Bookmarks

Bookmarks bar

Juillet

Art and Design

Computer

Coding

ASM

Module 2: HelloWorld Shellcode JMP-CALL-POP Technique

ASP

BASH

Basic

C

C#

C++

HTML

Java

Javascript

Mircscript

Perl

PHP

Python

selenium 2.42.1 : Python Package Index
Learn Python Through Public Data Hacking - YouTube

Ruby

TCL

Visual Basic

Cryptography

Database

Hacking

Cracking

Gateway 3DS Le Linker Nintendo 3DS
Faire sauter le mot de passe d’un fichier PDF en cas d’oubli de celui-ci - Crack-net
twofi - Twitter Words of Interest - DigiNinja
How Secure Is My Password?
wordlist-manipulator - Bash script to facilitate wordlist manipulation - Google Project Hosting

DoS

Exploit

Wordpress MailPoet (wysija-newsletters) Unauthenticated File Upload
Netgear WNR1000v3 - Password Recovery Credential Disclosure Vulnerability
D-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection
D-Link HNAP Request Remote Buffer Overflow
D-Link info.cgi POST Request Buffer Overflow
Creating standalone payloads using Veil-Catapult | LINUX DIGEST
Joomla Youtube Gallery Component - SQL Injection Vulnerability
Exploiting Simple Buffer Overflows On Win32 - Bad Characters
Insertion Encoder
Linux Kernel ptrace/sysret - Local Privilege Escalation
0×0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite ← Primal Security Podcast
NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - Password Disclosure vulnerability
Wordpress Video Gallery Plugin 2.5 - Multiple Vulnerabilities
BulletProof FTP Client 2010 - Buffer Overflow (SEH)
SLAE: Shell Reverse TCP Shellcode (Linux/x86) « RCE Security
TrueCrypt - Privilege Escalation - vinicius777 - InfoSec
25c3 - Hacking The Iphone
TP-Link TL-WR740N v4 Router (FW-Ver. 3.16.6 Build 130529 Rel.47286n) - Command Execution
Shellcode Linux x86 - chmod (777 /etc/passwd & /etc/shadow), Add New Root User (ALI/ALI) & Execute /bin/sh
Darkc0de.com archive | Exploit KB

Maping

MEGA

Virus

Warez

Web

Hacking protonmail - with a browser. on Vimeo
SecurityTube.net Hack of the Day: File Upload Vulnerability
cure53/Flashbang
SQL Injection Attack
SQL injection Tutorials and SQL injection Tools - ..:: Devil's Cafe ::..
Remote File Inclusion Tutorial | www.SecurityXploded.com
Remote File Inclusion (Tutorials) - ThisisLegal.com

Wifi

Vulnerability

php-gd 'gdxpm.c' NULL Pointer Dereference Denial of Service Vulnerability
Oracle Event Processing CVE-2014-2424 Remote Code Execution Vulnerability
VLC Media Player CVE-2013-4388 Buffer Overflow Vulnerability
Google Drive Vulnerability Leaks Users' Private Data
phpMyAdmin CVE-2013-5003 Multiple SQL Injection Vulnerabilities
phpMyAdmin CVE-2013-4996 Multiple Cross Site Scripting Vulnerabilities
phpMyAdmin 'import.php' Cross Site Scripting Vulnerability
WordPress Meta Slider Plugin 'admin.php' Cross Site Scripting Vulnerability
WordPress BannerMan Plugin 'bannerman_background' Parameter Cross Site Scripting Vulnerability
WordPress MailPoet Newsletters Plugin Remote File Upload Vulnerability
Alerte sécurité - Adobe Flash visé par une cyberattaque massive | UnderNews
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2014-1497 Out of Bounds Memory Corruption Vulnerability
Mozilla Firefox/SeaMonkey/Thunderbird CVE-2014-1508 Information Disclosure Vulnerability
Oracle Java SE CVE-2014-4218 Remote Security Vulnerability
Oracle Java SE CVE-2014-4263 Remote Security Vulnerability
Oracle Java SE CVE-2014-4216 Remote Security Vulnerability
Oracle Java SE CVE-2014-4219 Remote Security Vulnerability
Oracle Java SE CVE-2014-4209 Remote Security Vulnerability
Oracle Java SE CVE-2014-2490 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-4252 Remote Security Vulnerability
Oracle Java SE CVE-2014-4262 Remote Security Vulnerability
Silver Bullets and Fairy Tails | Exodus Intelligence
Apache HTTP Server CVE-2014-0117 Remote Denial of Service Vulnerability
Apache HTTP Server 'mod_status' CVE-2014-0226 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-4265 Remote Security Vulnerability
Tor CVE-2014-5117 RELAY_EARLY Security Vulnerability
Microsoft Office CVE-2013-5057 ASLR Security Bypass Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1555 Use After Free Memory Corruption Vulnerability
Linux Kernel 'futex.c' Function Denial of Service Vulnerability
Linux Kernel 'filter.c' CVE-2014-3144 Multiple Local Denial of Service Vulnerabilities
Linux Kernel 'sctp_association_free()' Function Denial of Service Vulnerability
Linux Kernel SCTP NULL Pointer Dereference Denial of Service Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1544 Use After Free Memory Corruption Vulnerability
Oracle Java SE CVE-2014-0460 Remote Security Vulnerability
Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
PHP 'ext/spl/spl_array.c' Use After Free Memory Corruption Vulnerability
PHP Fileinfo Component Incomplete Fix Remote Denial of Service Vulnerability
PHP Fileinfo Component 'cdf_check_stream_offset()' Function Remote Denial of Service Vulnerability
OpenSSL CVE-2014-3511 Man in the Middle Security Bypass Vulnerability
OpenSSL CVE-2014-3509 Remote Denial of Service Vulnerability
OpenSSL DTLS CVE-2014-3506 Remote Denial of Service Vulnerability
OpenSSL NULL Pointer Dereference CVE-2014-5139 Local Denial of Service Vulnerability
OpenSSL DTLS CVE-2014-3505 Remote Denial of Service Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1551 Use After Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1556 Remote Code Execution Vulnerability
Oracle Java SE CVE-2014-4244 Remote Security Vulnerability
Oracle Java SE CVE-2014-4227 Remote Security Vulnerability
Microsoft Internet Explorer CVE-2014-4052 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2014-4056 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2014-4058 Remote Memory Corruption Vulnerability
Microsoft Internet Explorer CVE-2014-2827 Remote Memory Corruption Vulnerability

