Bookmarks
Bookmarks Bar
Octobre
Art and Design
Computer
Coding
ASM
ASP
BASH
Basic
C
C#
C++
HTML
Java
Javascript
Mircscript
Perl
PHP
Python
Ruby
TCL
Visual Basic
Cryptography
- Pwgen – Créez facilement vos mots de passe | La vache libre
- MyWhisper.net - Text Encryption Tool
Database
Hacking
Cracking
- What is Hydra the Password Cracking Tool and how does it work?
- bdpurcell/bully · GitHub
- Good tutorial for WinDbg? - Stack Overflow
- Free online WPA cracker with stats - besside-ng companion
- How to Crack a Wi-Fi Password
DoS
- Digital Attack Map
Exploit
- glibc and eglibc 2.5, 2.7, 2.13 - Buffer Overflow Vulnerability
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object RCE
- FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit
- Reverse Engineering a D-Link Backdoor - /dev/ttyS0
- Messagebox Shellcode (113 bytes) - Any Windows Version
- Insolite : attaquer un radar avec une injection SQL – Blogmotion
- D-Link DIR-605L Captcha Handling Buffer Overflow
- Apache / PHP 5.x Remote Code Execution Exploit
- WordPress Think Responsive Themes Arbitrary File Upload Vulnerability
- WordPress Switchblade Themes Arbitrary File Upload Vulnerability
Maping
Virus
- DIY: Android Malware Analysis - Taking apart OBAD (part 1)
Warez
- IT Books Free Share | Scoop.it
- ExtraTorrent.cc The World's Largest BitTorrent System
Web
- ▶ 50 Ways to Inject Your SQL - YouTube
Wifi
Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1719 Remote Memory Corruption Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1728 Security Vulnerability
- Cisco Wireless LAN Controller CVE-2013-5519 Cross Site Scripting Vulnerability
- Cisco Unified Computing System CVE-2012-4103 Local Command Injection Vulnerability
- Cisco Unified Computing System CVE-2012-4111 Local Command Injection Vulnerability
- Cisco Unified Computing System CVE-2012-4102 Local Arbitrary Command Execution Vulnerability
- Cisco Unified Computing System CVE-2012-4109 Local Command Injection Vulnerability
- Microsoft Windows CVE-2012-1864 Local Privilege Escalation Vulnerability
- Oracle Java SE CVE-2013-2449 Remote Security Vulnerability
- Oracle Java SE CVE-2013-2444 Remote Security Vulnerability
- PHP 'header()' HTTP Header Injection Vulnerability
- Oracle Sun Products Suite CVE-2012-3128 Local SPARC T-Series Servers Vulnerability
- Cisco Nexus 7000 Series Switches NX-OS CVE-2012-4090 Remote Information Disclosure Vulnerability
- Xinetd CVE-2013-4342 Remote Code Execution Vulnerability
- Microsoft Windows Kernel 'dxgkrnl.sys' CVE-2013-3888 Local Privilege Escalation Vulnerability
- Another Day, SpiderLabs Discovers Another IE Zero-Day - SpiderLabs Anterior
- Microsoft Internet Explorer CVE-2013-3872 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3873 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3874 Memory Corruption Vulnerability
- Xen CVE-2013-1442 Information Disclosure Vulnerability
- Cisco NX-OS CVE-2012-4121 Arbitrary File Access Vulnerability
- Cisco NX-OS 'file name' Parameter Arbitrary File Write Vulnerability
- Cisco Identity Services Engine CVE-2013-5524 Cross Site Scripting Vulnerability
- Cisco NX-OS CVE-2012-4077 Local Arbitrary Command Execution Vulnerability
- Cisco IOS CVE-2013-5499 Remote Denial of Service Vulnerability
- Microsoft Internet Explorer CVE-2013-3886 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3897 Memory Corruption Vulnerability
- Microsoft Internet Explorer CVE-2013-3882 Memory Corruption Vulnerability
- Cisco NX-OS CVE-2012-4076 Local Arbitrary Command Execution Vulnerability
- Cisco NX-OS CVE-2012-4122 Arbitrary File Creation or Overwrite Vulnerability
- Cisco NX-OS CVE-2012-4075 Local Arbitrary Command Execution Vulnerability
- Cisco Unified IP Phones 9900 Series CVE-2013-5526 Denial of Service Vulnerability
- Cisco Prime Central for HCS 'Credentials' Information Disclosure Vulnerability
- Cisco Unified Communications Manager CVE-2013-5528 Directory Traversal Vulnerability
- Xen CVE-2013-4355 Information Disclosure Vulnerability
- Xen CVE-2013-4361 Information Disclosure Vulnerability
- Linux Kernel CVE-2013-4387 Memory Corruption Vulnerability
- Apache 'mod_fcgid' Module CVE-2013-4365 Heap Buffer Overflow Vulnerability
- Cisco Unified Computing System CVE-2012-4106 Local Privilege Escalation Vulnerability
- Cisco Unified Computing System CVE-2012-4105 Local Denial of Service Vulnerability
- X.Org X Server 'dixfonts.c' Use-After-Free Remote Memory Corruption Vulnerability
