Bookmarks

Bookmarks Bar

Decembre

Art and Design

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

HTML

Robots.txt : un outil puissant et méconnu des SEO

Java

Javascript

Mircscript

Perl

PHP

Créer des CSS dynamiques avec PHP sans LessCSS ou SCSS… - Blog Internet-Formation - Poitiers (86)

Python

Ruby

TCL

Visual Basic

Cryptography

Database

Hacking

Cracking

[PHP] Twitter Brute Force - Pastebin.com
[Bash] check if twitter username is available - Pastebin.com
wortlisten
cb0cat - Silobreaker
Reverse engineering my bank's security token | Thiago Valverde

DoS

DoS attacks that took down big game sites abused Web’s time-sync protocol | Ars Technica

Exploit

Remote Code Execution exploit in WordPress 3.5.1 - VaGoSec
Intelligent Exploit Aggregation Network - IEAN
MS13-101 Windows Kernel win32k.sys - Integer Overflow [Anonymoused] - BugSearch.net
Microsoft Windows ndproxy.sys Local Privilege Escalation
MS13-101 Windows Kernel win32k.sys - Integer Overflow
Snapchat Crypto Flaws ≈ Packet Storm
D-Link DSL-2750U ME_1.09 - CSRF Vulnerability

Maping

Hack Like a Pro: How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection « Null Byte
Haktip 85 - Netcat 101: Port Scanning in Netcat

Virus

Warez

Web

How to use HTML5 geolocation | Webdesigner Depot
Man-in-the-Browser Session Stealing | Strategic Cyber LLC
https://hashfind.net/archive/EhGqczq6.txt
Adsense Clickjacking
JavaScript for hackers - Dev.Opera

Wifi

[GUIDE] Use aircrack-ng on android phone using Wireless USB Adapter - xda-developers

Vulnerability

GIMP XWD File Handling CVE-2013-1913 Heap-Based Buffer Overflow Vulnerability
GIMP XWD File Handling Heap Buffer Overflow Vulnerability
Oracle Java SE CVE-2013-5852 Remote Security Vulnerability
Oracle Java SE CVE-2013-5825 Remote Security Vulnerability
Oracle Java SE CVE-2013-5809 Remote Security Vulnerability
PHP OpenSSL Extension 'openssl_x509_parse()' Remote Memory Corruption Vulnerability
PHP CVE-2013-6712 Remote Denial of Service Vulnerability
D-Link DAP-1522 Wireless Router Hardcoded Credentials Security Bypass Vulnerability
Linux Kernel CVE-2013-2929 Local Privilege Escalation Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-6673 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5618 Use After Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5613 Multiple Memory Corruption Vulnerabilities
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5609 Multiple Memory Corruption Vulnerabilities
Linux Kernel Netfilter 'ipt_CLUSTERIP.c' Buffer Overflow Vulnerability
Apache Subversion 'mod_dav_svn' Module Denial of Service Vulnerability
Apache Subversion CVE-2013-4505 Security Bypass Vulnerability
Linux Kernel '/bcm/Bcmchar.c' CVE-2013-4515 Local Information Disclosure Vulnerability
Linux Kernel '/drivers/scsi/aacraid/commctrl.c' Pointer Dereference Denial of Service Vulnerability
Wireshark TCP Dissector CVE-2013-6340 Denial of Service Vulnerability
Wireshark IEEE 802.15.4 Dissector CVE-2013-6336 Denial of Service Vulnerability
Wireshark NBAP Dissector CVE-2013-6337 Denial of Service Vulnerability
cURL/libcURL SSL Certificate Host Name Validation Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/Seamonkey CVE-2012-3993 Arbitrary Code Execution Vulnerability
Mozilla Firefox CVE-2013-5611 Security Bypass Vulnerability
Oracle Java SE CVE-2013-5802 Remote Security Vulnerability
Microsoft Internet Explorer Enhanced Protected Mode CVE-2013-5045 Security Bypass Vulnerability
OpenSSL 'ssl_get_algorithm2()' Function Remote Denial of Service Vulnerability
Mozilla Firefox and Seamonkey CVE-2013-5614 Security Bypass Vulnerability
Samba 'dcerpc_read_ncacn_packet_done()' Function Heap Buffer Overflow Vulnerability
Microsoft Windows 'Win32k.sys' CVE-2013-3903 Denial Of Serivce Vulnerability
Mozilla Firefox/SeaMonkey CVE-2013-5612 Cross Site Scripting Vulnerability
Linux Kernel CVE-2013-3226 Local Information Disclosure Vulnerability
Oracle Java SE CVE-2013-5838 Remote Security Vulnerability
Oracle Java SE CVE-2013-5850 Remote Security Vulnerability
Oracle Java SE CVE-2013-5831 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5616 Use After Free Memory Corruption Vulnerability
Oracle Java SE CVE-2013-5809 Remote Security Vulnerability
Linux Kernel AACRAID Driver Compat IOCTL Local Security Bypass Vulnerability
Linux Kernel 'drivers/staging/wlags49_h2/wl_priv.c' Local Buffer Overflow Vulnerability
Linux Kernel CVE-2013-6763 Integer Overflow Vulnerability
Linux Kernel 'oz_cdev_write()' Function Local Buffer Overflow Vulnerability
Linux Kernel 'ieee80211_radiotap_iterator_init()' Function Denial of Service Vulnerability
IBM Java CVE-2013-5375 Unspecified Security Bypass Vulnerability

