Informatique théorique
info-thProgrammation
progC/C++
cppLibraries
librariesIncludeOS : a performant, minimal unikernel operating system for the cloud.
http://www.includeos.org/Unikernel
https://en.wikipedia.org/wiki/UnikernelRheolef - An efficient C++ finite element environment
http://www-ljk.imag.fr/membres/Pierre.Saramito/rheolef/The ZodiacGraph – A general-purpose, circular node graph GUI written in C++ using Qt
http://www.clemens-sielaff.com/the-zodiacgraph/Mat plot vtk
http://na-wiki.csc.kth.se/mediawiki/index.php/Mat_plot_vtkGitHub - solodon4/Mach7: Pattern-matching library for C++
https://github.com/solodon4/Mach7Stdlib
stdlibvalarray - C++ Reference
http://www.cplusplus.com/reference/valarray/valarray/<numeric> - C++ Reference
http://www.cplusplus.com/reference/numeric/std::async - cppreference.com
http://fr.cppreference.com/w/cpp/thread/asyncAtomic operations library - cppreference.com
http://fr.cppreference.com/w/cpp/atomicContainers decision graphs
Concepts/Patterns
concepts-patternsExpression templates
https://en.wikipedia.org/wiki/Expression_templatesCuriously recurring template pattern
https://en.wikipedia.org/wiki/Curiously_recurring_template_patternGrammar/Lang
grammarC++14
https://en.wikipedia.org/wiki/C++14C++17
https://en.wikipedia.org/wiki/C++17Changes between C++14 and C++17
https://isocpp.org/files/papers/p0636r0.htmlC++20
https://en.wikipedia.org/wiki/C++20Constructors FAQ
http://www.informit.com/guides/content.aspx?g=cplusplus&seqNum=363The Many Meanings of the C++ “Static” Keyword
http://thesmithfam.org/blog/2010/06/12/the-many-meanings-of-the-c-static-keyword/Pointers to arrays in C
http://eli.thegreenplace.net/2010/01/11/pointers-to-arrays-in-cPointers vs. arrays in C, part 2(D)
http://eli.thegreenplace.net/2010/04/06/pointers-vs-arrays-in-c-part-2dThe many faces of operator new in C++
http://eli.thegreenplace.net/2011/02/17/the-many-faces-of-operator-new-in-cRegular cast vs. static_cast vs. dynamic_cast
https://stackoverflow.com/questions/28002/regular-cast-vs-static-cast-vs-dynamic-castUnderstanding lvalues and rvalues in C and C++
http://eli.thegreenplace.net/2011/12/15/understanding-lvalues-and-rvalues-in-c-and-cPerfect forwarding and universal references in C++
http://eli.thegreenplace.net/2014/perfect-forwarding-and-universal-references-in-c/Optimizing return values
http://marcofoco.com/?p=126memory laundering : std::launder
https://stackoverflow.com/questions/39382501/what-is-the-purpose-of-stdlaunderStructured binding declaration : auto& [a,b,c] = tuple;
http://en.cppreference.com/w/cpp/language/structured_bindingIf statement with initializer : if (init; condition)
https://skebanga.github.io/if-with-initializer/for: auto, auto&, const auto&, auto&& ?
https://blog.petrzemek.net/2016/08/17/auto-type-deduction-in-range-based-for-loops/std::optional : used as the return type of a may-fail fnct : if (auto a = f())
http://en.cppreference.com/w/cpp/utility/optionalstd::variant : type-safe union
http://en.cppreference.com/w/cpp/utility/variantaggregate initialization : Derived blah { {Base-init, …}, Derived-init, … };
http://en.cppreference.com/w/cpp/language/aggregate_initializationMove semantics and special members - Howard Hinnant
Utilities
utilitiesMetashell - C++ metaprogramming shell
http://metashell.org/GitHub - vgvassilev/cling: The interactive C++ interpreter Cling
https://github.com/vgvassilev/clingSysprog
sysprogAdvanced Linux Programming
Linux Programming Interface
openat(2) - Linux man page
http://linux.die.net/man/2/openatstrverscmp
Ressources/Blogs
ressources-blogsBlog : Standard C++
http://isocpp.org/blogOverload journal
https://accu.org/index.php/journal/overload_by_coverWrite clean and maintainable C++
http://arne-mertz.deBooks
booksThe C Programming Language, 2nd Edition
https://users.info.uvt.ro/~iordan/P_I/Ritchie-Kernighan-The_C_Programming_Language_2_ed.pdfPython
pythonHarfang3D
https://www.harfang3d.com/aboutComment utiliser yield et les générateurs en Python ?