- Oracle Sun Products Suite CVE-2013-3838 SPARC Enterprise T & M Series Servers Security Vulnerability
- Mozilla Firefox Cookie Verification Denial of Service Vulnerability
- Oracle Java SE CVE-2013-5772 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5830 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5803 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5810 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5842 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5797 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5800 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5832 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5848 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5783 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5789 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5780 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5844 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5774 Remote Security Vulnerability
- Cisco Unified Computing System CVE-2012-4113 Local Arbitrary File Access Vulnerability
- Oracle Java SE CVE-2013-5840 Remote Security Vulnerability
- Xen CVE-2013-4371 Use After Free Remote Denial of Service Vulnerability
- Oracle Java SE CVE-2013-5804 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5814 Remote Security Vulnerability
- Cisco Secure Access Control System CVE-2013-5536 Remote Denial of Service Vulnerability
- Cisco Identity Services Engine CVE-2013-5530 Remote Arbitrary Command Execution Vulnerability
- WordPress Landing Pages Plugin 'post' Parameter SQL Injection Vulnerability
- WordPress Portable phpMyAdmin Plugin Multiple Security Bypass Vulnerabilities
- Linux Kernel CVE-2013-4299 Information Disclosure Vulnerability
- Joomla! Maian15 Component 'name' Parameter Arbitrary Shell Upload Vulnerability
- Cisco Catalyst 3750 Series Switches Default Credentials Security Bypass Vulnerabilities
- Oracle Java SE CVE-2013-5824 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5819 Remote Security Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5599 Remote Memory Corruption Vulnerability
- Mozilla Firefox CVE-2013-5592 Remote Memory Corruption Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5596 Remote Code Execution Vulnerability
- Mozilla Firefox CVE-2013-5591 Remote Memory Corruption Vulnerability
- Mozilla Firefox 'PDF.js' Javascript Security Bypass Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5602 Remote Memory Corruption Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5600 Remote Memory Corruption Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5601 Remote Memory Corruption Vulnerability
- Oracle Java SE CVE-2013-1474 JavaFX Remote Security Vulnerability
- Want To Hijack a Domain? Just Get a Fax Machine - Slashdot
- Un expert en sécurité crée des malwares indétectables sur Mac OS X
- Local Linux Enumeration & Privilege Escalation - Rebootuser
- Computer Security Student Home Page|->Security Lesson, Tools, Exploits, Topics, Forensics, Clothing
- Hackers Can Hijack Facebook Accounts by Exploiting Flaw in Android Apps – Video
Networking
- Network Investigator: Network Protocols
Operating System
Android
- ROM Installer - Android Apps on Google Play
- CyanogenMod | Android Community Rom based on Jelly Bean
Autres
Black Berry
Bootloader
BSD
Linux
- How to install/remove different Desktop/Window Manager in Kali Linux 1.x
Mac
Windows
IOS
- Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone - Forbes
- SIGOPSCreate Your Own Operating System Adventure
Security
Software
- Gimp – Installer et utiliser les plugins Ofnuts | La vache libre
- Un script pour faciliter la création de cartes SD pour Raspberry Pi
- Skype Call Recorder – Un utilitaire simple et efficace pour enregistrer vos conversations Skype | La vache libre
- WhiteHat Aviator - The most secure browser online
- The Gimp – Installer les plugins Akkana | La vache libre
- QuickTweet: pour basculer entre les comptes Twitter sur google chrome
- Security and So Many Things
- BinaryTides - Linux how to guides, php web development, mysql, python, network security, socket programming and more
- Halloween theme, midi files and binary file editing - YouTube
Economy
Entrepreneurship
E-commerce
Financement
Management
Marketing
SEO
- Recherche et analyse de mots clés... Like a boss ! | Htitipi
- PageRank et corpus sémantiques
- Les principaux critères de référencement de Google !
