Bookmarks

Bookmarks bar

Septembre

Art and Design

8 Tools for Creating Perfectly Sized Images for Social Media Sites

Computer

Coding

ASM

ASP

BASH

Basic

C

C#

C++

HTML

How a new HTML element will make the Web faster | Ars Technica

Java

Javascript

Mircscript

Perl

PHP

Python

Ruby

TCL

Visual Basic

Human Coders Forum

Cryptography

TrueCrypt Getting a New Life - eSecurity Planet

Database

Hacking

Cracking

10,000 Top Passwords
CeWL - DigiNinja
How the NSA, and your boss, can intercept and break SSL | ZDNet
iBrute Python script allows you to brute force Apple accounts - Cyberwarzone

DoS

Exploit

Wordpress Huge-IT Image Gallery 1.0.1 Authenticated SQL Injection
BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit
The Exploration and Exploitation of an SD Memory Card [30c3] - YouTube
WordPress Acento Theme (view-pdf.php, file param) - Arbitrary File Download
Wordpress Bulk Delete Users by Email Plugin 1.0 - CSRF
Joomla Spider Calendar <= 3.2.6 - SQL Injection
Wordpress Like Dislike Counter 1.2.3 Plugin - SQL Injection Vulnerability
TP-LINK Model No. TL-WR340G / TL-WR340GD - Multiple Vulnerabilities
TP-LINK Model No. TL-WR841N / TL-WR841ND - Multiple Vulnerabilities
PHP Stock Management System 1.02 - Multiple Vulnerabilty
Obfuscated Shellcode Linux x86 - chmod 777 (/etc/passwd + /etc/shadow) & Add New Root User & Execute /bin/bash
Joomla Spider Contacts 1.3.6 (index.php, contacts_id param) - SQL Injection
Wordpress WP Support Plus Responsive Ticket System 2.0 Plugin - Multiple Vulnerabilities
Exploiting Ammyy Admin – developing an 0day « Thoughts on Security
USB&WiFi Flash Drive 1.3 iOS - Code Execution Vulnerability
PowerShell Post-Exploitation with Cobalt Strike's Beacon - YouTube
www.rsf.org/IMG/pdf/Bloggers_Handbook2.pdf
Joomla Spider Form Maker <= 3.4 - SQLInjection
Joomla Face Gallery 1.0 - Multiple vulnerabilities
Joomla Mac Gallery 1.5 - Arbitrary File Download
pastebin.com/raw.php?i=166f8Rjx
Bash Environment Variables Code Injection Exploit
metasploit-framework/vmware_bash_function_root.rb at master · rapid7/metasploit-framework
Disarming Enhanced Mitigation Experience Toolkit (EMET) v 5.0
Microsoft Exchange IIS HTTP Internal IP Address Disclosure
pastebin.com/raw.php?i=4G6mpr1n
GNU bash 4.3.11 Environment Variable dhclient Exploit
Pure-FTPd External Authentication Bash Environment Variable Code Injection
OpenVPN 2.2.29 - ShellShock Exploit
Bash - CGI RCE (MSF) Shellshock Exploit
Postfix SMTP - Shellshock Exploit
Wordpress InfusionSoft Plugin Upload Vulnerability
Linux Kernel 3.16.1 - Remount FUSE Exploit

Maping

How to scan for the "shellshock" vulnerability | Tenable Discussions Forum
[TomatoUSB] Capturer du traffic avec tcpdump
www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
hackingdefined.org/publications/nmap-cheat-sheet.pdf
SSID Finder
ivanpustogarov/hsportscanner

Virus

Warez

Web

DirBuster | SourceForge.net
Cross Site Scripting(XSS) Complete Tutorial for Beginners~ Web Application Vulnerability| Learn How to Hack| Ethical Hacking
How to Access blocked websites and bypass proxy servers « Internet
zigoo0/webpwn3r
Exploiting Bash Remote Code Execution Vulnerability (CVE-2014-6271) - YouTube
CVE-2014-6271: Bash lets you do bad things. (Shellshock) | Invisible Threat