http://sametmax.com/comment-utiliser-yield-et-les-generateurs-en-python/Un tools d’itertour, ou l’inverse
http://sametmax.com/un-tools-ditertour-ou-linverse/RunSnakeRun Python Perf Profile Graphical Viewer
http://www.vrplumber.com/programming/runsnakerun/Sorting a million 32-bit integers in 2MB of RAM using Python
http://neopythonic.blogspot.fr/2008/10/sorting-million-32-bit-integers-in-2mb.htmlScala
scalaScala
http://scala-lang.org/awesome-scala: A community driven list of useful Scala libraries, frameworks and software.
https://github.com/lauris/awesome-scalaScala Native
http://www.scala-native.org/en/latest/Assembly
assemblyApple assembly
https://developer.apple.com/library/content/documentation/DeveloperTools/Reference/Assembler/000-Introduction/introduction.html#//apple_ref/doc/uid/TP30000851-CH211-SW1Online x86 and x64 Intel Instruction Assembler
https://defuse.ca/online-x86-assembler.htmLinux System Call Table for x86 64 · Ryan A. Chapman
http://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/Web
webTechs
techsTechnical Overview - Google Chrome
https://developer.chrome.com/native-client/overviewSwig - Export C/C++ in high-level languages
http://www.swig.orgBig Web App? Compile It!
http://kripken.github.io/mloc_emscripten_talk/Main — Emscripten 1.37.10 documentation
http://kripken.github.io/emscripten-site/Google Developers Blog: Compress data more densely with Zopfli
https://developers.googleblog.com/2013/02/compress-data-more-densely-with-zopfli.htmlgpu.js - GPU Accelerated JavaScript
http://gpu.rocks/Autres techs
autres-techsStephen Wolfram's Introduction to the Wolfram Language
Mathematica & Wolfram Language Tutorial: Fast Intro for Math Students
http://www.wolfram.com/language/fast-introduction-for-math-students/en/Optimization
optimizationSoftware optimization resources
http://agner.org/optimize/HDCode
http://www.hackersdelight.org/hdcode.htm3-way XOR
http://www.clemens-sielaff.com/3-way-xor/CS Dojo - YouTube
https://www.youtube.com/channel/UCxX9wt5FWQUAAz4UrysqK9AIntroduction to Programming Systems
https://www.cs.princeton.edu/courses/archive/spr11/cos217/lectures/Applications
appComputer Vision
computer-visionOpenCV
http://opencv.org/Rapid Object Detection using a Boosted Cascade of Simple Features
A self-constructing cascade classifier with AdaBoost and SVM for pedestrian detection
Improving Haar Cascade Classifiers Through the Synthesis of New Training Examples
Train your own OpenCV Haar Classifier
http://coding-robin.de/2013/07/22/train-your-own-opencv-haar-classifier.htmlCaptcha-Solver-OpenCV-TensorFlow
https://github.com/kavishdahekar/IITG-Captcha-Solver-OpenCV-TensorFlowCascade Classifier Training - OpenCV
http://docs.opencv.org/2.4.13.2/doc/user_guide/ug_traincascade.htmlEye Tracking for Everyone
État de l'Art des Différents Systèmes de Pointage à l’Œil
Visualization & Numerical Codes
visualization-numerical-simulationRheolef - An efficient C++ finite element environment
http://www-ljk.imag.fr/membres/Pierre.Saramito/rheolef/ROOT - CERN Data analysis framework : big data processing, statistical analysis, visualisation and storage
https://root.cern.chTutoriel Code_Aster - LinuxFr.org
https://linuxfr.org/news/tutoriel-code_asterCode_Aster : codes d'EDF d'éléments finis pour l'analyse structurale, acoustique, et thermo-mécanique
https://www.code-aster.org/spip.php?rubrique1VTK - The Visualization Toolkit
https://www.vtk.orgA practical introduction to finite element method using Code_Aster Gmsh and Salome - Jean-Pierre Aubry, 357p
https://framabook.org/docs/Code_Aster/beginning_with_Code_Aster_JPAubry_20131206.pdfFreefem++
http://www.freefem.org/ff++/Cryptocurrencies
cryptocurrenciesBitcoin.fr - FAQ
https://bitcoin.fr/faq/Bitcoin Wiki
https://en.bitcoin.it/wiki/Main_PageCryptoCompare.com
https://www.cryptocompare.com/Monero (XMR)
monero-xmrGPU & CPU BENCKMARKS FOR MONERO MINING!