“Weaponized” exploit can steal sensitive user data on eBay, Tumblr, et al. | Ars Technica
'Rosetta Flash' Attack Leverages JSONP Callbacks To Steal Credentials - Slashdot
Hackers Could Take Control of Your Car. This Device Can Stop Them | Autopia | WIRED
MEGA
PunkSPIDER
pastebin.com/raw.php?i=cRYvK4jb

Networking

Operating System

Android

Autres

Black Berry

Bootloader

BSD

Linux

LXC -- Linux Virtualization - YouTube
tutoriaLinux - YouTube
memo-linux.com » dhcpd-pools outil serveur DHCP
5 Linux commands to shutdown and reboot the system
Linux / UNIX
.Bashrc File Shortcuts - Pastebin.com
Linux Command Reference
20 things to do after installing Kali Linux | blackMORE Ops

Mac

Windows

FenOS
fogproject.org

Security

MEGA
FireEye - Fox IT Scanner
How to Build a (Nearly) Hack-Proof Password System with LastPass and a Thumb Drive
Passwords - Basic Info - Anonymous - Pastebin.com

Software

Virtual x86 – Un émulateur de système d’exploitation x86 en Javascript dans votre navigateur (excellent) – La vache libre
kahun/awesome-sysadmin
PDF Tools Sandbox - Spoon.net

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

Comment Optimiser son site Web? – Vitesse, SEO, Médias sociaux, UX, mesure et conversion
Comment calculer le ROI d'une campagne SEO ? - Blog d'actualité sur internet et l'emailing, par web-eau.net
8 Most Important SEO Data Points of Any Website | SEJ
Do Your Own 5-Minute SEO Audit
L'audit SEO ou la psychanalyse digitale
Best Link Building Strategies that Don't Require Content
WordPress SEO : Le guide complet sur ce plugin indispensable
SEO : les sites en HTTPS favorisés par Google (officiel)
Le SEO est-il devenu de la guérilla ? > Blog AxeNet

Outsourcing

Job

Stock Market

Bitcoins

A New Digital Currency Whose Value Is Based on Your Reputation | Enterprise | WIRED

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

Des batteries trois fois plus performantes grâce au sable ?

DIY

$8 Homemade Air Conditioner - Works Flawlessly! - YouTube
The 46 Most Brilliant Life Hacks Every Human Being Needs To Make Life Easier
Microwave hacked into weapon, used to blow up a stereo - SlashGear
The DIY Neuroenhancers Hacking Their Brains With Electricity | Motherboard

Drone

Hardline

Military

Personal Computer

Existe-t-il des smartwatches autonomes avec carte sim ?