EvilFingers - Projects
Hackatime
How to be a hacker | Technology | theguardian.com
On Hacking MicroSD Cards « bunnie's blog
A chain is only as strong as its weakest link – DNS Hijack Monitoring | Corelan Team
Research Archives | HeX-OR Forensics
Hack Like a Pro: How to Hack Remote Desktop Protocol (RDP) to Snatch the Sysadmin Password « Null Byte
Marco Ramilli's Blog: Hacking through image: GIF turn

Networking

Operating System

Android

dark-rose/droidlog2timeline · GitHub
Cyanogenmod dépollué de Google grâce à Freecyngn « Korben Korben

Autres

Announcing Ubuntu and Android dual boot developer preview | Ubuntu Developer

Black Berry

Bootloader

BSD

Linux

SmoothSec | Intrusion detection made simple.

Mac

A power user’s guide to OS X Server, Mavericks edition | Ars Technica

Windows

Security

[Bash] random password generator - Pastebin.com
MyCryptoChat, version 0.1 et code source en ligne - HowTommy
ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects » Lynis The Unix/Linux Hardening tool updated to v1.3.8
Svenito/usblock · GitHub

Software

MultCloud, gérer ses services de stockage en ligne (Dropbox, Google Drive, Skydrive…) | Autour du Web
My WeeChat configuration | pascalpoitraspascalpoitras
Self-Destructing Cookies :: Add-ons for Firefox
shelr.tv/about
Advanced Youtube API

Economy

Entrepreneurship

E-commerce

Financement

Tipeee - Comment ça marche ?

Management

Marketing

SEO

Les 20 critères de l’audit SEO
7 conseils de pro pour adapter votre stratégie SEO à Google | Webmarketing & co'm

BcX6raKIYAAbl5Z.jpg:large (640×561)

Outsourcing

Job

Stock Market

Bitcoins

Why Bitcoin (And Other Cryptocurrencies) Will Inevitably Become Tools Of The Rich, Powerful, and Criminal - Business Insider

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

DIY

DIY : Starter de voiture RFID | Semageek

Drone

Drone Nation, The Infographic

Hardline

Military

Army Laser Passes Drone-Killing Test
Bullseye from 1,000 yards: Shooting the $17,000 Linux-powered rifle | Ars Technica
Premier vol d'un avion de combat Tornado équipé de pièces imprimées en 3D
Navy's 757-Sized Drone Will Provide Big-Time Surveillance | Danger Room | Wired.com

Personal Computer

Government Lab Reveals It Has Operated Quantum Internet For Over Two Years | MIT Technology Review