http://monerobenchmarks.info/GitHub - xmrig/xmrig: Monero (XMR) CPU miner
https://github.com/xmrig/xmrigHow Bitcoin Works Under the Hood
Ever wonder how Bitcoin (and other cryptocurrencies) actually work? - 3Blue1Brown
Systems
sysVirtualization
virtualisationExotic Architectures Emulation
exotic-architectures-emulationA collection of various Debian images for QEMU, e.g. for AMD64, ARM, MIPS, PPC, SH4 and SPARC
https://people.debian.org/~aurel32/qemu/Virtualization Internals
virtualization-internalsVMware - Understanding Full Virtualization, Paravirtualization and Hardware Assist
Popek, Goldberg - Formal Requirements for Virtualizable Third Generation Architectures
Bringing Virtualization to the x86 Architecture with the Original VMware Workstation
Experimental Hypervisors
experimental-hypervisorsGitHub - wbenny/hvpp: hvpp is a lightweight Intel x64/VT-x hypervisor written in C++ focused primarily on virtualization of already running operating system
https://github.com/wbenny/hvppVGA Passthrough/VFIO + KVM
vga-passthroughVirgil 3D GPU project
https://virgil3d.github.io/Reddit VFIO
https://www.reddit.com/r/VFIO/PCI passthrough via OVMF - ArchWiki
https://wiki.archlinux.org/index.php/PCI_passthrough_via_OVMFVGA Bios Collection | techPowerUp
https://www.techpowerup.com/vgabios/VFIO tips and tricks
http://vfio.blogspot.fr/GitHub - sk1080/nvidia-kvm-patcher: Fixes "Bug" in Nvidia Driver
https://github.com/sk1080/nvidia-kvm-patcherEnable Test Mode in Windows 10
https://www.linkedin.com/pulse/enable-test-mode-windows-10-ajibola-okubanjoShort report (WIP): Got the NVIDIA GPU to passthrough on an optimus laptop : VFIO
https://www.reddit.com/r/VFIO/comments/6q7bf5/short_report_wip_got_the_nvidia_gpu_to/How to pass QEMU command-line options through libvirt
http://blog.vmsplice.net/2011/04/how-to-pass-qemu-command-line-options.html[solved] Qemu drops into a UEFI shell instead of booting CDROM / Applications & Desktop Environments / Arch Linux Forums
https://bbs.archlinux.org/viewtopic.php?id=212268Virtualization Guide | openSUSE
https://doc.opensuse.org/documentation/leap/virtualization/html/book.virt/book.virt.htmlVirtualization Tuning and Optimization Guide
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html-single/Virtualization_Tuning_and_Optimization_Guide/index.htmlWhy isn't btrfs recommended for kvm? : btrfs
https://www.reddit.com/r/btrfs/comments/5p3p5d/why_isnt_btrfs_recommended_for_kvm/Extremely slow IO performance : VFIO
https://www.reddit.com/r/VFIO/comments/58qw2o/extremely_slow_io_performance/Installing the Drivers on an Installed Windows Guest Virtual Machine
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Host_Configuration_and_Guest_Installation_Guide/form-Virtualization_Host_Configuration_and_Guest_Installation_Guide-Para_virtualized_drivers-Mounting_the_image_with_virt_manager.htmlHow to resize a qcow2 harddrive images
http://www.randomhacks.co.uk/how-to-resize-a-qcow2-harddrive-images/Virtualization Security
virtualization-securityHyper-V
hyper-vTODO "Hyper-V and its memory manager": convert it to pdf using powerpoint
A Dive in to Hyper-V Architecture and Vulnerabilities
Hardening Hyper-V through offensive security research
https://i.blackhat.com/us-18/Thu-August-9/us-18-Rabet-Hardening-Hyper-V-Through-Offensive-Security-Research.pdfHypervisor Top Level Functional Specification v5.0b
VMware
vmwareThe great escapes of VMware: a retrospective case study of VMware guest to host escape vulnerabilities
