Bookmarks
Bookmarks Bar
Fevrier
Art and Design
- 18 banques d’images gratuites, libres & sans inscription | Smop It
Computer
Coding
ASM
ASP
BASH
Basic
C
C#
C++
HTML
- 21 erreurs HTML et CSS à éviter |Miss SEO Girl
Java
Javascript
Mircscript
Perl
PHP
Python
Ruby
TCL
Visual Basic
Cryptography
Database
Hacking
Cracking
- Against Mass Scanner / SSH Brute Forcer 0.2 ≈ Packet Storm
DoS
Exploit
- Joomla JomSocial Component 2.6 - Code Execution Exploit
- VLC 2.1.2 (.asf) - Crash PoC
- Android Browser and WebView addJavascriptInterface Code Execution
- PHP Webcam Video Conference - Multiple Vulnerabilities
- Joomla 3.2.1 - SQL Injection Vulnerability
- D-Link DSL-2750B ADSL Router - CSRF Vulnerability
- Wordpress Frontend Upload Plugin - Arbitrary File Upload
- Windows TrackPopupMenuEx Win32k NULL Page
- NetGear DGN2200 N300 Wireless Router - Multiple Vulnerabilities
- Linksys E-series Unauthenticated Remote Code Execution Exploit
- Dlink DIR-615 Hardware vE4 Firmware v5.10 - CSRF Vulnerability
- Wordpress BP Group Documents Plugin 1.2.1 - Multiple Vulnerabilities
- Wordpress AdRotate Plugin 3.9.4 (clicktracker.php, track param) - SQL Injection
- Mini HTTPD 1.21 - Stack Buffer Overflow POST Exploit
- Notepad++ CCompletion Plugin 1.19 - Stack Buffer Overflow
- VLC 2.1.3 - (.avs file) Crash PoC
Maping
Virus
Warez
Web
- Why I removed my sensitive files from Google - VaGoSec
Wifi
- Scientists demonstrate first contagious airborne WiFi virus | ScienceBlog.com
Vulnerability
- Oracle Java SE CVE-2014-0417 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5888 Local Security Vulnerability
- Oracle MySQL Server CVE-2014-0431 Remote Security Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1478 Multiple Memory Corruption Vulnerabilities
- Pidgin 'asn_getUtf8()' Function Buffer Overflow Vulnerability
- Pidgin 'gg_http_watch_fd()' Function Buffer Overflow Vulnerability
- IBM Java CVE-2013-5457 Unspecified Arbitrary Code Execution Vulnerability
- Linux Kernel KVM 'apic_get_tmcct()' Function Denial of Service Vulnerability
- Adobe Flash Player CVE-2014-0497 Remote Code Execution Vulnerability
- Oracle Java SE CVE-2014-0423 Remote Security Vulnerability
- Oracle MySQL Server CVE-2014-0402 Remote Security Vulnerability
- Linux Kernel CVE-2013-6368 Local Privilege Escalation Vulnerability
- OpenStack Glance Information Disclosure Vulnerability
- Microsoft Internet Explorer CVE-2014-0281 Memory Corruption Vulnerability
- Mozilla Firefox/SeaMonkey CVE-2014-1483 Multiple Information Disclosure Vulnerabilities
- Microsoft Internet Explorer CVE-2014-0289 Memory Corruption Vulnerability
- Mozilla Firefox/SeaMonkey/Thunderbird CVE-2014-1487 Information Disclosure Vulnerability
- Oracle MySQL Client 'main()' Function Buffer Overflow Vulnerability
- Pidgin 'libpurple' Multiple Denial of Service Vulnerabilities
- Pidgin 'sipmsg_parse_header()' Function Buffer Overflow Vulnerability
- Linux Kernel CVE-2013-7263 Multiple Information Disclosure Vulnerabilities
- Linux Kernel 'pn_recvmsg()' Function Local Information Disclosure Vulnerability
- D-Link DAP-2253 Router Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
- Mozilla Firefox/SeaMonkey/Thunderbird Use-After-Free Remote Code Execution Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1481 Security Bypass Vulnerability
- Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1482 Remote Code Execution Vulnerability
- Oracle MySQL Server CVE-2014-0386 Remote Security Vulnerability
- Oracle MySQL Server CVE-2014-0401 Remote Security Vulnerability
- Linux Kernel KVM 'recalculate_apic_map()' Function Denial of Service Vulnerability
