171 private links
Ceci est la page par défaut de ce serveur web. Le serveur web fonctionne et du contenu a été ajouté.
blog
shaarli
autoblogs
my repositories
zerobin
mycryptochat
media
Vous pouvez aussi visiter mon "site étudiant".
The repository mainly contains Windows and Apple betas. These are the most popular files and are enjoyed by most of our members on the forum. We also have a games repository which has a huge selection of older and more modern game betas. We like to widen our scope a little bit too, so our repository stocks old abandonware classics from various consoles and computers from many years ago.
The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.
The URL Builder tool lets you generate URLs ready to use for Tracking Campaigns in Piwik. See the documentation about Campaign Tracking for more information.
Fill in the information in the form below and click the Generate URL button.
L’AHTI est une association née en 2000 pour encourager les travaux sur l’histoire des télécommunications et de l’informatique (TIC).
Elle a été créée à l’initiative de François du Castel et Michel Atten qui venaient de terminer un ouvrage sur l’Histoire des Ecoles supérieures de télécommunications, 1840-1997. De nombreuses personnalités du monde des TIC ont été consultées et l’AHTI a finalement été constituée en regroupant des anciens acteurs du secteur (de France Télécom bien sur, mais aussi de Bull, d’IBM, d’Alcatel, de SSII) et des historiens spécialisés du domaine.
Principal research engineer at Kudelski Security, PhD from EPFL and FHNW (2010). Presented at Black Hat, DEFCON, CCC, Troopers, SyScan, among other international conferences, I also blog and tweet.
Selected projects:
Serious Cryptography (2017): book about crypto, published by No Starch Press
SGX review (2016): research presented at Black Hat about Intel SGX
The Hash Function BLAKE (2015): book about the hash function BLAKE, published by Springer
NORX (2014): authenticated cipher candidate in the CAESAR competition
Password Hashing Competition (2013-2015): open competition that selected Argon2 as a winner
BLAKE2 (2013): hash function faster than SHA-2 and SHA-3, available in OpenSSL, Sodium, Crypto++, etc.
Cryptography Coding Standard (2013-): coding rules to prevent common weaknesses in cryptography software
SipHash (2012): keyed hash function, used in Linux, FreeBSD, OpenBSD, Python, among others
ECRYPT-CSA is a Coordination & Support Action funded by the European Union's H2020 programme. The project consists of four academic and one industrial partner.
ECRYPT-NET is a research network of six universities and two companies, as well as 7 associated companies, funded by a Marie Skłodowska-Curie ITN (Integrated Training Network) grant.
NaCl (pronounced "salt") is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl's goal is to provide all of the core operations needed to build higher-level cryptographic tools.
The current version of NaCl supports C and C++. Support for Python is a high priority.
HashKiller's purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the Internet by demonstrating the weakness of using hash based storage / authentication.
PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast.
Sylius is the first eCommerce framework. Developed with the newest methodologies and using PHP and Symfony as a foundation. Discover how easy and pleasant it is to work with it. Just enjoy being a developer again.
Welcome to slepp.ca. Presently, not a lot to see here. The goal is to finally put some wrappings around all the projects and stuff I've collected over the years. I'll likely resurrect the content from Geeks Anonymous and my other sites and toss it into here.
This package contains sample Python code that demonstrates how to use the QRadar REST API. The API is accessed by sending specially crafted HTTP requests to specific URLs on the QRadar console. These URLs, known as "endpoints", each perform a specific function. Some endpoints perform different functions depending on whether you send a GET, POST, or DELETE request. By linking together calls to these endpoints you can implement you own custom business processes or integrate QRadar data with external systems.
Discover 180+ French startups leveraging AI in a variety of applications
We believe Artificial Intelligence (AI) will usher the next revolution in technology and accelerate the disruptions in almost every industry.
FRANCE IS AI mission is to support and promote the French Artificial Intelligence ecosystem both locally and internationally, while building bridges with the other AI hubs.
At its core, the Common Weakness Enumeration (CWE™) is a list of software weaknesses types. Creating the list is a community initiative aimed at creating specific and succinct definitions for each common weakness type. By leveraging the widest possible group of interests and talents, the hope is to ensure that item in the list is adequately described and differentiated.he community using this information.
This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.
IBM® QRadar® Security Intelligence Platform provides a unified architecture for integrating security information and event management (SIEM), log management, anomaly detection, incident forensics, incident response, and configuration and vulnerability management.
Adhering to a set of 10 verifiable coding rules can make the analysis of critical software components more reliable.
Gerard J. Holzmann
NASA/JPL Laboratory for Reliable Software
Search through 1,530,557 icons or browse 35,996 icon sets.
A danbooru-style image board, designed to be easier to install, run, and extend.
Requires a standard LAMP stack as provided by any normal web host. It can also use PostgreSQL as a database, which is recommended for high-load sites.
This is probably my most popular project, with a team of 10 coders, hundreds of installations, and thousands of users online at once.
Official website: http://code.shishnet.org/shimmie2/