https://www.blackhat.com/docs/eu-17/materials/eu-17-Mandal-The-Great-Escapes-Of-Vmware-A-Retrospective-Case-Study-Of-Vmware-G2H-Escape-Vulnerabilities.pdfExploits/PoCs
exploits-pocsGitHub - Comsecuris/vgpu_shader_pocs: PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7
https://github.com/comsecuris/vgpu_shader_pocsGitHub - guardicore/vmware_guest_auth_bypass: Proof of concept of VMSA-2017-0012
https://github.com/guardicore/vmware_guest_auth_bypassGitHub - unamer/vmware_escape: VMware Escape Exploit before VMware WorkStation 12.5.5
https://github.com/unamer/vmware_escapeSVGA 3D graphics
svga-3dCLOUDBURST: A VMware Guest to Host Escape Story - BlackHat USA 2009
http://www.blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-SLIDES.pdfGPU Virtualization on VMware’s Hosted I/O Architecture
50 Shades Of Fuzzing
https://papers.put.as/papers/macosx/2016/50_Shades_Of_Fuzzing.pdfVMware SVGA Device Developer Kit
https://sourceforge.net/p/vmware-svga/git/ci/master/tree/lib/metalkit/Wandering through the Shady Corners of VMware Workstation/Fusion
https://comsecuris.com/blog/posts/vmware_vgpu_shader_vulnerabilities/Guest RPC
guest-rpcVMware et sécurité - HSC
Zero Day Initiative — Automating VMware RPC Request Sniffing
https://www.thezdi.com/blog/2018/1/19/automating-vmware-rpc-request-sniffingLeveraging VMware's RPC Interface for Fun and Profit
https://ruxcon.org.au/assets/2017/slides/ForTheGreaterGood.pdfMisc
various-tipsInstalling Vsphere ESXi 6.5.0d with less than 4GB of RAM
https://www.techdodo.co.uk/vsphere-esxi-low-ramUNIXs
unixWhy You Can't Un-Root a Compromised Machine
https://gist.github.com/dergachev/7916152Basic Linux Privilege Escalation
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/Linux Privilege Escalation Script by 1N3 @CrowdShield · GitHub
https://gist.github.com/1N3/376f17d87b2da190ca5f31e880bd6c08Escaping Restricted Linux Shells
https://pen-testing.sans.org/blog/2012/06/06/escaping-restricted-linux-shellsBash Reference Manual: Bash Builtins
https://www.gnu.org/software/bash/manual/html_node/Bash-Builtins.htmlBack To The Future: Unix Wildcards Gone Wild
http://www.defensecode.com/public/DefenseCode_Unix_WildCards_Gone_Wild.txtFreeBSD Mastery: ZFS
http://maxim.int.ru/stuff/zfs/fmzfs%20twp%202015-05-21.pdfAbsolute OpenBSD - 2nd Edition
http://bayanbox.ir/view/4960621790255106990/Absolute-OpenBSD-2nd-Edition-2013.pdfLinux Load Averages: Solving the Mystery
http://www.brendangregg.com/blog/2017-08-08/linux-load-averages.htmlWindows
windowsWindows 10 - La console MMC
http://www.mediaforma.com/windows-10-console-mmc/PowerShell
powershellPSReadline 2.0 not working on Windows 10 1809 | >_
https://p0w3rsh3ll.wordpress.com/2019/02/07/psreadline-2-0-not-working-on-windows-10-1809/Mobile
mobileiOS
iosThe iPhone Wiki
https://www.theiphonewiki.com/wiki/Main_PageAndroid
androidmicroG Project
https://microg.org/download.htmlUnlock Android Phone with Wearable NFC
https://cdn-learn.adafruit.com/downloads/pdf/unlock-android-with-wearable-nfc.pdfNetworking & Web
netSécurité réseau
réseauNmap Cheat Sheet
https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/Tableaux de bord de la securite des réseaux
WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography
https://www.wireguard.ioWhy wireshark cannot display TLS/SSL - Wireshark Q&A
https://osqa-ask.wireshark.org/questions/34075/why-wireshark-cannot-display-tlssslRésilience de lʼInternet français - 2015
https://www.ssi.gouv.fr/uploads/2014/10/rapport_observatoire_2015.pdfPractical Packet Analysis - Using Wireshark to Solve Real-World Network Problems
