive Authentication Password Information Disclosure Weakness
- Samba CVE-2013-4124 Local Denial of Service Vulnerability
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- SecurityFocus
- Winamp CVE-2013-4694 Multiple Stack Buffer Overflow Vulnerabilities
- Wireshark CVE-2013-4080 Denial of Service Vulnerability
- Wireshark CVE-2013-4081 Stack Buffer Overflow Vulnerability
- Wireshark MPEG DSM-CC Dissector 'packet-mpeg-dsmcc.c' Denial of Service Vulnerability
- Wordpress HMS Testimonials Plugin 2.0.10 - Multiple Vulnerabilities
- Wordpress Usernoise Plugin 3.7.8 - Persistent XSS Vulnerability
- A Cheap Spying Tool With a High Creepy Factor - NYTimes.com
- IOActive Labs Research: Car Hacking: The Content
- Lab of a Penetration Tester: (Introducing) Powerpreter and Nishang 0.3.0 : Easy post exploitation using powershell - Part 1
- BinaryRF.com • View topic - Sniffing GSM with HackRF
- Top Five Hacker Tools Every CISO Should Understand : The State of Security
- [EXCLU] Rebooter n’importe quel iPhone à distance – Blogmotion
Networking
Operating System
Android
- Actualité android, application et test pour smartphone sur le blog | phonandroid
Autres
Black Berry
Bootloader
BSD
Linux
- Restaurer votre mot de passe root oublié sous Ubuntu et Debian GNU/Linux | crowd42crowd42
Mac
Windows
Security
- Un pirate dans votre smartphone | Data Security Breach
- OVH : une protection DDoS capable d'« encaisser n'importe quelle attaque » - PC INpact
Software
- drozer - MWR Labs
- TOR pour Android avec Orbot - une application proxy sur Google Play
- Send Files Online - TempSend.com
- Defcon 21 : Un système de fichiers distribués basé sur un botnet - Le Monde Informatique
- PirateBrowser - No More Censorship!
- Brackets | Downloads
- Seeking Alpha's Mobile Apps - Seeking Alpha
- infographie-stockage.jpeg (850×5272)
- Darknet, la face cachée du web
Economy
Entrepreneurship
E-commerce
Financement
Management
- Six key skills leaders need - The Globe and Mail
Marketing
SEO
- Le PAF-SEO, l'arme fatale en référencement
- Les principaux opérateurs et commandes de Google pour le SEO - JDN Web & Tech
- Décryptage de l'outil de comparaison SEO / SEA de Google
- L'actualité SEO qu'il ne fallait pas manquer cet été - JDN Web & Tech
- L'évolution du SEO : infographie des anciennes et nouvelles pratiques - Polynet
Outsourcing
- 4 Dirty Negotiating Tricks (and How to Counter Them) | Inc.com
Job
Stock Market
Bitcoin
- How Bitcoin Works - Forbes
- Raspberry Pi-powered briefcase converts loose change into bitcoin
- Judge to Bitcoin: You Are Money | Wired Enterprise | Wired.com
- Germany recognizes Bitcoin as a “private money,” subject to capital gains tax | Ars Technica
- The global oil industry: Supermajordämmerung | The Economist
- America’s new $60 trillion deadliest enemy - Paul B. Farrell - MarketWatch
- The economy: A bubble in pessimism | The Economist
- Get rich in the ‘Age of Megafires’: 2014-20 - Paul B. Farrell - MarketWatch
- Get rich in the ‘Age of Megafires’: 2014-20 - Paul B. Farrell - MarketWatch
- Emerging markets negative feedback cycle could play out like this - The Tell - MarketWatch
Entertainement
Anime
Audio Book
Brain Fart
Cinema
Comic Strip
E-book
Gaming
Old School
Geeked
8bits Retro Experiment
Music
Netcast
News
Pub
Sport
Travel
XXX
Hardware
Batery
DIY
- Arduino Blog » Blog Archive » My open-source, do-it-yourself cellphone (built with Arduino).
