Monthly Shaarli

All links of one month in a single page.

June, 2017

Sucuri SiteCheck - Free Website Malware Scanner
thumbnail

Free Website Malware and Security Scanner:
Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.

It works! − chabotsi.fr

Ceci est la page par défaut de ce serveur web. Le serveur web fonctionne et du contenu a été ajouté.
blog
shaarli
autoblogs
my repositories
zerobin
mycryptochat
media

Vous pouvez aussi visiter mon "site étudiant".

ABANDONWARE FRANCE

Depuis presque 15 ans, Abandonware France propose l'une des plus grosses bases de données en Francais concernant les anciens jeux PC de 1980 à 1999.
L'équipe se décarcasse pour proposer le plus de nouveaux anciens jeux possibles, mais cela n'est pas toujours facile. D'où ce nouvel appel à l'aide.
Abandonware France proposera encore de nombreux jeux, manuels, vidéos... mais plus on est de fous, plus il y a de fiches et de jeux à télécharger.

FakeUpdate.net - Windows Update Prank by fediaFedia
thumbnail

Fake Windows Update Screens

Prank your friends and colleagues with fake update screens!
Press F11 to go fullscreen
Press ENTER to cause a BSOD

OpenC2

The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.

Free Harmonica Tabs – with audio to make them easier to learn

Here are some free harmonica tabs for beginning, intermediate and advanced harmonica players.

Harmonica tabs are easier to follow if the audio can be heard while watching the tab. The free harmonica tabs below use this method, the audio is provided with online players.

Computoser

Computoser uses an algorithm to generate music. Each generated track is a unique combination of tones, rhythm and instruments.
The algorithm is currently experimental - it may generate both good and bad pieces. Feel free to mark the ones you like and the ones you dislike, so that I know how to improve the algorithm.
The performance may sound a bit artificial - that's because it's synthesized music - a computer can hardly have the performance of a human musician.

Spotting the Adversary with Windows Event Log Monitoring (v2)

This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event log collection. Using a Windows Server 2008 R2 or above server version is recommended. There are no additional licensing costs for using the event log collection feature. The cost of using this feature is based on the amount of additional storage hardware needed to support the amount of log data collected. This factor is dependent on the number of workstations within the local log collection network.

BigQuery – Entrepôt de données pour l'analyse  |  Google Cloud Platform

GOOGLE BIGQUERY
Entrepôt de données rapide, économique et intégralement géré, destiné à l'analyse de données à grande échelle dans les entreprises

DATACENTER Internet, la pollution cachée FR 2014 - YouTube

Aujourd'hui, 247 milliards de mails transitent chaque jour par la toile. Quelle énergie le permet ? Propre en apparence, le monde virtuel est en réalité aussi .

Information by IP Address
thumbnail

InfoByIp.com provides IP detection, geolocation and weather forecast. Both IPv4 and IPv6 are supported. Geolocation determines country, state and city of the IP address as well as latitude, longitude and altitude. In addition browsers properties are shown when displayed IP is the client IP. Browser properties include user agent, screen resolution and size, color depth, list of installed plugins, local time, java and flash support.

Jean-Philippe Aumasson

Principal research engineer at Kudelski Security, PhD from EPFL and FHNW (2010). Presented at Black Hat, DEFCON, CCC, Troopers, SyScan, among other international conferences, I also blog and tweet.

Selected projects:

Serious Cryptography (2017): book about crypto, published by No Starch Press
SGX review (2016): research presented at Black Hat about Intel SGX
The Hash Function BLAKE (2015): book about the hash function BLAKE, published by Springer
NORX (2014): authenticated cipher candidate in the CAESAR competition
Password Hashing Competition (2013-2015): open competition that selected Argon2 as a winner
BLAKE2 (2013): hash function faster than SHA-2 and SHA-3, available in OpenSSL, Sodium, Crypto++, etc.
Cryptography Coding Standard (2013-): coding rules to prevent common weaknesses in cryptography software
SipHash (2012): keyed hash function, used in Linux, FreeBSD, OpenBSD, Python, among others
Free Automated Malware Analysis - File Analyzer

File Analyzer detects and analyses potential malicious executables such as:

.exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL etc)
.dll (Dynamic Link Libraries)
.vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)
.any (Available in Pro Version)

File Analyzer is based on Joe Sandbox Desktop which performs deep malware analysis. Compared to others Joe Sandbox performs static, dynamic, graph and hybrid analysis to get the most in-depth analysis possible. The captured behavior is rated and classified by one of the biggest behavior signature sets.

What about evasive malware? Joe Sandbox Desktop is the only solution which uses novel graph based algorithms to detect and spot evasive behavior. Checkout the behavior and execution graphs in the reports. To leave malware no choice for VM detection Joe Sandbox Desktop enables to analyze on bare-metal machines (e.g. on a Laptop or PC from your environment).

Beta & Abandonware Discussion & Collection - BetaArchive

The repository mainly contains Windows and Apple betas. These are the most popular files and are enjoyed by most of our members on the forum. We also have a games repository which has a huge selection of older and more modern game betas. We like to widen our scope a little bit too, so our repository stocks old abandonware classics from various consoles and computers from many years ago.