Wifi

Dictionary Attack on Hidden SSID Networks

Vulnerability

Oracle Java SE CVE-2014-4247 Remote Security Vulnerability
Oracle Java SE CVE-2014-4223 Remote Security Vulnerability
Linux Kernel 'mm/slab.c' Local Denial of Service Vulnerability
Linux Kernel 'control.c' File Use After Free Memory Corruption Vulnerability
Squid CVE-2014-3609 Remote Denial of Service Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1567 Use After Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1562 Multiple Memory Corruption Vulnerabilities
Oracle Java SE CVE-2014-4264 Remote Security Vulnerability
PHP Fileinfo Component 'cdf_read_short_sector()' Function Remote Denial of Service Vulnerability
GNU glibc 'getaddrinfo()' CVE-2013-4357 Remote Denial of Service Vulnerability
Android apps that fail to validate SSL - Google Sheets
Microsoft Internet Explorer CVE-2013-7331 Information Disclosure Vulnerability
Adobe Flash Player and AIR CVE-2014-0559 Unspecified Heap Based Buffer Overflow Vulnerability
Adobe Flash Player and AIR CVE-2014-0555 Unspecified Memory Corruption Vulnerability
Adobe Flash Player and AIR CVE-2014-0553 Use After Free Remote Code Execution Vulnerability
Adobe Flash Player and AIR CVE-2014-0548 Same Origin Policy Security Bypass Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-5601 Remote Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird CVE-2014-1558 Security Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1710 Arbitrary Code Execution Vulnerability
OpenSSL DTLS CVE-2014-3510 Remote Denial of Service Vulnerability
OpenSSL DTLS CVE-2014-3507 Remote Denial of Service Vulnerability
Linux Kernel 'tcp_set_keepalive()' Function Denial of Service Vulnerability
Linux Kernel 'fs/udf/inode.c' Local Denial of Service Vulnerability
Mozilla Firefox/SeaMonkey/Thunderbird CVE-2012-4195 Cross Site Scripting Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3963 Use-After-Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4212 Use After Free Memory Corruption Vulnerability
Vulnérabilité dans phpMyAdmin
GNU Automake Local Arbitrary Code Execution Vulnerability
ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
Linux Kernel 'SMB2_tcon' NULL Pointer Dereference Denial of Service Vulnerability
Apple Mac OS X and iOS CVE-2014-4374 XML External Entity Information Disclosure Vulnerability
Linux Kernel 'ISOFS' Stack-Based Buffer Overflow Vulnerability
Linux Kernel KVM 'virt/kvm/iommu.c' Denial of Service Vulnerability
LibVNCServer CVE-2014-6052 Denial of Service Vulnerability
cURL/libcURL CVE-2014-3613 Remote Security Bypass Vulnerability
cURL/libcURL CVE-2014-3620 Cookies Handling Remote Security Bypass Vulnerability
Wireshark SES Dissector CVE-2014-6428 Remote Denial of Service Vulnerability
Wordpress Login Widget With Shortcode 3.1.1 - Multiple Vulnerabilities
GNU bash Environment Variable Command Injection
Wordpress All In One WP Security Plugin 3.8.2 - SQL Injection
GNU Bash CVE-2014-7169 Incomplete Fix Remote Code Execution Vulnerability
GNU Bash CVE-2014-6271 Remote Code Execution Vulnerability
Google Chrome CVE-2014-3173 Information Disclosure Vulnerability
Google Chrome CVE-2014-3175 Multiple Unspecified Security Vulnerabilities
Google Chrome CVE-2014-3171 Use After Free Remote Code Execution Vulnerability
Google Chrome Multiple Unspecified Remote Code Execution Vulnerabilities
Vulnerability Note VU#582497 - Multiple Android applications fail to properly validate SSL certificates
GNU Bash CVE-2014-7186 Local Memory Corruption Vulnerability
GNU Bash CVE-2014-7187 Local Memory Corruption Vulnerability
GNU Bash CVE-2014-6277 Incomplete Fix Remote Code Execution Vulnerability
GNU Bash CVE-2014-6278 Incomplete Fix Remote Code Execution Vulnerability
OpenVPN vulnerable to Shellshock Bash vulnerability | Threatpost | The first stop for security news
Linux Kernel 'net_get_random_once' Local Information Disclosure Vulnerability
LibVNCServer CVE-2014-6054 Denial of Service Vulnerability
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
LibVNCServer CVE-2014-6053 Remote Denial of Service Vulnerability
LibVNCServer CVE-2014-6055 Multiple Stack Based Buffer Overflow Vulnerabilities
Perl CVE-2014-4330 Stack Overflow Denial of Service Vulnerability
Linux Kernel CVE-2014-3631 Local Denial of Service Vulnerability
Cisco Intrusion Prevention System CVE-2014-3402 Denial of Service Vulnerability
Cisco IOS XE Software CVE-2014-3403 Certificate Validation Security Bypass Vulnerability