Radio

Smartphone

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

Gift Ideas for Survivalists - YouTube

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

David Rothschild: prédire l'avenir avec les données

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Actualité > Naines brunes vs étoiles : la distinction se précise
Europe et des jets : la découverte du téléscope Hubble sur la lune de Jupiter
La Voie lactée a bien quatre bras - Sciences et Avenir
Deux étoiles découvertes aux "portes" de la Terre - L'Express
Le télescope spatial Hubble découvre des nuages sur une exoplanète
Le champ magnétique du Soleil s'est totalement inversé
Stellar Trio Could Put Einstein's Theory of Gravity to the Test | Science/AAAS | News
New Views of Supernova 1987A Reveal Giant Dust Factory - Slashdot
Watch: Sun Unleashes First Big Flare of 2014, May Create Colorful Aurora Light Show – News Watch

Biology

BBC News - Dinosaur asteroid 'sent life to Mars'
Des scientifiques inventent un robot bionique à base de sperme de taureau | Daily Geek Show
2013/12/16 > BE Espagne 132 > Des molécules de synthèse capables de bloquer la réplication du virus du SIDA
Tomtato : Une plante hybride produit à la fois des tomates et des pommes de terre | CitizenPost
▶ Bionics, Transhumanism, and the end of Evolution (Full Documentary) - YouTube
Growing human organs inside pigs in Japan | KurzweilAI
Oublier ses mauvais souvenirs? Des scientifiques y sont arrivés grâce à des électrochocs

Chemical

Computer Science

Earth

Solar variability has a small effect on climate change | Ars Technica

Future

BdhMs9-IgAAnuBr.png:large (616×2046)

Physic

Scientists demonstrate quantum phenomenon for the first time using a plastic film
"Perfect" Electron Roundness Bruises Supersymmetry - Slashdot
Actualité > Trou noir (1/2) : le monde est-il un hologramme ?
Actualité > Trou noir (2/2) : le monde est-il un hologramme ?
Inside Piston-Powered Nuclear Fusion Company General Fusion - Slashdot
Faire léviter des objets avec des ondes sonores ! | Ufunk.net

Robotic

La NASA présente Valkyrie, un robot proche d'Iron Man
Scientists develop 'robotic muscle' -- thousand times stronger than human!

Space Exploration

Curiosity découvre un lac d'eau douce sur Mars, preuve de vie - BFMTV.com
Curiosity finds evidence of ancient freshwater lake on Mars | Ars Technica
Nos futurs colons de l’espace pourraient finalement résister aux radiations martiennes | GuruMeditationGuruMeditation
China safely lands rover on the moon | Al Jazeera America
La Chine et la Lune : vidéo de l’alunissage de Chang'e-3, la sonde chinoise
NASA testing lighter space suits for asteroid work

Social

Common Sense

Engineering

▶ Defcon 21 - Social Engineering: The Gentleman Thief - YouTube

Experiment

History

The History Of The Decline And Fall Of The Roman Empire by Edward Gibbon - Free Ebook
Ancient times table hidden in Chinese bamboo strips : Nature News & Comment

Manif

Network

Philosophy

Politic

Psychology

The Cheerleader Effect: New Research on What Men Do to Impress - WSJ.com
▶ How to Build a Mind - Artificial Intelligence Reloaded [30c3] - YouTube
Le Flow, La carte corporelle des émotions Nos ressentons...

Warfare

Russia and China conduct their First Joint Military Operations
File:Military expenditure by country map.png - Wikipedia, the free encyclopedia

Underground

Anonymousity

How Twitter tracks the websites you visit, and how to stop it | Naked Security
Meet Jack. Or, What The Government Could Do With All That Location Data | American Civil Liberties Union
Un mouchard dans votre poche… la preuve | Data Security Breach
Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic | Ars Technica
twister | P2P microblogging platform

Conspiracy Theory

The Rothschild Family – The World’s Only Trillionaires
Former Canadian minister Paul Hellyer claims 'Aliens already walk among us' | Mail Online

Cyberwar

Lockpicking

Spying

Stalking

Urban Exploration