- How to get your first 10 customers « Dan Shipper – Distilled Thinking
Outsourcing
- Notre espace | Niviti
Job
- The seven skills you need to land your dream job - The Globe and Mail
- Emploi sécurité informatique et mission sécurité - YesWeHack
Stock Market
- 7 Mind-Blowing Facts About Money | InvestmentWatch
Entertainement
Anime
Audio Book
Brain Fart
Cinema
Comic Strip
E-book
Gaming
Old School
Geeked
8bits Retro Experiment
Music
- Floppy Music by Minihui - Super Mario Bros - YouTube
Netcast
News
Pub
Sport
Travel
XXX
- 40 Creative Food Hacks That Will Change The Way You Cook
Hardware
Batery
- La super-batterie au graphène, chargée en un éclair, autonome pendant des semaines
DIY
- More Drive Bays, Cooling, and Power for a DIY Raid Box
- Hack a Day — Fresh hacks every day
- Make Your Own Cell Phone Jammer - wikiHow
Drone
Hardline
Military
- The Navy’s newest warship is powered by Linux | Ars Technica
- Killer Robots With Automatic Rifles Could Be on the Battlefield in 5 Years | Danger Room | Wired.com
- 20-ton attack drone under development in Russia - NBC News.com
- Taiwanese soldiers wearing ballistic masks look like ‘the cavalry from hell’ | StratRisks
- U.S. to deploy ‘stealth destroyers’ in the Pacific next year | StratRisks
- Bigger, Lighter, Deadlier! Navy launches new stealth destroyer – CNN Security Clearance - CNN.com Blogs
Personal Computer
- Technical Machine
Radio
Smartphone
TV
Car
- New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
- Vous pouvez maintenant utiliser du feu pour recharger votre smartphone | Daily Geek Show
- Aluminum Foil Does Not Stop RFID
- An Emergency Shelter That's Open Source and Locks Together Like Legos | Wired Design | Wired.com
Howto TOW
Fondation
IIA
Leetsaber
MSI
Psychohistoire
- 21 Times "The Simpsons" Bizarrely Predicted The Future
- The end of the New World Order | Seumas Milne | Comment is free | The Guardian
- La Terre en 2100: invivable? | Sciences et santé - lesoir.be
SATO
TGL
The Borg Project
Ze Bookmark
Knowledge Ressources
- NSA Codewords | cypherpunks
- Open Exoplanet Catalogue
Misc
- NSA Haiku Generator
Science
Astronomy
- La première carte de la couverture nuageuse d’une planète géante au-delà de notre système solaire | GuruMeditationGuruMeditation
- Découverte d’une étrange planète flottant seule dans l’espace | Sciences et santé - lesoir.be
- Un astéroïde riche en eau hors de notre système solaire - Sciences et Avenir
- Un astéroïde géant va-t-il anéantir la Terre le 16 mars 2880? - RTL info
- L’astéroïde 2013 TV135 a "frôlé" la Terre et reviendra en 2024 et 2032
- Les techniques envisagées pour détruire les astéroïdes qui nous menacent | Atlantico
- Galaxie z8 GND 5296 : Hubble fait une découverte majeure
- 20 minutes - L exoplanète Kepler-78b, une Terre d enfer - Science
Biology
- Cyborg Cockroach Sparks Ethics Debate | Science/AAAS | News
- Les bactéries résistent aux antibiotiques en communiquant entre elles
- Skull sparks human evolution controversy - CNN.com
- Chemists find biological complexes that beat chance | Ars Technica
Chemical
Computer Science
- The Human Brain Project - Human Brain Project
Earth
Future
- Predicting Protests and Cyber Attacks With Web Intelligence
Physic
- BBC News - Nuclear fusion milestone passed at US lab
- Two-laser boron fusion lights the way to radiation-free energy : Nature News & Comment
- A grand unified theory of exotic superconductivity?
