Bookmarks

Bookmarks Bar

Septembre

Art and Design

Trouver des images libres de droit avec Google

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Cryptography

Hash Generator

Database

Hacking

Cracking

Another iPhone lockscreen bypass vulnerability found in iOS 7.02 - The Hacker News

DoS

▶ Alex @ DEF CON 2013 - Massive Attacks with Distributed Computing - YouTube

Exploit

▶ Buffer overflow - Wiki Article - YouTube
freeFTPd 1.0.10 PASS Command SEH Overflow (msf)
D-Link DSL-2740B - Multiple CSRF Vulnerabilities
How did I get a root shell in my NAS, 0day inside
Oracle Java ShortComponentRaster.verify() Memory Corruption
D-Link Devices UPnP SOAP Telnetd Command Execution
Researchers find new, ultra-low-level method of hacking CPUs – and there’s no way to detect it | ExtremeTech
contagio: An Overview of Exploit Packs (Update 19.1) April 2013
Easy Hacking/Security Testing with Armitage: This Week in Enterprise Tech 59 - YouTube
Hax0rFunT1me !! <HTML> <head> <meta HTTP-EQUIV="Content-Type" Content="te - Pastebin.com
▶ Kali Linux - Firefox Addon Exploit (Tested on Windows 8) - YouTube
freeFTPd PASS Command Buffer Overflow
Micorosft Internet Explorer SetMouseCapture Use-After-Free

Maping

GRC | SSL TLS HTTPS Web Server Certificate Fingerprints
▶ Kali Linux - Hacking - Banner Grabbing - YouTube
vulnerability-check - this simple script uses open source software and performs almost same task as Nessus or AVDS - Google Project Hosting

Virus

Warez

Torrent a telecharger sur Cpasbien.me - Torrent en téléchargement : Films Divx, Séries Télé, Albums mp3, Jeux...

