Bookmarks

Bookmarks bar

Juin

Art and Design

Computer

Coding

ASM

Hello World in Assembly
Libc and NASM

ASP

BASH

Basic

C

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

PHP data encryption primer
PHP Login script tutorial

Python

python_cheatsheet.png (773×938)

Ruby

TCL

Visual Basic

Cryptography

Database

Hacking

Cracking

Passwords - SkullSecurity
Decrypt/Crack MD5 hash online
Faire sauter le mot de passe d’un fichier PDF en cas d’oubli de celui-ci - Crack-net
How To Jailbreak iOS 7.1 And 7.1.1 Untethered Using 'Pangu' Jailbreak Tool - The Hacker News
Towelroot - Rootez votre téléphone Android en un clic « Korben
Moscrack

DoS

Asterisk Phreaking How-To

Exploit

Ubuntu 12.04.0-2LTS x64 perf_swevent_init - Kernel Local Root Exploit
Module 2: NOT Encoder
Embedded a Payload into a picture.JPG (exe hidden extencion) - YouTube
Assembly Language and Shellcoding on Linux « SecurityTube Trainings
Shellcode Basics
Execve Shellcode Stack Technique
D-link DSL-2760U-E1 - Persistent XSS
Wordpress TimThumb 2.8.13 WebShot - Remote Code Execution (0-day)
Internet Explorer 8, 9 & 10 - CInput Use-After-Free (MS14-035) - Crash PoC
D-Link hedwig.cgi Buffer Overflow in Cookie Header
D-Link authentication.cgi Buffer Overflow
Shellter | Shellter v1.1
Beginner Hacking - Episode 14 - Take over a computer with just a website link (BEEF XSS Framework) - YouTube
Wordpress Simple Share Buttons Adder Plugin 4.4 - Multiple Vulnerabilities
Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 4.1.X Bypass

Maping

Nmap Cheat Sheet: From Discovery to Exploits, Part 2: Advance Port Scanning with Nmap And Custom Idle Scan - InfoSec Institute
FootPrinting-First Step Of Ethical Hacking | Ethical Hacking-Your Way To The World Of IT Security
phpinfo() Type Confusion Infoleak Vulnerability and SSL Private Keys | SektionEins GmbH

Virus

Module 6: Daemons and Backdoors
Norse - IPViking Live
chkrootkit 0.49 - Local Root Vulnerability

Warez

5 Ways To Download Torrents Anonymously | TorrentFreak
How to Pirate Movies, Music, TV Shows, and Books Without Getting Caught

Web

MySQL Injection : Step By Step Tutorial - ..:: Devil's Cafe ::..
Javascript for Pentesters « SecurityTube Trainings
SQL Injection
Course Introduction
Challenge 2: HTTP Form Attacks Reloaded

Wifi

wp-snitch v0.1 - public release - Top-hat-sec
How an Attacker Could Crack Your Wireless Network Security
Aircrack-ng Suite Cheatsheet

Vulnerability

WordPress - Vulnérabilités critiques pour le plugin All in One SEO Pack ! | UnderNews
Heartbleed Redux: Another Gaping Wound in Web Encryption Uncovered | Threat Level | WIRED
Oracle Java SE CVE-2014-0455 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-0429 Remote Security Vulnerability
Oracle Java SE CVE-2014-2414 Remote Security Vulnerability
PHP DNS TXT Record Handling Heap Buffer Overflow Vulnerability
Apache 'mod_wsgi' Module Local Privilege Escalation Vulnerability
Apache 'mod_wsgi' Module CVE-2014-0242 Information Disclosure Vulnerability
Exploiting wildcards on Linux
Samba DNS Protocol Handling Denial of Service Vulnerability
OpenSSL 'ssl3_release_read_buffer()' Use-After-Free Memory Corruption Vulnerability
Oracle Java Applet Clipboard Injection Remote Code Execution Vulnerability
Oracle Java SE and Java for Business CVE-2010-4469 Remote Java Runtime Environment Vulnerability
Oracle Java SE and Java for Business CVE-2010-4448 Remote Java Runtime Environment Vulnerability
OpenJDK 'IcedTea' plugin JNLPSecurityManager Remote Code Execution Vulnerability
Wireshark RLC Dissector 'packet-rlc.c' CVE-2014-2283 Denial of Service Vulnerability
Wireshark NFS Dissector CVE-2014-2281 Denial of Service Vulnerability
Wireshark M3UA Dissector CVE-2014-2282 Denial of Service Vulnerability
Le Wi-Fi de votre smartphone Android vous espionne - Informaticien.be
Xen CVE-2014-4021 Information Disclosure Vulnerability

Your car is a giant computer - and it can be hacked - Jun. 1, 2014
How to Hack a Car: Phreaked Out (Episode 2) - YouTube
All The Ways To Hack Your Phone: Phreaked Out (Episode 3) - YouTube
Test Site
Python for Pentesters and Hackers « SecurityTube Trainings
x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings
Root almost any Android device, including AT&T or Verizon Galaxy S5, with towelroot by geohot
Carnal0wnage & Attack Research Blog: Want to break some Android apps?
Module 2: Insertion Encoder
shell-storm | Repository
Installing Phishing Frenzy in Kali linux | LINUX DIGEST

Networking

Operating System

Android

Use This App to Get Android Push Notifications on Your Desktop | Gadget Lab | WIRED

Autres

Tizen | An open source, standards-based software platform for multiple device categories.

