Bookmarks

Bookmarks Bar

Fevrier

Art and Design

18 banques d’images gratuites, libres & sans inscription | Smop It

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

HTML

21 erreurs HTML et CSS à éviter |Miss SEO Girl

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Cryptography

Database

Hacking

Cracking

Against Mass Scanner / SSH Brute Forcer 0.2 ≈ Packet Storm

DoS

Exploit

Joomla JomSocial Component 2.6 - Code Execution Exploit
VLC 2.1.2 (.asf) - Crash PoC
Android Browser and WebView addJavascriptInterface Code Execution
PHP Webcam Video Conference - Multiple Vulnerabilities
Joomla 3.2.1 - SQL Injection Vulnerability
D-Link DSL-2750B ADSL Router - CSRF Vulnerability
Wordpress Frontend Upload Plugin - Arbitrary File Upload
Windows TrackPopupMenuEx Win32k NULL Page
NetGear DGN2200 N300 Wireless Router - Multiple Vulnerabilities
Linksys E-series Unauthenticated Remote Code Execution Exploit
Dlink DIR-615 Hardware vE4 Firmware v5.10 - CSRF Vulnerability
Wordpress BP Group Documents Plugin 1.2.1 - Multiple Vulnerabilities
Wordpress AdRotate Plugin 3.9.4 (clicktracker.php, track param) - SQL Injection
Mini HTTPD 1.21 - Stack Buffer Overflow POST Exploit
Notepad++ CCompletion Plugin 1.19 - Stack Buffer Overflow
VLC 2.1.3 - (.avs file) Crash PoC

Maping

Virus

Warez

Web

Why I removed my sensitive files from Google - VaGoSec

Wifi

Scientists demonstrate first contagious airborne WiFi virus | ScienceBlog.com

Vulnerability

Oracle Java SE CVE-2014-0417 Remote Security Vulnerability
Oracle Java SE CVE-2013-5888 Local Security Vulnerability
Oracle MySQL Server CVE-2014-0431 Remote Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1478 Multiple Memory Corruption Vulnerabilities
Pidgin 'asn_getUtf8()' Function Buffer Overflow Vulnerability
Pidgin 'gg_http_watch_fd()' Function Buffer Overflow Vulnerability
IBM Java CVE-2013-5457 Unspecified Arbitrary Code Execution Vulnerability
Linux Kernel KVM 'apic_get_tmcct()' Function Denial of Service Vulnerability
Adobe Flash Player CVE-2014-0497 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-0423 Remote Security Vulnerability
Oracle MySQL Server CVE-2014-0402 Remote Security Vulnerability
Linux Kernel CVE-2013-6368 Local Privilege Escalation Vulnerability
OpenStack Glance Information Disclosure Vulnerability
Microsoft Internet Explorer CVE-2014-0281 Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey CVE-2014-1483 Multiple Information Disclosure Vulnerabilities
Microsoft Internet Explorer CVE-2014-0289 Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey/Thunderbird CVE-2014-1487 Information Disclosure Vulnerability
Oracle MySQL Client 'main()' Function Buffer Overflow Vulnerability
Pidgin 'libpurple' Multiple Denial of Service Vulnerabilities
Pidgin 'sipmsg_parse_header()' Function Buffer Overflow Vulnerability
Linux Kernel CVE-2013-7263 Multiple Information Disclosure Vulnerabilities
Linux Kernel 'pn_recvmsg()' Function Local Information Disclosure Vulnerability
D-Link DAP-2253 Router Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
Mozilla Firefox/SeaMonkey/Thunderbird Use-After-Free Remote Code Execution Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1481 Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1482 Remote Code Execution Vulnerability
Oracle MySQL Server CVE-2014-0386 Remote Security Vulnerability
Oracle MySQL Server CVE-2014-0401 Remote Security Vulnerability
Linux Kernel KVM 'recalculate_apic_map()' Function Denial of Service Vulnerability
Linux Kernel CVE-2013-4470 Multiple Local Memory Corruption Vulnerabilities
Microsoft .NET Framework CVE-2014-0253 Remote Denial of Service Vulnerability
Microsoft .NET Framework CVE-2014-0295 ASLR Security Bypass Vulnerability
Microsoft .NET Framework CVE-2014-0257 Remote Privilege Escalation Vulnerability
Microsoft Internet Explorer CVE-2014-0322 Use-After-Free Remote Code Execution Vulnerability
Linux Kernel 'ipc_rcu_putref()' Function Local Denial of Service Vulnerability
Oracle Java SE CVE-2013-5887 Remote Security Vulnerability
Oracle Java SE CVE-2013-5889 Remote Security Vulnerability
Microsoft Internet Explorer CVE-2014-0285 Memory Corruption Vulnerability
Linux Kernel '/fs/cifs/file.c' Local Memory Corruption Vulnerability
Alert: Android WebView addJavascriptInterface Code execution Vulnerability | trustlook news
Oracle Java SE CVE-2014-0410 Remote Security Vulnerability
New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
Background Monitoring on Non-Jailbroken iOS 7 Devices — and a Mitigation | FireEye Blog
Google Chrome CVE-2013-6643 Unspecified Security Vulnerability
Oracle Java SE CVE-2013-5896 Remote Security Vulnerability
Linux Kernel CVE-2014-2039 Local Denial of Service Vulnerability
Xen 'xc_cpupool_getinfo()' Function Use After Free Memory Corruption Vulnerability