Drone
- World's Smallest Drone Autopilot System Goes Open Source | Wired Enterprise | Wired.com
Hardline
Military
- Compact laser weapons inch closer to battlefield | StratRisks
- Video - Libyan Forces Alleged to Have Fired at Oil Tanker - WSJ.com
Personal Computer
- Solar-powered Ubuntu laptop boasts 10-hour battery, 2-hour charge time
- HOT Watch : La nouvelle smartwatch de l'heure- Geekbecois
- Zalman launches world’s first CPU liquid cooler using nanofluids | Chips | Geek.com
- SpaceGlasses : des lunettes de réalité augmentée plus ambitieuses que Google Glass
Radio
- Wide-band WebSDR in JO32KF
Smartphone
TV
- Un sac à dos qui protège du piratage
- inWatch One : une montre intelligente chinoise avec Android 4.2 | FrAndroid
- Ces nano-capteurs sont capables de convertir la pression de vos doigts en lumière | Daily Geek Show
- NASA to test frickin' laser communications link with new lunar mission | ITworld
- Un mini fusil USB tirant des balles BB
Howto TOW
Fondation
- About the Lifeboat Foundation
- Building a Modern-Day Ark for the World's Rarest Farm Animals - Wired Science
IIA
- Explorer les données publiques de Google - Ramenos
Leetsaber
MSI
Psychohistoire
- Entreprendre à travers ses erreurs et ses échecs avec la méthode des 4A
SATO
TGL
The Borg Project
Ze Bookmark
Knowledge Ressources
Misc
Science
Astronomy
- A cometary graveyard
- L’éblouissant nouveau portrait de notre voisine galactique, Andromède | GuruMeditationGuruMeditation
- The Sun's Magnetic Field is about to Flip - NASA Science
- From The Planetary Society: Pluto's Surprising Problem of Cartography - Wired Science
- GJ 504b, une exoplanète rose découverte à 57 années-lumière de la Terre
- Hubble solves the 40-year-old mystery of the Magellanic Stream | Ars Technica
- Un flash à l'aube de l'Univers a illuminé une galaxie toute entière
- Mapping the magnetic field of our galaxy’s supermassive black hole | Ars Technica
- NASA : Nos chances de collision avec un astéroïde dans une effrayante illustration
- How a Black Hole Really Works - WSJ.com
- Scientists Shed New Light on Black Holes - WSJ.com
Biology
- 'Nightmare Bacteria' Attack an ICU and Close a Burn Unit - Wired Science
- Finding Cancer Cells in the Blood | MIT Technology Review
- Aphid attacks should be reported through the fungusphone | Byte Size Biology
- Adam et Eve ont vraiment existé, c'est prouvé génétiquement | Slate.fr
- 4 Billion-Year-Old Fossil Protein Resurrected, Thioredoxin May Have Lived On Mars
- Near-death experiences: the brain's last hurrah | Anil Seth | Comment is free | theguardian.com
- De l'engrais et de l'électricité... à partir de légumes rejetés | Jean-François Cliche | Science
- A 16 ans, elle invente un bioplastique issu de peaux de bananes | Courant Positif
- Human Guinea Pig: 8 Year Old Girl May Hold Key to Immortality - BlackListedNews.com
- Des scientifiques ont construit un cœur de souris qui bat | GuruMeditationGuruMeditation
- New drug mimics the beneficial effects of exercise
- Emergence of H7N9 avian flu hints at broader threat : Nature News & Comment
- Could we soon be reading people's MINDS? Software uses brain scans to identify exactly what people are looking at | Mail Online
- On ne voit que ce qu'on le croit | Agence Science-Presse
- Découverte d'un nouveau rôle pour le sodium dans le cerveau
- Stem cells used to create mini-brains in the lab | Ars Technica
- U. of Washington Researchers Perform First Noninvasive Human-to-Human Brain Interface, Sending Signal via Internet to Control Hand Motions | LeakSource
- On a découvert la protéine responsable de l’usure de la mémoire | Slate.fr
Chemical
- Scientists create “impossible material”—dubbed Upsalite—by accident | Ars Technica
- Nerve agents the most deadly of recognized chemical weapons, can kill within 10 minutes - The Washington Post
Computer Science
- Des chercheurs mettent au point un nouveau moyen de stocker vos données pour plusieurs millions d’années | Daily Geek Show
- Report: IBM developing computer system that thinks like a human | National Monitor
- The First Quantum Teleportation In A Computer Chip - Forbes
- Des processeurs au graphène à 400 GHz ! Oui, 400GHz ! - Mac4Ever.com
Earth
- Le réchauffement climatique s'est stabilisé depuis 15 ans - L'EXPRESS
- Et si la vie sur Terre venait de... Mars ?
Future
- Human Body Version 2.0
- Could Humanity Really Build 'Elysium'? - Slashdot
- ▶ Le recul de la mort: L'immortalité à brève échéance?: Laurent Alexandre at TEDxParis 2012 - YouTube
Physic
- P4_4 Teleportation | Roberts | Physics Special Topics
- KQEDScience • Here’s an excellent short animation about the...