Web

Wifi

Vulnerability

Oracle MySQL Server CVE-2012-0496 Remote Security Vulnerability
Oracle MySQL CVE-2012-0583 Remote MySQL Server Vulnerability
Cisco IOS CVE-2013-5469 Remote Denial of Service Vulnerability
Cisco Wireless LAN Controller CVE-2013-3474 Multiple Denial of Service Vulnerabilities
Linux Kernel '/net/core/scm.c' nsproxy Local Privilege Escalation Vulnerability
PHP CVE-2012-5381 Insecure File Permissions Vulnerability
Linux Kernel Btrfs CRC32C feature Infinite Loop Local Denial of Service Vulnerability
Linux Kernel Btrfs CRC32C feature CVE-2012-5375 Security Bypass Vulnerability
Linux Kernel 'kvm_set_memory_region()' Function Local Privilege Escalation Vulnerability
Linux Kernel 'skbuff.c' Local Denial of Service Vulnerability
Linux Kernel 'dispatch_discard_io()' Function Security Bypass Vulnerability
Linux Kernel 'perf' Utility CVE-2013-1060 Local Privilege Escalation Vulnerability
Cisco Adaptive Security Appliance (ASA) Software Denial of Service Vulnerability
Oracle MySQL Server CVE-2013-3809 Remote Security Vulnerability
Oracle MySQL Server CVE-2013-3807 Remote Security Vulnerability
Oracle MySQL Server CVE-2013-3806 Remote Security Vulnerability
D-Link DIR-505 1.06 - Multiple Vulnerabilities
Oracle MySQL Server CVE-2013-3811 Remote Security Vulnerability
Cisco SocialMiner CVE-2013-5483 Cross Site Scripting Vulnerability
Oracle MySQL Server CVE-2013-3808 Remote Security Vulnerability
Oracle Java SE CVE-2013-0419 Java Runtime Environment Remote Security Vulnerability
Oracle Java SE CVE-2013-2434 Remote Code Execution Vulnerability
Microsoft Internet Explorer CVE-2013-3206 Memory Corruption Vulnerability
Microsoft Windows Object Linking and Embedding (OLE) Remote Code Execution Vulnerability
Microsoft Internet Explorer CVE-2013-3207 Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2013-3201 Memory Corruption Vulnerability
PHP 'ext/soap/php_xml.c' Multiple Arbitrary File Disclosure Vulnerabilities
Microsoft Windows Theme File CVE-2013-0810 Remote Code Execution Vulnerability
GNU glibc Multiple Integer Overflow Vulnerabilities
Microsoft Internet Explorer CVE-2013-3209 Memory Corruption Vulnerability
FreeBSD CVE-2013-5691 Local Privilege Escalation Vulnerability
FreeBSD CVE-2013-5710 Local Security Bypass Vulnerability
FreeBSD IP_MSFILTER Local Privilege Escalation Vulnerability
Adobe Flash Player and AIR CVE-2012-5260 Buffer Overflow Vulnerability
Adobe Flash Player and AIR CVE-2012-5262 Buffer Overflow Vulnerability
Adobe Flash Player and AIR CVE-2012-5261 Memory Corruption Vulnerability
Wireshark NBAP Dissector CVE-2013-5718 Denial of Service Vulnerability
Oracle Java SE CVE-2013-2426 Multiple Remote Code Execution Vulnerabilities
Oracle Java SE CVE-2013-2437 Remote Security Vulnerability
Apache Subversion CVE-2013-4277 Insecure Temporary File Creation Vulnerability
Linux Kernel CVE-2013-2894 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-2891 Heap Buffer Overflow Vulnerability
SecurityFocus
SecurityFocus
Google Chrome CVE-2013-2848 Information Disclosure Vulnerability
Cisco Unified Computing System Certificate Validation CVE-2012-4072 Security Bypass Vulnerability
Apple Mac OS X 'mach_port_space_info()' Function Local Information Disclosure Vulnerability
Cisco NX-OS CVE-2013-1121 Denial of Service Vulnerability
Cisco Unified Computing System Certificate Validation CVE-2012-4073 Security Bypass Vulnerability
WordPress 'post.php' Privilege Escalation Vulnerability
WordPress CVE-2013-4339 Multiple Open Redirection Vulnerabilities
WordPress 'get_allowed_mime_types()' Function Security Weakness
Cisco Unified Computing System CVE-2012-4083 Remote Denial of Service Vulnerability
Cisco IPS Software Authentication Manager CVE-2013-5497 Denial of Service Vulnerability
Cisco AnyConnect Secure Mobility Client CVE-2013-1130 Local Privilege Escalation Vulnerability
freeFTPd 'PASS' Command Buffer Overflow Vulnerability
Linux Kernel 'sctp_v6_xmit()' Function CVE-2013-4350 Information Disclosure Vulnerability
Linux Kernel '_xfs_buf_find()' Function NULL Pointer Dereference Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1737 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1730 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1722 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1718 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1732 Buffer Overflow Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1736 Remote Memory Corruption Vulnerability
Cisco Unified Computing System CVE-2012-4089 Local Command Injection Vulnerability
ProFTPD 'mod_sql' Remote Heap Based Buffer Overflow Vulnerability
Google Chrome CVE-2013-2859 Unspecified Security Vulnerability
Google Chrome CVE-2013-2853 Man in the Middle Security Vulnerability
Google Chrome CVE-2013-2860 Use-After-Free Remote Code Execution Vulnerability
Google Chrome CVE-2013-2882 Remote Code Execution Vulnerability
Google Chrome CVE-2013-2881 Origin Policy Security Bypass Vulnerability
Google Chrome CVE-2013-0894 Remote Buffer Overflow Vulnerability
Bypassing Microsoft Windows ASLR with a little help by MS-Help | GreyHatHacker.NET
Google Chrome CVE-2013-2879 Remote Code Execution Vulnerability
Google Chrome CVE-2013-2878 Out of Bounds Memory Corruption Vulnerability
Google Chrome CVE-2013-2876 Security Bypass Vulnerability
Linux Kernel CVE-2013-2899 NULL Pointer Dereference Denial of Service Vulnerability
Oracle Java SE CVE-2012-4305 JavaFX Remote Security Vulnerability
Oracle Java SE CVE-2013-0439 Remote JavaFX Vulnerability
Cisco Unified Computing System CVE-2012-4088 Hardcoded Password Security Bypass Vulnerability
Linux Kernel CVE-2013-2889 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-2892 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-2893 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-2897 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-4205 Local Denial of Service Vulnerability
Xen CVE-2013-0151 Local Denial of Service Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0766 Use After Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1726 Security Bypass Vulnerability
Xen 'syscall/sysenter' Instruction Local Denial of Service Vulnerability
Linux Kernel CONFIG_HID Local Memory Corruption Vulnerability
Linux Kernel CVE-2013-0343 IPv6 Temporary Addresses Remote Security Vulnerability
Microsoft Internet Explorer CVE-2013-3893 Memory Corruption Vulnerability
Xen 'TMEM hypercall' Multiple Security Vulnerabilities
Xen CVE-2013-0154 Local Denial Of Service Vulnerability
Xen CVE-2013-4356 Local Memory Access Vulnerability
Cisco Unified Computing System CVE-2012-4104 Local Directory Traversal Vulnerability
Cisco Unified Communications Domain Manager CVE-2013-5517 SQL Injection Vulnerability
Cisco Unified Computing System Fabric Interconnect Local Arbitrary File Access Vulnerability
Linux Kernel CVE-2013-4345 Off-By-One Buffer Overflow Vulnerability
Mozilla Firefox/SeaMonkey CVE-2013-1721 Integer Overflow Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1724 Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1723 Denial of Service Vulnerability