Sécurité Web
webClient
clientXSS Filter Evasion Cheat Sheet
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_SheetXSS Games
https://xss-game.appspot.com/RequestBin — Collect, inspect and debug HTTP requests and webhooks
https://requestb.in/Mockbin
http://mockbin.orgServer
serveurPHP Security Cheat Sheet
https://www.owasp.org/index.php/PHP_Security_Cheat_SheetLes PATH truncations: The old one - Daily Security
https://www.dailysecurity.fr/les-path-truncations/SQL Injection
sql-injectionphp - SQL injection that gets around mysql_real_escape_string()
https://stackoverflow.com/questions/5741187/sql-injection-that-gets-around-mysql-real-escape-stringBlind SQL Injection
blind-sql-injectionSANS Penetration Testing | Making Blind SQL Injection More Efficient
https://pen-testing.sans.org/blog/2011/10/31/making-blind-sql-injection-more-efficient-new-toolA faster method than Blind SQL Injection? - Information Security Stack Exchange
https://security.stackexchange.com/questions/15953/a-faster-method-than-blind-sql-injectionSQL Injection by truncation
sql-injection-by-truncationSQL Truncation Attack
http://resources.infosecinstitute.com/sql-truncation-attack/SQL Injection Cheat Sheet
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/#StringwithoutQuotesReading and Writing Files | NetSPI SQL Injection Wiki
https://sqlwiki.netspi.com/attackQueries/readingAndWritingFiles/#mysqlSQLi filter evasion cheat sheet (MySQL) | Reiners' Weblog
https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/Exploiting hard filtered SQL Injections | Reiners' Weblog
https://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/NoSQL Injection
nosql-injectionNo SQL, No Injection?
https://arxiv.org/ftp/arxiv/papers/1506/1506.04082.pdfNoSQL Injection - Fun with objects and arrays
https://www.owasp.org/images/e/ed/GOD16-NOSQL.pdfLes NOSQL injections Classique et Blind: Never trust user input - Daily Security
https://www.dailysecurity.fr/nosql-injections-classique-blind/LDAP Injection
ldap-injectionfailles_web:ldap_injection [Zenk - security]
https://wiki.zenk-security.com/doku.php?id=failles_web:ldap_injection#injection_de_base_sur_authentification_username_passwordXpath Injection
xpath-injectionfailles_web:xpath_injection [Zenk - security]
https://wiki.zenk-security.com/doku.php?id=failles_web:xpath_injectionTesting for XPath Injection
https://www.owasp.org/index.php/Testing_for_XPath_Injection_(OTG-INPVAL-010)XPath Examples
https://msdn.microsoft.com/en-us/library/ms256086(v=vs.110).aspxXPath Syntax
https://www.w3schools.com/xml/xpath_syntax.asp{ Better } Hacker: Command Injection Without Spaces
http://www.betterhacker.com/2016/10/command-injection-without-spaces.htmlAdapter le concept de la Zip Bomb pour défendre son site web des scripts kiddies
https://korben.info/adapter-concept-de-zip-bomb-defendre-site-web-scripts-kiddies.htmlGitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
https://github.com/swisskyrepo/PayloadsAllTheThingsWebshells
webshellsGitHub - epinna/weevely3: Weaponized web shell
https://github.com/epinna/weevely3GitHub - flozz/p0wny-shell: Single-file PHP shell
https://github.com/flozz/p0wny-shellFile Operation Induced Unserialization via the “phar://” Stream Wrapper
https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It's-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdfGitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
https://github.com/swisskyrepo/PayloadsAllTheThingsProtocols