Suricata | Open Source IDS / IPS / NSM engine
thumbnail

Suricata is a free and open source, mature, fast and robust network threat detection engine. The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.

NSA OSS Technologies

THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.

URL Builder - Marketing Campaign Tracking - Analytics Platform - Piwik
thumbnail

The URL Builder tool lets you generate URLs ready to use for Tracking Campaigns in Piwik. See the documentation about Campaign Tracking for more information.

Fill in the information in the form below and click the Generate URL button.

Zero Day Initiative

The Zero Day Initiative (ZDI), founded by TippingPoint, is a program for rewarding security researchers for responsibly disclosing vulnerabilities. Depending on who you are, here are a few links to get you started:
Researchers: Learn how we pay for your vulnerability discoveries, register for the ZDI or login.
Vendors: Read our disclosure policy or join our security partner program
Press, Curiosity Seeker: Learn more about ZDI or read answers to some frequently asked questions
Please contact us at zdi [at] trendmicro [dot] com with any questions or queries. For sensitive e-mail communications, please use our PGP key.

Bulk Resize Photos

We're trying to make Bulk Resize Photos the best image resizer.

L’Association pour l’histoire des Télécommunications et de l’Informatique - Accueil

L’AHTI est une association née en 2000 pour encourager les travaux sur l’histoire des télécommunications et de l’informatique (TIC).

Elle a été créée à l’initiative de François du Castel et Michel Atten qui venaient de terminer un ouvrage sur l’Histoire des Ecoles supérieures de télécommunications, 1840-1997. De nombreuses personnalités du monde des TIC ont été consultées et l’AHTI a finalement été constituée en regroupant des anciens acteurs du secteur (de France Télécom bien sur, mais aussi de Bull, d’IBM, d’Alcatel, de SSII) et des historiens spécialisés du domaine.

coordination & support action ECRYPT-CSA | research network ECRYPT-NET

ECRYPT-CSA is a Coordination & Support Action funded by the European Union's H2020 programme. The project consists of four academic and one industrial partner.
ECRYPT-NET is a research network of six universities and two companies, as well as 7 associated companies, funded by a Marie Skłodowska-Curie ITN (Integrated Training Network) grant.

HashKiller.co.uk, Over 1.45387 trillion decrypted hashes in total, Free Hash Cracker, Online Hash Cracker

HashKiller's purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the Internet by demonstrating the weakness of using hash based storage / authentication.

Automated Malware Analysis - Joe Sandbox Reports

Malware Analysis Reports: Latest behavior analysis reports generated by Joe Sandbox
Check out our latest Analysis Reports of Evasive Malware

Windows
Android
Mac
iOS
0110100001100101011011000110110001101111

Urbex
Links
OpenNews
ZeroBin
Autoblogs
We Fight Censorship
WFC via Tor SSL
Shaarli RSS
Ecirtam via Tor SSL
Open sources

bohwaz.net - L'antre du BohwaZ

Biographie
Blog & divers
Photos
Musique
Vidéos
Ami-e-s

https://portal.msrc.microsoft.com/en-US/security-guidance

The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.

Internet Subway Map - Information Geographies

This schematic map shows a simplification of the world’s network of submarine fibre-optic cables.

develop an app with Qradar App Editor - YouTube
thumbnail

This video show how to developp a complete application within Qradar using the new Qradar Application Editor

Keylength - BSI Cryptographic Key Length Report (2017)

In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.

Free Automated Malware Analysis Service - powered by VxStream Sandbox

This webpage is a free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
This free malware analysis service is running VxStream Sandbox v6.70 in the backend. Supporting PE, Office, PDF, APK files and more (e.g. EML). Maximum upload size is 100 MB.

Download Windows 10 and Windows Server 2016 security auditing and monitoring reference from Official Microsoft Download Center
thumbnail

You can record and store security audit events for Windows 10 and Windows Server 2016 to track key system and network activities, monitor potentially harmful behaviors, and mitigate risks. You control the amount of data you collect by controlling the categories of security events you audit, for example, changes to user account and resource permissions, failed attempts to access resources, and attempts to modify system files. The reference in this download can help you decide what to monitor and how to interpret the data you collect.

RegExr: Learn, Build, & Test RegEx

RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
Results update in real-time as you type.
Roll over a match or expression for details.
Save & share expressions with others.
Use Tools to explore your results.
Browse the Library for help & examples.
Undo & Redo with Ctrl-Z / Y.
Search for & rate Community patterns.

Have you tried turning it off and on again? - The IT Crowd - Youtube
thumbnail
The Bro Network Security Monitor

While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyberinfrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.

NaCl: Networking and Cryptography library

NaCl (pronounced "salt") is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl's goal is to provide all of the core operations needed to build higher-level cryptographic tools.

The current version of NaCl supports C and C++. Support for Python is a high priority.

Отслеживание Почтовых Отправлений на . Track parcels online . Trackitonline

Track international parcels, whatever the country.