Bookmarks

Bookmarks Bar

Avril

Art and Design

Computer

Coding

ASM

ASP

BASH

LinuxCommand.org: Learning the shell.

Basic

C

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Projects | code.nasa.gov
Advanced UNIX Programming - Home

Cryptography

Database

Hacking

Cracking

[Python] WordPress Brute Force MultiThread Python - Pastebin.com

DoS

Exploit

WinRAR Filename Spoofing
Sun Java Runtime Environment 1.6 - Web Start JNLP File Stack Buffer Overflow Vulnerability
MS14-017 Microsoft Word RTF Object Confusion
Heartbleed OpenSSL Information Leak Exploit
NETGEAR N600 WIRELESS DUAL BAND WNDR3400 - Multiple Vulnerabilities
Wordpress Twitget Plugin 3.3.1 - Multiple Vulnerabilities
Wordpress Quick Page/Post Redirect Plugin 5.0.3 - Multiple Vulnerabilities
WordPress Theme LineNity 1.20 - Local File Inclusion
WhatsApp < v2.11.7 - Remote Crash
MS14-012 Internet Explorer CMarkup Use-After-Free
Flickr from SQL Injection to RCE by PWN Rules!
MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
Adobe Flash Player Regular Expression Heap Overflow
Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
Wordpress Work-The-Flow Plugin 1.2.1 - Arbitrary File Upload
Wireshark <= 1.8.12/1.10.5 wiretap/mpeg.c Stack Buffer Overflow
Adobe Flash Player Type Confusion Remote Code Execution
Dissecting the newest IE10 0-day exploit (CVE-2014-0322) | Bromium Labs
NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - Stored XSS Vulnerability
NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - CSRF Vulnerability

Maping

Virus

Warez

Web

Wifi

Vulnerability

CVE - CVE-2014-0160
Staying ahead of OpenSSL vulnerabilities | CloudFlare Blog
Adobe Reader for Android 11.1.3 - Arbitrary JavaScript Execution
Active 0day attack hijacking IE users threatens a quarter of browser market | Ars Technica
Une vulnérabilité découverte dans OAuth et Open ID

www.pages.drexel.edu/~dat23/books/computers/backdoor.htm
Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers | Ars Technica
Keep People From Knowing When You Read Their WhatsApp Messages | Gadget Lab | WIRED
einaros/heartbleed-tools · GitHub
Heartbleed Used To Bypass 2-Factor Authentication, Hijack User Sessions - Slashdot
bWAPP - Browse /bee-box at SourceForge.net
Detecting OpenSSL-Heartbleed with Nmap &amp; Exploiting with Metasploit
The Essential Skills to Becoming a Master Hacker « Null Byte

Networking

How to capture and replay network traffic on Linux - Linux FAQ

Operating System

Android

pastehtml.com/view/chq1jb43i.html

Autres

The Unix and Internet Fundamentals HOWTO

Black Berry

Bootloader

BSD

Linux

Linux-Dash : monitorer aisément un serveur GNU/Linux
Final Term: A terminal emulator to rule them all | LinuxBSDos.com
The UNIX School

Mac

Windows

Security

KeyScrambler Personal - Free download and software reviews - CNET Download.com
Reveal the Original Long URL behind the Masked Shortened URL
VirusTotal - Free Online Virus, Malware and URL Scanner

Software

Chrome Web Store - Apps
FoxBleed :: Add-ons for Firefox
Download the Netcraft Extension
Chrome Web Store - Word Online
Quelles alternatives libres à Dropbox ? - LinuxFr.org
pastebin - Type, paste, share.
New Flash Player 0-day (CVE-2014-0515) used in watering-hole attacks - Securelist
The Search Engine List - A Comprehensive List of Search Engines You Can Use
List of free and open-source software packages - Wikipedia, the free encyclopedia
ShadyURL - Don't just shorten your URL, make it suspicious and frightening.

System Administration Screencasts

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

L'OAO, plus puissant que le SEO ? |Miss SEO Girl
6 Mythes dans le SEO… |Miss SEO Girl

Outsourcing

Job

Stock Market

AMD - SharpCharts Workbench - StockCharts.com

Bitcoins

A Hack That Makes Bitcoins a Whole Lot Harder to Steal | Enterprise | WIRED
Bitcoin Mining Hardware 1 TH Bitcoin Miner - Homepage new products - Butterfly Labs
Suretrader Professionals Discuss The Economic Potential Of Bitcoins
Dark Wallet - Your keys. Your privacy. Your sovereignty. - Product of Calafou. Endorsed by Enric Duran.