Vulnerabilities Everywhere
▶ Kali Linux - How to hack Android using Metasploit - YouTube
CCC | Chaos Computer Club breaks Apple TouchID

Networking

Operating System

Android

Autres

Black Berry

Bootloader

BSD

Linux

Kali Linux Tutorials - How to run Applications as Standard User & Install Chrome (BackTrack 6) - YouTube
Kali Linux on Android using Linux Deploy | Kali Linux
Connaître la puissance de son signal Wifi sous GNU/Linux en 1 ligne de commande | La vache libre

Mac

Windows

Security

Comment suivre un internaute sans cookie ni javascript ? | Korben
Introducing audit_login: simple MySQL login logfile based auditing | code.openark.org
Embrouiller les scans de ports | Korben
drk1wi/portspoof · GitHub

Software

goosh.org - the unofficial google shell.
Android essentials: The first 12 apps I install on every phone | Computerworld Blogs
Comment cacher la mention "Vu" sur le chat Facebook - Le blog du Modérateur
Android Smarter Wi-Fi Manager
200 astuces pour maîtriser Google - Le blog du Modérateur

Rechercher de l’information sur Internet : dossier complet | Jean-Luc Raymond
Comment vivre sans Google sur Android, Mobile, et PC ? - Blog Perso

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

Comment faire une veille SEO de qualité? | Alexandra Martin
Astuce SEO #6 : Comment analyser rapidement la concurrence d’un mot-clé - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
11 astuces pour que votre blog caresse Google dans le bon sens du poil | Autour du Web
Référencement d'un site: les 10 questions à se poser | Consultant référencement

Outsourcing

Job

Stock Market

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

VEillEurs.info【ツ】 | [Jeux] Game of Thrones: The 8-bit game !

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

DIY

raspberry_pi_iphone.jpg (2209×1936)
How to make a DIY home alarm system with a raspberry pi and a webcam — Medium

Drone

Hardline

Military

DARPA Launches Military Spaceplane Project - Slashdot
Plus fort que le drone, l’avion de chasse sans pilote, Actualités

Personal Computer

Cray gives its supercomputers more cores with Ivy Bridge upgrade | Ars Technica
Intel’s Atom CPUs finally get serious with the new Bay Trail architecture | Ars Technica
Wrap That Rascal With A USB Condom - HotHardware
$199, 4.2” computer is Intel’s first Raspberry Pi competitor | Ars Technica

Radio

Smartphone

▶ Phonebloks - YouTube

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

À seulement 15 ans, elle invente une source de lumière virtuellement inépuisable | Daily Geek Show

Howto TOW

Fondation

IIA

Wanna Buy a Parka That Makes You Invisible to Drones? | Wired Design | Wired.com
Top Level Telecommunications: The US classification system

Leetsaber

MSI

Psychohistoire

SATO

TGL

The Borg Project

Watch: 5 Surreal Gadgets for Surviving a Horrifying Apocalypse | Wired Design | Wired.com

Ze Bookmark

Knowledge Ressources

U.S. Chemical Weapons Stockpile and Destruction Sites Map and Photos | Public Intelligence

Misc

Science

Astronomy

Actualité > Les galaxies naines d'Andromède défient la matière noire
Un astéroïde qui orbite à proximité de la Terre ? Non, une comète !
Le trou noir de notre galaxie sur le point d'exploser | Atlantico
Découverte d&rsquo;une nova dans le Dauphin | Le Cosmographe
Notre galaxie, la Voie lactée, a un coeur en forme de cacahuète