This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate - Forbes
Ethical Hacking Tutorials, Tips and Tricks. Free Tutorials, How to's
Hackvids – a list of documentaries about hackers
Hacked X-Rays Could Slip Guns Past Airport Security | Threat Level | Wired.com
Hack.me · The house of rising sandbox
IT Security and Hacking knowledge base - SecDocs

Networking

Operating System

Android

Autres

Black Berry

Bootloader

BSD

Linux

ArchAssault
Optimiser son SSD sous Linux - P3ter.fr
Firewall Builder – Une interface graphique pour configurer vos règles iptables, OpenBSD PF, ipfilter, ipfw, Cisco PIX – La vache libre

Mac

Windows

Security

da667/unlimited · GitHub

Software

How to access Twitter from the command line on Linux - Linux FAQ

6-shadowy-companies-edit.jpg (720×7670)

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

Outil SEO indispensable #2 : Ubersuggest pour trouver des idées de contenu - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
6 façons de renforcer son SEO sans passer par la création de contenu | Blog de Markentive, agence de référencement (SEO) à Paris
Les outils SEO gratuits pour suivre le positionnement de votre site - JDN Web & Tech

Outsourcing

Job

Stock Market

Entertainement

Anime

Audio Book

Neuromancer - William Gibson - Audiobook Full - YouTube

Brain Fart

Cinema

Comic Strip

E-book

26 Useful eBooks Collection Free (Included Linux) and HTML5 Video Tutorial - Ubuntu/Linux News, Reviews, Tutorials, Apps

Gaming

Old School

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

New Polymer Could End Battery Fires, Quadruple Efficiency | Autopia | Wired.com
Aquacelle : une pile qui se charge en 5 minutes avec de l'eau

DIY

Technical Machine

Drone

Hardline

Military

Will Hypersonic Capabilities Render Missile Defense Obsolete? | The Diplomat
New US Military Space Plane Aims for 2017 Liftoff | Space.com
J-20 may have better ground attack capability than F-22|Politics|News|WantChinaTimes.com
Naval Open Source INTelligence: Navy develops 'world's smallest guided missile'
At Last, a Google Glass for the Battlefield | Danger Room | Wired.com
Naval Open Source INTelligence: Israel successfully tests anti-missile system for commercial planes
The Aviationist » First images of the new Iraqi Mi-28 Night Hunter attack helicopters
Army's Robotic Arsenal Adds $11M Driverless Trucks: Video - Bloomberg

Personal Computer

Radio

Smartphone

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

Actualité > IBM réalise la première puce radio à base de graphène
Graphene Conducts Electricity Ten Times Better Than Expected - Slashdot
Cent kilos aussi légers qu'une plume avec cet exosquelette

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Meet the Kraken: Hydrocarbon seas spotted at Titan’s north pole | Ars Technica
La plus vieille étoile connue est âgée de 13,6 milliards d'années - France Info
6-billion-year-old quasar spinning nearly as fast as physically possible | Ars Technica
Actualité Météo : Un astéroïde à la trajectoire indéterminée près de la Terre mardi - La Chaîne Météo

Biology

New Bionic Hand Gives Amputee a Grip — And a Sense of Touch - Wired Science
World's first genetically modified babies born | The Change Within
Self-Assembling Molecules Like These May Have Sparked Life on Earth - Wired Science
Gene therapy: Ingenious | The Economist
Geriatric muscle stem cells switch reversible quiescence into senescence : Nature : Nature Publishing Group
GMO Human Embryos Have Already Been Created | The Alliance for Natural Health USA
Scientists revive largest virus yet from 30,000-year-old permafrost | Ars Technica
A Powerful New Way to Edit DNA - NYTimes.com
Des scientifiques ont découvert que l’être humain pourrait vivre jusqu’à 500 ans | Daily Geek Show

Chemical

Computer Science

Earth

Future

Physic

Quarks Know Their Left From Their Right | Science/AAAS | News
We're One Step Closer to Nuclear Fusion Energy - Wired Science
Mysterious Quantum 'Dropletons' Form Inside Semiconductors Shot With Lasers - Wired Science

Robotic

Un drone qui mange et digère l'herbe - Sciences et Avenir

Space Exploration

NASA is now accepting applications from companies that want to mine the moon | The Verge

Social

Common Sense

Engineering

Experiment

History

Des empreintes d'hommes datant de plus de 800 000 ans découvertes en Angleterre
4.4 bn year old zircon reveals life on Earth appeared earlier than believed — RT News

Manif

Network

Philosophy

Politic

Psychology

The Human Brain Now Reacts to Emoticons Like Real Faces | Underwire | Wired.com

Warfare

Five Futuristic Weapons That Could Change Warfare | StratRisks
How to Annex Another Nation's Territory - Popular Mechanics

Underground

Anonymousity

NSA uses Google cookies to find targets for hacking, spying
Ghetto Forensics: Is Google Scanning Malware Emails Attachments Between Researchers
Mapping Hacking Team’s “Untraceable” Spyware
Blackphone Designed to Make Crypto Sexy, Simple
Facebook sait tout de vous et garde en mémoire votre historique de recherche: voici comment l’effacer - sudinfo.be

Conspiracy Theory

Climate State Part 1 - MarthaMitchellEffect

Cyberwar

Lockpicking

Spying

New drone technology “equivalent to the capabilities of 100 Predator drones”
Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The InterceptThe Intercept
How a Hacker Intercepted FBI and Secret Service Calls With Google Maps
The Globe goes inside Canada’s top-secret spy agency - The Globe and Mail
Schneier on Security: COTTONMOUTH-II: NSA Exploit of the Day

Stalking

Urban Exploration

Al Qaeda Fractures: Visualized via @intelwire