- Linux Kernel CVE-2013-4470 Multiple Local Memory Corruption Vulnerabilities
- Microsoft .NET Framework CVE-2014-0253 Remote Denial of Service Vulnerability
- Microsoft .NET Framework CVE-2014-0295 ASLR Security Bypass Vulnerability
- Microsoft .NET Framework CVE-2014-0257 Remote Privilege Escalation Vulnerability
- Microsoft Internet Explorer CVE-2014-0322 Use-After-Free Remote Code Execution Vulnerability
- Linux Kernel 'ipc_rcu_putref()' Function Local Denial of Service Vulnerability
- Oracle Java SE CVE-2013-5887 Remote Security Vulnerability
- Oracle Java SE CVE-2013-5889 Remote Security Vulnerability
- Microsoft Internet Explorer CVE-2014-0285 Memory Corruption Vulnerability
- Linux Kernel '/fs/cifs/file.c' Local Memory Corruption Vulnerability
- Alert: Android WebView addJavascriptInterface Code execution Vulnerability | trustlook news
- Oracle Java SE CVE-2014-0410 Remote Security Vulnerability
- New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
- Background Monitoring on Non-Jailbroken iOS 7 Devices — and a Mitigation | FireEye Blog
- Google Chrome CVE-2013-6643 Unspecified Security Vulnerability
- Oracle Java SE CVE-2013-5896 Remote Security Vulnerability
- Linux Kernel CVE-2014-2039 Local Denial of Service Vulnerability
- Xen 'xc_cpupool_getinfo()' Function Use After Free Memory Corruption Vulnerability
- This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate - Forbes
- Ethical Hacking Tutorials, Tips and Tricks. Free Tutorials, How to's
- Hackvids – a list of documentaries about hackers
- Hacked X-Rays Could Slip Guns Past Airport Security | Threat Level | Wired.com
- Hack.me · The house of rising sandbox
- IT Security and Hacking knowledge base - SecDocs
Networking
Operating System
Android
Autres
Black Berry
Bootloader
BSD
Linux
- ArchAssault
- Optimiser son SSD sous Linux - P3ter.fr
- Firewall Builder – Une interface graphique pour configurer vos règles iptables, OpenBSD PF, ipfilter, ipfw, Cisco PIX – La vache libre
Mac
Windows
Security
- da667/unlimited · GitHub
Software
- How to access Twitter from the command line on Linux - Linux FAQ
- 6-shadowy-companies-edit.jpg (720×7670)
Economy
Entrepreneurship
E-commerce
Financement
Management
Marketing
SEO
- Outil SEO indispensable #2 : Ubersuggest pour trouver des idées de contenu - Blogue SEO, PPC et Marketing Internet | David Carle HQ | Blogue SEO, PPC et Marketing Internet | David Carle HQ
- 6 façons de renforcer son SEO sans passer par la création de contenu | Blog de Markentive, agence de référencement (SEO) à Paris
- Les outils SEO gratuits pour suivre le positionnement de votre site - JDN Web & Tech
Outsourcing
Job
Stock Market
Entertainement
Anime
Audio Book
- Neuromancer - William Gibson - Audiobook Full - YouTube
Brain Fart
Cinema
Comic Strip
E-book
- 26 Useful eBooks Collection Free (Included Linux) and HTML5 Video Tutorial - Ubuntu/Linux News, Reviews, Tutorials, Apps
Gaming
Old School
Geeked
8bits Retro Experiment
Music
Netcast
News
Pub
Sport
Travel
XXX
Hardware
Batery
- New Polymer Could End Battery Fires, Quadruple Efficiency | Autopia | Wired.com
- Aquacelle : une pile qui se charge en 5 minutes avec de l'eau
DIY
- Technical Machine
Drone
Hardline
Military
- Will Hypersonic Capabilities Render Missile Defense Obsolete? | The Diplomat
- New US Military Space Plane Aims for 2017 Liftoff | Space.com
- J-20 may have better ground attack capability than F-22|Politics|News|WantChinaTimes.com
- Naval Open Source INTelligence: Navy develops 'world's smallest guided missile'
- At Last, a Google Glass for the Battlefield | Danger Room | Wired.com