Biology

How to Hatch a Dinosaur | Wired Magazine | Wired.com
Phosphorous minerals stoke speculation of life beginning on Mars | Ars Technica
Humans Choose Friends With Similar DNA - Slashdot
BBC News - Testicle size 'link to father role'
Cells Reprogrammed in Living Mice | Science/AAAS | News
Une diversité biologique hors du commun trouvée au fin fond d’un lac d’antarctique | GuruMeditationGuruMeditation
Excerpts From The Mad Scientist’s Handbook: So You’re Ready to Vaporize a Human | But Not Simpler, Scientific American Blog Network
Absurd Creature of the Week: The Zombie Ant and the Fungus That Controls Its Mind - Wired Science
Metabolic rate and body size are linked with perception of temporal information
Ce micro-organisme a trouvé le secret de l'éternelle jeunesse
A Mad Scientist Designing Organs That Could Give You Superpowers | Wired Design | Wired.com
Ant navigation: The backtrackers | The Economist
These Are Some of the Most Otherworldly Creatures You'll Find on Earth - Wired Science
En modifiant un seul de vos gènes, votre espérance de vie peut augmenter de 20% | Daily Geek Show
KAIST Announced a Novel Technology to Produce Gasoline by a Metabolically-Engineered Microorganism : News : University Herald

Chemical

Computer Science

Elon Musk Unveils His Vision For 'The Future of Design' With Hand Manipulated Holographic Technology - HotHardware
Researchers Build a Working Carbon Nanotube Computer - NYTimes.com

Earth

Ancient climate-cooling meteor might have hit Quebec, geochemist says - The Globe and Mail
19-year-old inventor finds way to clean up the world’s oceans in under 5 years time - BlackListedNews.com
Industrial Revolution likely brought the Little Ice Age to an end | Ars Technica
55 paysages vertigineux de la Terre pris depuis l’espace | Daily Geek Show
Des trous noirs voyageraient dans les océans | Sciences et santé - lesoir.be
NASA releases images of Pakistan's 'Earthquake Island' — RT News
Signs of oxygen in 3-billion-year-old soil | Ars Technica

Future

Physic

Ask a grown-up: what is the universe expanding into? | Life and style | The Guardian
Did a hyper-black hole spawn the Universe? : Nature News & Comment
A 24 ans, il construit un réacteur nucléaire à fusion dans son appartement ! - WikiStrike.com
How Do You Get 1.21 GigaWatts For Your Time Machine? - Wired Science
Does the Human Population Alter Gravity? - Wired Science
▶ Étienne Klein Que savons-nous du temps ? - YouTube
▶ ✔ Etienne Klein, Comment naît la physique quantique 1/3 - YouTube
Des scientifiques créent une matière ressemblant au sabre laser !
Les 7 merveilles de la mécanique quantique | Science étonnante

Robotic

Bionic Man: Amputee Controls Artificial Leg With Thoughts « CBS Chicago

Space Exploration

La NASA veut des araignées robotiques capables d'imprimer des vaisseaux dans l'espace
▶ Voyager Captures Sounds of Interstellar Space - YouTube
Voyager 1 really has left the Solar System…probably | Ars Technica
NASA's Plutonium Problem Could End Deep-Space Exploration - Wired Science
Mystery of Missing Martian Methane Deepens - Slashdot
Why Wait for NASA? Let's Start Planning a Manned Mission to Europa Now - Wired Science
Mission terminée pour la sonde Deep Impact perdue dans l'espace
Le sol de Mars contient 2% d'eau - 20minutes.fr
Private Cygnus Spacecraft Makes Historic 1st Rendezvous with Space Station | Space.com
La NASA publie ses tests pour créer un nouveau vaisseau
A/B Test: Comparing the Magnificent Spaceships of Orbital Sciences and SpaceX - Wired Science
Alien Atmosphere: Plastic Ingredient Detected on Saturn's Moon Titan - Wired Science

ScienceDirect.com | Search through over 11 million science, health, medical journal full text articles and books.

Social

Common Sense

Engineering

Experiment

History

Manif

Network

Philosophy

Politic

Psychology

Warfare

Russia Has Equipped Syria With Their Most Advanced Anti-Ship Missiles - BlackListedNews.com
Tomgram: Nick Turse, AFRICOM's Gigantic "Small Footprint" | TomDispatch

Underground

Anonymousity

NSA surveillance: how to stay secure | Bruce Schneier | World news | theguardian.com
Comment devenir complètement invisible sur Facebook - JDN Web & Tech
Google enregistre vos mots de passe WiFi

Conspiracy Theory

▶ Eisenhower Farewell Address (Full) - YouTube
REDPILL COPYPASTA - Pastebin.com
▶ Google's MASTER PLAN! - YouTube
Army document describes technology that can transmit a voice into someone’s head - BlackListedNews.com

Cyberwar

Lockpicking

Spying

Stalking

Urban Exploration

Syrian Electronic Army : Les pirates piratés et humiliés #OpSyria | UnderNews
Un groupe de hackers professionnels découvert par Symantec | Reuters