Radio

Smartphone

TV

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

Scientists Create a New Type of Ultra-High-Res Flexible Display | Gadget Lab | WIRED

Howto TOW

Fondation

10 talents que les jeux vidéo aident à développer

IIA

Leetsaber

Using Rufus to create bootable USB images - Softwarebakery

MSI

Psychohistoire

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Une galaxie vandalisée par son trou noir supermassifLe Cosmographe
Une exoplanète qui ressemble à la Terre autour d'étoile doubleLe Cosmographe
Actualité > Les galaxies satellites défient à nouveau la cosmologie standard

Biology

Des scientifiques français ont mis au point des cellules souches capables de réparer le coeur humain | Daily Geek Show
Des scientifiques ont découvert le bouton on/off de la conscience humaine | Atlantico.fr
Study: Whales Are Ecosystem "Engineers" - Slashdot
Research finds gene that delays onset of Alzheimer’s - The Globe and Mail
Researchers find dozens of genetic links to schizophrenia - The Globe and Mail
EN IMAGES. Un insecte géant découvert en Chine - Sciences et Avenir
Cette étonnante bactérie se nourrit exclusivement d’électricité pour survivre | Daily Geek Show
Watch 80,000 Neurons Fire in the Brain of a Fish | Science | WIRED
Une feuille artificielle pour produire de l'oxygène « Korben
Des bioplastiques produits grâce à un crustacé
The Secret Bataclysm: White Nose Syndrome and Extinction | Science Blogs | WIRED
Du venin d'abeille comme traitement contre le cancer - Sciences et Avenir

Chemical

Computer Science

DARPA demos lightweight, 94GHz silicon system on a chip | Network World
IBM Unveils a ‘Brain-Like’ Chip With 4,000 Processor Cores | Enterprise | WIRED

Earth

Future

Physic

Ask Ethan #45: How deep does the Multiverse go? — Starts With A Bang! — Medium
Researchers learn about gas-giant cores by hammering diamond with lasers | Ars Technica
The Milky Way Is Much Less Massive Than Previous Thought - Slashdot
'Unparticles' May Hold the Key To Superconductivity - Slashdot

Robotic

This Computerized Exoskeleton Could Help Millions of People Walk Again | Business | WIRED
Un robot agent de surveillance pour combattre la criminalité - TECHNOLOGIE DU FUTURE

Space Exploration

A Beautifully Detailed New Geologic Map of Mars | Science | WIRED
How a space robot will ‘slow dance’ with an asteroid, thanks to Canada - The Globe and Mail
Finding Life In Space By Looking For Extraterrestrial Pollution - Slashdot
Chang'e 3 update: Both rover and lander still alive at the end of their eighth lunar day | The Planetary Society
NASA Tests Microwave Space Drive - Slashdot
Ils prennent le contrôle d'un vieux satellite depuis un McDo abandonné | Slate.fr

Social

Common Sense

Engineering

Experiment

History

Manif

Network

Philosophy

Politic

Psychology

Warfare

Underground

Anonymousity

How to Really Browse Without Leaving a Trace
The airborne panopticon: How plane-mounted cameras watch entire cities | Ars Technica
Firefox with add-ons - Secure Web Browser | Security In A Box
Another privacy threat: DNS logging and how to avoid it | Internet privacy - InfoWorld
Privnote - Send notes that will self-destruct after being read
Protecting your online privacy - Basic Info - Pastebin.com
Internet Security - Basic Info - Anonymous - Pastebin.com
Online 'fingerprinting' stalking web users, nearly impossible to block — RT USA
Comment empêcher Google de savoir ce que vous téléchargez avec Firefox ? « Korben
How to defeat facial-recognition machines and look like a rock star | Ars Technica
#HITB2012KUL D1T3 - The Grugq - OPSEC: Because Jail is for wuftpd - YouTube
ZATAZ Magazine » Youporn et la Maison Blanche utilisent la même techno pour nous tracer
orWall, une app Android qui utilise TOR et bloque le trafic en dehors
BitTorrent's Bleep messenger is a secure, decentralized chat platform
CryptoParty ATX
Lucb1e.com :: Cookieless Cookies
BBC News - Wearable users tracked with Raspberry Pi
Leak - Just say it. Send an anonymous email.
Visit the Wrong Website, and the FBI Could End Up in Your Computer | Threat Level | WIRED
MadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too)
Technitium MAC Address Changer v6 (FREEWARE)
Download IprediaOS - Version 1 | Ipredia
How NSA access was built into Windows | Telepolis
nsa-observer
sensepost/snoopy-ng

Conspiracy Theory

Cyberwar

Lockpicking

Spying

Stalking

3 outils pour espionner vos concurrents en ligne |Miss SEO Girl
Website Tools - Website Server Software | Ultratools
Reverse Phone Lookup - WhitePages
Check Username Availability at Multiple Social Networking Sites

Urban Exploration

Image Collector extension

Dyinglinks - More than just a url shortener