- BBC News - University of St Andrews scientists create 'fastest man-made spinning object'
Robotic
- VIDEO. Carl, un robot-barman, pour vous servir - Le Nouvel Observateur
Space Exploration
- Twelve Months in Two Minutes; Curiosity's First Year on Mars - YouTube
- NASA and ESA To Demonstrate Earth-Moon Laser Communication - Slashdot
- Private Space Race Heats Up With Some Key Breakthroughs | Autopia | Wired.com
- DIY Space Suit Testing - Slashdot
- Canada could send first astronaut to the moon within two decades - The Globe and Mail
- Space Capsule Emergency Egress – Space Suit Session Day 07 - Wired Science
- NASA test-fires 3D printed rocket parts: low cost, high power innovation | Ars Technica
- La NASA découvre de l'eau au centre de la Lune
- Chaleur - Tokyo remet en marche ses machines à pluie pour lutter contre le manque d'eau
Social
Common Sense
Engineering
- Comment éviter les folles - Guide de survie pour l'homme moderne
Experiment
History
- Neandertals made the first specialized bone tools in Europe
- Des civilisations méditerranéennes détruites par la sécheresse il y a 3 200 ans
- Someone beat the Vikings into the North Atlantic by 500 years | Ars Technica
- Ancient Egyptian Sphinx Mysteriously Unearthed In Israel - BlackListedNews.com
Manif
Network
Philosophy
Politic
- Pirate Party of Canada
- PP International
Psychology
- Taking pills for unhappiness reinforces the idea that being sad is not human | The Raw Story
- New meta-analysis checks the correlation between intelligence and faith | Ars Technica
- Your Thoughts Can Release Abilities beyond Normal Limits: Scientific American
Warfare
- Rising temperatures increase risk of violence, war: study - The Globe and Mail
- Report: Al-Qaida developed liquid that turns clothes into explosives - Diplomacy & Defense - Israel News | Haaretz
- Climate and conflict: Cloudy with a chance of war | The Economist
- Royal Navy deployed laser weapons during the Falklands War
- The Israel Defence Forces: Taking wing | The Economist
- The Crises in Syria, Lebanon and Egypt: The Plan to ‘Divide and Conquer’ the Middle East and Why All Roads Lead to Tehran | Economics | News, Opinions & Analysis that Matters
- War Games: The Syrian Military Theater Of Operations In Two Charts - BlackListedNews.com
- The history of chemical weapons: The shadow of Ypres | The Economist
- Wake up to the aboriginal comeback - The Globe and Mail
- ▶ Slavery By Consent ( Full Version) - YouTube
- World Socialist Web Site - Marxist analysis, international working class struggles & the fight for socialism
Underground
Anonymousity
- Anonymouth Hides Identity
- Comment effacer intelligemment ses traces Web sous Google Chrome | UnderNews
- Tracking devices hidden in London's recycling bins are stalking your smartphone (Wired UK)
- [Tutoriel] Devenir Anonyme sur Internet | Why We Protest | Anonymous Activism Forum
Conspiracy Theory
- The Government Now Admits There's an 'Area 51' - Philip Bump - The Atlantic Wire
Cyberwar
- Cyber-Sabotage Is Easy | Earth First! Newswire
Lockpicking
- Millions of Kwikset Smartkey Locks Vulnerable to Hacking, Say Researchers | Threat Level | Wired.com
- MIT Students Release Program To 3D-Print High Security Keys - Forbes
Spying
- FBI Taps Hacker Tactics to Spy on Suspects - WSJ.com
- The Daily Dot - 5 other countries share NSA's ability to watch your every online move
- Expert Says NSA Have Backdoors Built Into Intel And AMD Processors - eTeknix
- XKeyscore : le Google de la NSA, selon la presse… : Reflets
- FBI can remotely activate Android and laptop microphones, reports WSJ | The Verge
- Canada’s Communications Security Establishment part of a secret state-within-the-state - World Socialist Web Site
- Secret NSA Documents Show How the US Spies on Europe and the UN - SPIEGEL ONLINE
Stalking
Urban Exploration
- Activist Post
Anonymous
- Anonymous Newblood Wiki
- A Cypherpunk’s Manifesto | cypherpunks
- The Syrian Electronic Army Talks About Tuesday’s Hacks | VICE United States