Black Berry

Bootloader

BSD

Linux

CoreOS is Linux for Massive Server Deployments
A lightweight and simple dashboard monitor for Linux - eZ Server Monitor
How to access popular search engines from the command line on Linux - Linux FAQ
More Linux Commands - A practical reference
Linux Commands - A practical reference
linuxgems/cheat_sheet.org.sh at master · WilliamHackmore/linuxgems
TeeJee Tech: Introducing Aptik
TeeJee Tech: Upgrade to Ubuntu 14.04 with TimeShift & Aptik

Mac

Windows

Security

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd? | Talk Video | TED.com

Software

Mes addons et extensions favoris pour Firefox et Chrome. - Crack-net
Chrome Web Store - Image collector extension

Advanced Search Operators: SEO Experts' Web Searching Tips
40 maps that explain the internet
The Anatomy of a Perfect Web Page (2014) - Hit Reach
Collection of cheat sheets

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

SEM SEO SEA SMO > AxeNet.fr
Pyramide de Maslow et référencement SEO/SMO | Agence web 1min30, Inbound marketing et communication digitale à Paris
SEO 101: On-Page Optimization | Search Engine Journal

Outsourcing

Job

Rédiger et mettre en forme votre CV qui déchire en quelques clics et en ligne - Crack-net

Stock Market

Bitcoins

A beginner's guide to owning bitcoin - The Globe and Mail

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

Voiture électrique : une batterie offrant 1600 km d'autonomie | ICI.Radio-Canada.ca

DIY

Drone

Hardline

Military

TrackingPoint Labs - Shotview App & Wearable Technology - YouTube

Personal Computer

Radio

Smartphone

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

Top 5 Plans to Ensure the Continuity of our Species : Discovery News

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Découverte d'une planète 17 fois plus lourde que la Terre | Astronomie et espace
Red Dwarfs Could Sterilize Alien Worlds of Life : Discovery News
Une planète en zone habitable repérée à 13 années-lumière - L'Express
SPHERE livre des images de Titan
100 millions d'exoplanètes abriteraient une vie complexeLe Cosmographe
Cracks in Pluto's Moon Could Indicate it Once Had an Underground Ocean | NASA
Ganymède serait habitableLe Cosmographe

Biology

Video: Scientists grow human cartilage using stem cells - The Globe and Mail
MIT Working On Robotic Limbs That Attach To Shoulders, Waist - Slashdot
Des microparticules injectées dans le sang permettent de vivre sans respirer !
2014/06/02 > BE Suède 44 > Découverte d'une nouvelle molécule capable de tuer les cellules cancéreuses
American scientists controversially recreate deadly Spanish Flu virus - Science - News - The Independent
Ancient fish: Who’s the daddy? | The Economist
How Evolution Gave Some Fish Their Electric Powers | Science | WIRED
La régénération de membres humains, une possibilité grâce à la salamandre ?
Building machines from muscle: University of Illinois demonstrates "walking" bio-robot
Des scientifiques créent un virus de la grippe H1N1 ultra-virulent

Chemical

Computer Science

Meet the Artificial Intelligence Program That's Learning Everything

Earth

New evidence for oceans of water deep in the Earth

Future

Physic

Un pas de plus vers la téléportation ? Des scientifiques réussissent une nouvelle expérience
What’s Up With That: The Bizarre Liquid That Sometimes Acts Like a Solid | Science | WIRED
L’US Navy veut transformer l’eau de mer en kérosène - TECHNOLOGIE DU FUTURE

Robotic

Intel dévoile un robot en kit à fabriquer soi-même
Pepper, le premier robot au monde capable de ressentir des émotions
MIT robot augments you with two extra arms | The Verge
It drives and opens doors: Google to sell humanoid robot (VIDEO)

Space Exploration

Le futur vaisseau spatial de la NASA fera des sauts temporels
Semi-échec pour la soucoupe volante de la Nasa

Pilot Lands a Plane with His Thoughts : Discovery News
Un projecteur holographique de la taille d'un Tic-Tac

Social

Common Sense

Engineering

Protecting Our Brains From Datamining - Slashdot

Experiment

History

Les découvertes archéologiques: Un pipeline vieux de 5000 ans découvert en Iran

Manif

Network

Philosophy

Politic

Psychology

Warfare

Underground

Anonymousity

How Can I Destroy Surveillance Cameras? | Earth First! Newswire
Maskme : intéressante extension pour cacher son mail | Daria blogue...de manière décalée
Fight the Google Glass Cyborgs with Glasshole.sh
How the NSA Could Bug Your Powered-Off iPhone, and How to Stop Them | Threat Level | WIRED
CyberGuerrilla 2012 » VPN & DNS Leakage
This Link Will Self Destruct
How To Install Tor - Polipo Proxy With SQLMap [#Video] - Hackers Online Club (HOC)
Email encryption | Hacker 10 - Security Hacker

Conspiracy Theory

Cyberwar

Lockpicking

Spying

Stalking

FotoForensics
Free Online YouTube Downloader: Download YouTube Videos, Facebook and many others!

Urban Exploration

Image Collector extension

Dyinglinks - More than just a url shortener