Hip13 : Remoting Android Applications For Fun And Profit
DEFCON 22 Using Metasploit to Exploit Android Demo - YouTube

Networking

Linux TCP/IP networking: net-tools vs. iproute2 - Linux FAQ
Load Balancing Script - Pastebin.com

Operating System

Android

androguard - Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !) - Google Project Hosting
androguard - Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !) - Google Project Hosting

Autres

ROS.org | Powering the world's robots

Black Berry

Bootloader

BSD

Linux

DSLR
[shell-fu:home]$
Learn Basic Linux Commands with This Downloadable Cheat Sheet
How to access Linux command cheat sheets from the command line - Xmodulo
Scientific Linux
Linux: Keep An Eye On Your System With Glances Monitor
Install and Use nmon Tool To Monitor Linux Systems Performance

Mac

Windows

Security

5 Must-have Security Apps for iPhone
For Sale Soon: The World’s First Google Glass Detector | Threat Level | WIRED
Google Chrome Blog: Clean up your hijacked settings

Software

Higan – Un émulateur de consoles de jeux Nintendo (NES, Gameboy etc), pour GNU/Linux, Windows et Mac – La vache libre
Adminer - Database management in a single PHP file
Installation successful
ImgOps - Image Operations - 画

Sublimigeek | Geek, Astuces, High Tech et découvertes du Net
https://www.sans.org/security-resources/GoogleCheatSheet.pdf

Economy

Entrepreneurship

E-commerce

Financement

Management

Marketing

SEO

The 5 latest SEO trends and tips for 2015 you need to know « Entrepreneur, Startup, Small Business Articles and Resources
Conseils SEO Référencement : Suivi des positions et du référencement
Tout savoir sur le cocon sémantique - Consultante seo !Miss SEO Girl
Bourrin… > Blog AxeNet
L’internaute au centre de nos stratégies web -Miss SEO Girl
Outils & Ressources SEO 100% Google Friendly
Optimisez votre visibilité sur FacebookMiss SEO Girl
Panda : le filtre contre le contenu de mauvaise qualité ! -Miss SEO Girl
Qualité sémantique objective, les structures en SEO, opus 4

Outsourcing

Job

Stock Market

Entertainement

Anime

Audio Book

Brain Fart

Cinema

Comic Strip

E-book

Gaming

Old School

Geeked

8bits Retro Experiment

Music

Netcast

News

Pub

Sport

Travel

XXX

Hardware

Batery

Environmentally-Friendly Lithium Recycling From a Spent Organic Li-Ion Battery - Renault - 2014 - ChemSusChem - Wiley Online Library

DIY

Trebuchet Build - Imgur
A Military-Grade Drone That Can Be Printed Anywhere | WIRED
Voici comment fabriquer votre cape d'invisibilité ! | Gizmodo

Drone

Hardline

Military

Army’s New Laser Cannon Blasts Drones Out of the Sky, Even in Fog | Autopia | WIRED
The Spiny Dogfish Might Be the World’s Best Naval Gunship — War Is Boring — Medium
Armored Ground Vehicles Could Sprint, Dodge And Shield Their Way Out Of Danger | Army & Land Forces News at DefenceTalk
The $1,200 Machine That Lets Anyone Make a Metal Gun at Home | WIRED

Personal Computer

Skywatch Windoo - Weather station for iOS and Android - YouTube
Wireless Hard Drive Adds 2TB to Your Phone Without the Cloud | Gadget Lab | WIRED
Inverse Path - USB armory press release

Radio

Smartphone

TV

Matchstick : la Chromecast de Google peut aller se rhabiller - Blog de dada

Car

New Suspension Generates Power From Bumps and Curves | Autopia | Wired.com

Repair Manuals for Every Thing - iFixit

Howto TOW

Fondation

IIA

Leetsaber

MSI

Psychohistoire

SATO

TGL

The Borg Project

Ze Bookmark

Knowledge Ressources

Misc

Science

Astronomy

Remains of the Universe’s first stars found plastered onto a present one | Ars Technica
Water found in a Neptune-sized exoplanet’s atmosphere | Ars Technica