- ▶ Albert Einstein's Theory of Relativity - YouTube
- ▶ Quantum Mechanics: Animation explaining quantum physics. - YouTube
- The Moon And NASA Now Communicate Via Lasers | Popular Science
- New Technology For Converting a Metal To a Semiconductor With a Laser - Slashdot
Robotic
- MIT Researchers Unveil Self-Assembling Robot Swarm - Slashdot
- Introducing WildCat - YouTube
- Insect-Inspired Flying Robot Handles Collisions And Keeps Going - Slashdot
Space Exploration
- Astéroïdes : la NASA s'intéresse aux mini lunes
- Watch: SpaceX Grasshopper Rocket Launch Reaches Record Height | Autopia | Wired.com
- Actualité > Mission habitée vers Mars : la Russie affiche ses ambitions
- Les méduses nées dans l’espace ne supportent pas la gravité terrestre et il en sera de même pour l’homme | GuruMeditationGuruMeditation
- Entre l'Inde et la planète Mars, le "système D"
Social
Common Sense
Engineering
Experiment
History
- History Of The Decline And Fall Of The Roman Empire, by Edward Gibbon--Complete Contents of Two Project Gutenberg Editions
Manif
Network
Philosophy
Politic
- Elites’ strange plot to take over the world - Salon.com
Psychology
Warfare
- France Prepares for War in the Central African Republic — Phantom Report
- AFRICOM builds up military bases in Italy for small-scale “secret wars” in Africa — Phantom Report
- L'OTAN lance un centre de réaction contre les cyberattaques
Underground
Anonymousity
- Se protéger sur les réseaux sociaux : Le grand guide Bitdefender | UnderNews
- It was DPR, in the Tor HS, with the BTC - Hacker OPSEC
- chycho: How to Protect Ourselves on Social Networks and from Data Collection Systems of Governments and Corporations
- La commissaire à la vie privée enquêtera sur la nouvelle politique de Bell | Radio-Canada.ca
- Ubuntu's Mark Shuttleworth wins Austria's Big Brother Award | Muktware
- Facebook peut deviner avec qui vous partagez votre vie
- Odin - Secure Networking
Conspiracy Theory
- Radiation experts confirm polonium on Arafat clothing - FRANCE 24
- The Capitalist Conspiracy (1969) by G. Edward Griffin - Full Official Movie - Great Quality Film :) - YouTube
Cyberwar
Lockpicking
Spying
- Lockheed Martin Surveillance Project Informational CD DVD | eBay
Stalking
- milo2012/osintstalker · GitHub
Urban Exploration
- The Daily Dot - Pro-Palestinian hackers attack 2 security corporations with a fax machine
- Syrian Electronic Army Confirms they took over Barack Obama's Campaign Website, email, twitter and Facebook Account ~ Techworm