171 private links
Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software. The following licenses are sorted by the number of conditions, from most (GNU AGPLv3) to none (Unlicense). Notice that the popular licenses featured on the home page (GNU GPLv3 and MIT) fall within this spectrum.
The teaching and research areas of interest are financial management, corporate finance, financial institutions and markets, international finance, and other related topics.
My Noob Life, communauté dédiée au partage de la connaissance liée aux technologies de l'information ainsi qu'à tout ce qui s'en approche. Tout le monde peut jouir du contenu proposé et aussi y contribuer.
Le but est simple: Mettre en commun des ressources pour que tout le monde en tire profit. Les outils ci-dessous sont mis à disposition pour rendre tout cela possible.
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
This website contains a collection of my opinions, photos and, more usefully, a bunch of open source software. Mostly I write about software and my experience creating and distributing it.
Here are my most recently updated / published work:
Server side spam filtering An updated guide to getting seamless server side spam filtering using bogofilter
Web Journal My weblog/online journal
Go Techniques Some techniques I've learned for writing in Golang
Forest Bus A distributed message bus / commit log for Go, Java and Python
SimpleTAL A standalone Python HTML & XML template library
PubTal The software used to maintain OwlFish.com - builds HTML pages from text files
Additionally I've also published ExpenseClam, an Expense tracking application for Android, on Google Play.
Urbex
Links
OpenNews
ZeroBin
Autoblogs
We Fight Censorship
WFC via Tor SSL
Shaarli RSS
Ecirtam via Tor SSL
Open sources
Biographie
Blog & divers
Photos
Musique
Vidéos
Ami-e-s
Ceci est la page par défaut de ce serveur web. Le serveur web fonctionne et du contenu a été ajouté.
blog
shaarli
autoblogs
my repositories
zerobin
mycryptochat
media
Vous pouvez aussi visiter mon "site étudiant".
The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.
Here are some free harmonica tabs for beginning, intermediate and advanced harmonica players.
Harmonica tabs are easier to follow if the audio can be heard while watching the tab. The free harmonica tabs below use this method, the audio is provided with online players.
About InfoSec
InfoSec Institute is the best source for high quality information security training. We have been training Information Security and IT Professionals since 1998 with a diverse lineup of relevant training courses. In the past 16 years, over 50,000 individuals have trusted InfoSec Institute for their professional development needs!
Here's a collection of Web Services related tools for Windows, some of these support both PocketPC & Desktop variations of Windows.
Here's a collection of applications & developer tools for use with Salesforce.com, these are mostly for Mac OSX.
PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast.
Find your smartphone or tablet on the right side and head over to download the Framaroot APK and root your device.
Using framaroot is very easy and you shouldn't encounter any problem with it.
If you want to unroot your device after you've rooted it, that's also possible. You will have to flash a stock ROM and your device will be instantly unrooted.
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
La communauté FrameIP partage gratuitement ses documentations et codes source concernant le monde des réseaux TCPIP.
Visité par plus de 5000 personnes par jours, FrameIP.com nécessite un hébergement performant, une richesse des documentations et un entretient permanent.
Pour continuer à encore mieux partager, votre participation à la communauté sera la bienvenue.
Having this as hobby project I usually have time to focus on following only single malware threat at a time - now I have main focus on Locky download sites. If I read some interesting whitepaper, I will probably import some links/hashes to tracker database here and there, but in general I do not verirify or follow on those. This site is considered to be mainly research platform and directly using the data for blacklisting is not recommended. At least you should make sure to filter out with some reasonable whitelist. For example if some malware will be connecting to for example 'http://google.com/70.exe?1' (as Teslacrypt did to query connection) or to '//plus.google.com/u/0/115747778649102578052/about' or 'https://twitter.com/linketelin' (as PlugX samples d9af894d51ba61075c7cd329b0be52df, 02a175b81144b8fa22414e9cf281f71c did) then such links can be found in the listings of tracker although I am not saying the sites as such should be blocked.
ThreatMiner is designed to be an analyst's first portal to visit when doing threat research and here's why.
Threat intelligence and intrusion analysts who regularly perform research into malware and network infrastructure often find the need to rely on mutliple websites that individually holds a small piece of the larger puzzle.
Furthermore, it is often the case where pivoting directly from an open source research report is unavailable and that it is sometimes difficult to remember if an indicator has alredy been reported and/or attributed. All these small but frustrating obstacles distract an analyst from what they do best: analyse.