Biology

Scientists introduce massive dinosaur found in Argentina - The Globe and Mail
Le dendogramma, nouvel organisme sous-marin que les chercheurs ne savent pas où placer sur l’arbre de la vie | Slate.fr
Scientists Regenerate Rat Muscle Tissue - Slashdot
Un ver plat « immortel » ouvre une voie inédite contre les bactéries - Communiqués et dossiers de presse - CNRS
Caffeine is so essential that the ability to produce it evolved twice | Ars Technica
Scientists Identify First Swimming Dinosaur - WSJ
Crops Grow On Fake Moon And Mars Soil | Popular Science
This Bizarre Organism Builds Itself a New Genome Every Time It Has Sex | WIRED
New branch added to European family tree: Europeans descended from at least 3, not 2, groups of ancient humans -- ScienceDaily
Actualité > Une hormone ralentit le vieillissement... mais réduit la fertlité
Des chercheurs ont réussi à manipuler la photosynthèse, ce qui pourrait grandement aider l'agriculture | Slate.fr
Quand les plantes lancent un SOS, les guêpes leur répondent - Sciences et Avenir
De la glace coule dans les veines de ce poisson d'Antarctique - Sciences et Avenir
Trouvées dans l'espace, ces molécules sont-elles les premières briques de la vie ? - Sciences et Avenir
What's the Best Time to Go to Bed? - WSJ - WSJ
Engineers Build Ultrasmall Organic Laser | Chemical & Engineering News

Chemical

Computer Science

Le transfert de données via le corps humain, ça marche !

Earth

Reuters - Water's edge: the crisis of rising sea levels

Future

Physic

La téléportation lointaine : vers une fiabilité à 100 % | La Recherche
Laniakea : ce super amas de galaxies dans lequel se trouve la Terre
Star cluster shows lithium shortfall is widespread
'Solid light' could compute previously unsolvable problems - ScienceBlog.com
Scientists Capture the Sound Made By a Single Atom - Slashdot
Après le graphène, voici le germanène
Première mondiale : trois photons intriqués - Sciences et Avenir
Des métaux liquides qui changent de forme... comme T-1000 dans Terminator
Hey There Little Electron, Why Won't You Tell Me Where You Came From? | WIRED
First Teleportation Of Multiple Quantum Properties Of A Single Photon — The Physics arXiv Blog — Medium

Robotic

University of Tokyo Biped Robot Can Hit Speeds of 2.6 mph - Japan Real Time - WSJ
Developing the First Law of Robotics - Slashdot

Space Exploration

The little-known Soviet mission to rescue a dead space station | Ars Technica
La Nasa manque d'efficacité dans la détection des astéroïdes dangereux

Social

Common Sense

Engineering

Social engineering (security) - Wikipedia, the free encyclopedia
Studies in Intelligence: New Articles from The CIA's In-House Journal

Experiment

Albert Einstein Institution | Advancing Freedom Through Nonviolent Action
The eyeballing game

History

Warrior's 3,900 year old suit of bone armour unearthed in Omsk

Manif

Network

Philosophy

Politic

Psychology

Study: Chimpanzees Have Evolved To Kill Each Other - Slashdot

Warfare

Underground

Anonymousity

Your Digital Footprint | Internet Society
I Can Stalk U - Raising awareness about inadvertent information sharing
Treasure Map — Five Eyes Surveillance Program to Map the Entire Internet
A Munich, la police va bientôt pouvoir surveiller l'avenir | Slate.fr
Guide to Being Anonymous - United States Pirate Party
EPIC - EPIC Online Guide to Practical Privacy Tools
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying | WIRED
Planet Blue Coat: Mapping Global Censorship and Surveillance Tools
Alarming Things That Can Be Recovered - Business Insider
security.radware.com/uploadedFiles/Resources_and_Content/Attack_Tools/Shooting_Behind_the_Fence_ERT_Research_Paper.pdf
Getting rid of your online presence - Basic info - Pastebin.com
The cookie is dead. Here's how Facebook, Google, and Apple are tracking you now | VentureBeat | Mobile | by Richard Byrne Reilly

Conspiracy Theory

Cyberwar

Lockpicking

Spying

Stalking

Urban Exploration

Ruin Life Tactics - Insurgency Wiki
Re-thinking civil disobedience | Internet Policy Review
File preview - sikrit0-2-0.pdf

Defense.gov News Article: U.S. Military Conducts Airstrikes Near Sinjar, Irbil