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

CommitStrip - Blog relating the daily life of web agencies developers

E-book

Gaming

Old School

Miss 8-Bit Gaming? Revive 80s Commodore 64 Computer Using Raspberry Pi

Geeked

8bits Retro Experiment

The Useless Web

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

DIY

Man uses Raspberry Pi to build actual working cellphone for $158 | Ars Technica

Drone

Hardline

Military

Naval Open Source INTelligence: The Navy's Newest Destroyer Is a Drone
The U.S. Military Is One Step Closer to Having Invisibility Cloaks - Defense One
US Navy to Deploy Electromagnetic Railgun Aboard JHSV | Navy & Maritime Security News at DefenceTalk

Personal Computer

The Raspberry Pi Education Manual Teaches You Basic Computer Science Principles

Radio

Smartphone

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com
» Tesla Model S Ethernet Network Explored, Possible Jailbreak in the Future? - DragTimes.com Drag Racing, Fast Cars, Muscle Cars Blog

IBM invents ’3D nanoprinter’ for microscopic objects | KurzweilAI

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

The American Dream turns into a Global Nightmare - Paul B. Farrell - MarketWatch
Algorithm Distinguishes Memes From Ordinary Information - Slashdot

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

A-t-on découvert la première exolune ? | Autour du Ciel
Pluto May Have Deep Seas and Ancient Tectonic Faults : Discovery News
First potentially habitable Earth-sized planet confirmed: It may have liquid water
ST - 2014 : HERSCHEL découvre des galaxies évoluées dans l’Univers jeune - CNES
L'exoplanète Bêta Pictoris b tourne sur elle-même 60 fois plus vite que la Terre | Atlantico

Biology

Surgeons successfully implant 3-D printed skull - The Globe and Mail
Rejuvenating bodily organs: Engage reverse gear | The Economist
Trop de stress: dégâts sur les gènes | Agence Science-Presse
Oh baby: Scientists find protein that lets egg and sperm hook up | Reuters
Scientists Make First Embryo Clones From Adults - WSJ.com
New Study Outlines Water World Theory of Life's Origins
Des personnes paralysées retrouvent un usage partiel de leurs membres grâce à un nouvel implant révolutionnaire | Daily Geek Show
Des scientifiques font une découverte majeure sur l’état de la matière… dans l’oeil d’un poulet ! | Daily Geek Show
Insulin-making cells created by Dolly-cloning method - health - 28 April 2014 - New Scientist
Brazil Greenlights Plan to Unleash Genetically Modified Mosquitoes | Common Dreams

Chemical

Computer Science

Earth

Hole Found in Natural Protective Layer of Earth’s Atmosphere | Science | WIRED
Ancient Asteroid Boiled Oceans, Burned the Sky, and Shook Earth for a Half-Hour | Science | WIRED
A Map of Every Nuke-Scale Asteroid Strike From the Last Decade | Science | WIRED

Future

Physic

Scientists Discover How to Generate Solar Power in the Dark - Defense One
Video: McGill researchers first to purchase microscopic 3D printer - The Globe and Mail
New Quantum Theory Could Explain the Flow of Time | Science | WIRED
What Happens To All the Universe's Hydrogen? - Slashdot
Matériaux de demain : oubliez le graphène, le MIT a déjà trouvé plus performant !

Robotic

Microsoft teaches robots how to deal with groups and draw from memory
Robobees

Space Exploration

Un océan d'eau liquide sous la surface d'Encelade, lune de Saturne
Underground Ocean Makes This Saturn Moon a Top Bet for Extraterrestrial Life | Science | WIRED

Comment l'US Navy transforme de l'eau de mer en carburant - Challenges

Social

Common Sense

Engineering

How to Brainwash Someone-Science Friction w/Rusty Ward WIRED Edition-Captain America - YouTube

Experiment

History

Histomap
'Accidental' Siberian Mummies Part of Mysterious Ancient Arctic Civilization

Manif

Network

Philosophy

Politic

Psychology

La génération Z passée aux rayons X

Warfare

Underground

Anonymousity

Online Survival Kit | We Fight Censorship
How to Commit Internet Suicide and Disappear from the Web Forever
Anonymous présente un service de chat sécurisé par onde radio
Personal Data Retention and Destruction Plan | Privacy Rights Clearinghouse
micahflee/pdf-redact-tools · GitHub
Fake GPS location - Android Apps on Google Play
Encryption For Beginners In an Era of Total Surveillance | Privately Investigating
Encrypt Everything
Encrypt (almost) anything - PC Advisor
Privacy Tools and Techniques - Pastebin.com
The Government Is Watching You: 8 Ways to Disappear Online
How to Erase Yourself From the Internet
how to easily delete your online accounts | accountkiller.com
How to Delete Yourself from the Internet: 12 Steps
How to Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet « Null Byte
HOW TO: Remove yourself from ALL background check websites. Thanks to LawyerCT. : technology

Conspiracy Theory

Wild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013? | Electronic Frontier Foundation

Cyberwar

Lockpicking

Spying

Stalking

Urban Exploration