- Naval Open Source INTelligence: Israel successfully tests anti-missile system for commercial planes
- The Aviationist » First images of the new Iraqi Mi-28 Night Hunter attack helicopters
- Army's Robotic Arsenal Adds $11M Driverless Trucks: Video - Bloomberg
Personal Computer
Radio
Smartphone
TV
Car
- New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
- Actualité > IBM réalise la première puce radio à base de graphène
- Graphene Conducts Electricity Ten Times Better Than Expected - Slashdot
- Cent kilos aussi légers qu'une plume avec cet exosquelette
Howto TOW
Fondation
IIA
Leetsaber
MSI
Psychohistoire
SATO
TGL
The Borg Project
Ze Bookmark
Knowledge Ressources
Misc
Science
Astronomy
- Meet the Kraken: Hydrocarbon seas spotted at Titan’s north pole | Ars Technica
- La plus vieille étoile connue est âgée de 13,6 milliards d'années - France Info
- 6-billion-year-old quasar spinning nearly as fast as physically possible | Ars Technica
- Actualité Météo : Un astéroïde à la trajectoire indéterminée près de la Terre mardi - La Chaîne Météo
Biology
- New Bionic Hand Gives Amputee a Grip — And a Sense of Touch - Wired Science
- World's first genetically modified babies born | The Change Within
- Self-Assembling Molecules Like These May Have Sparked Life on Earth - Wired Science
- Gene therapy: Ingenious | The Economist
- Geriatric muscle stem cells switch reversible quiescence into senescence : Nature : Nature Publishing Group
- GMO Human Embryos Have Already Been Created | The Alliance for Natural Health USA
- Scientists revive largest virus yet from 30,000-year-old permafrost | Ars Technica
- A Powerful New Way to Edit DNA - NYTimes.com
- Des scientifiques ont découvert que l’être humain pourrait vivre jusqu’à 500 ans | Daily Geek Show
Chemical
Computer Science
Earth
Future
Physic
- Quarks Know Their Left From Their Right | Science/AAAS | News
- We're One Step Closer to Nuclear Fusion Energy - Wired Science
- Mysterious Quantum 'Dropletons' Form Inside Semiconductors Shot With Lasers - Wired Science
Robotic
- Un drone qui mange et digère l'herbe - Sciences et Avenir
Space Exploration
- NASA is now accepting applications from companies that want to mine the moon | The Verge
Social
Common Sense
Engineering
Experiment
History
- Des empreintes d'hommes datant de plus de 800 000 ans découvertes en Angleterre
- 4.4 bn year old zircon reveals life on Earth appeared earlier than believed — RT News
Manif
Network
Philosophy
Politic
Psychology
- The Human Brain Now Reacts to Emoticons Like Real Faces | Underwire | Wired.com
Warfare
- Five Futuristic Weapons That Could Change Warfare | StratRisks
- How to Annex Another Nation's Territory - Popular Mechanics
Underground
Anonymousity
- NSA uses Google cookies to find targets for hacking, spying
- Ghetto Forensics: Is Google Scanning Malware Emails Attachments Between Researchers
- Mapping Hacking Team’s “Untraceable” Spyware
- Blackphone Designed to Make Crypto Sexy, Simple
- Facebook sait tout de vous et garde en mémoire votre historique de recherche: voici comment l’effacer - sudinfo.be
Conspiracy Theory
- Climate State Part 1 - MarthaMitchellEffect
Cyberwar
Lockpicking
Spying
- New drone technology “equivalent to the capabilities of 100 Predator drones”
- Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The InterceptThe Intercept
- How a Hacker Intercepted FBI and Secret Service Calls With Google Maps
- The Globe goes inside Canada’s top-secret spy agency - The Globe and Mail
- Schneier on Security: COTTONMOUTH-II: NSA Exploit of the Day
Stalking
Urban Exploration
- Al Qaeda Fractures: Visualized via @intelwire