protocolesPoint-to-point protocol over Ethernet
https://en.wikipedia.org/wiki/Point-to-point_protocol_over_EthernetMultiprotocol Encapsulation over ATM
https://en.wikipedia.org/wiki/Multiprotocol_Encapsulation_over_ATMGlobal networking
globalBorder Gateway Protocol
https://en.wikipedia.org/wiki/Border_Gateway_ProtocolBGP : Stealing the Internet
https://defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdfHébergement
hébergementChatons
https://chatons.orgComputer Networks - A. Tanenbaum - 5th edition
Réseaux et télécoms - Cours, Claude Servin
Initiation aux réseaux - Cours, Guy Pujolle
Menaces sur le réseau : guide pratique des attaques passives et indirectes
Routing protocols for ad hoc networks, Dmitri A. Moltchanov
https://www.cs.tut.fi/courses/TLT-2756/lect05.pdfHardware & Low level
hardwareArchitecture des ordinateurs
archiISE4/EE4/MSc Synthesis of Digital Architectures : Architectural Synthesis - G. Constantinides
http://cas.ee.ic.ac.uk/people/gac1/Synthesis/ISE4/EE4/MSc Synthesis - Lecture slides
http://cas.ee.ic.ac.uk/people/gac1/Synthesis/Introduction à VHDL, Tanguy Risset, INSA Lyon
http://perso.citi.insa-lyon.fr/trisset/cours/MAC-TC/cours-VHDL.pdfTemplate:CPU technologies
https://en.wikipedia.org/wiki/Template:CPU_technologiesOne instruction set computer
https://en.wikipedia.org/wiki/One_instruction_set_computerGPUs NVIDIA
gpus-nvidiaGitHub - envytools/envytools: Tools for people envious of nvidia's blob driver.
https://github.com/envytools/envytoolsenvytools — envytools git documentation
https://envytools.readthedocs.io/en/latest/PTX ISA :: CUDA Toolkit Documentation
https://docs.nvidia.com/cuda/parallel-thread-execution/index.htmlTelecommunication security
telecommunications-securityKeystroke Recognition Using WiFi Signals
https://www.sigmobile.org/mobicom/2015/papers/p90-aliA.pdfUSBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
https://cyber.bgu.ac.il/t/USBee.pdfDEF CON 18 - Chris Paget - Practical Cellphone Spying
Practical Cellphone Spying - Slides
http://index-of.es/Miscellanous/LIVRES/cellphonespying.pdfVulnerabilities of Signaling System Number 7 (SS7) to cyber attacks and how to mitigate Againt these vulnerabilities
http://wiredspace.wits.ac.za/jspui/bitstream/10539/20048/2/Final%20Research%20Report.pdfHacking mobile network via SS7: interception, shadowing and more
http://secuinside.com/archive/2015/2015-2-7.pdfMartin Kacer, Philippe Langlois : SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks - Slides
https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdfSS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks - Paper
https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdfPhilippe Langlois : Toward the HLR, attacking the SS7 & SIGTRAN applications.
https://www.h2hc.com.br/repositorio/2009/files/Philippe.en.pdfSignaling System 7 (SS7) Security Report
https://www.ptsecurity.com/upload/ptcom/SS7_WP_A4.ENG.0036.01.DEC.28.2014.pdfOpenBTS | Open Source Cellular Infrastructure
http://openbts.org/Security in the GSM network
https://ipsec.pl/files/ipsec/security_in_the_gsm_network.pdfDecrypting GSM phone calls – Security Research Labs
https://srlabs.de/bites/decrypting-gsm/Files - A5/1 Decryption - SRLabs Open Source Projects
https://opensource.srlabs.de/projects/a51-decrypt/filesSMS zero
Breaking The GSM A5/1 Cryptography Algorithm with Rainbow Tables and High-end FPGAs
http://www.fpl2012.org/Presentations/F2C2.pdfGSM network and its privacy - the A5 stream cipher
P1 Security
http://www.p1sec.com/corp/Threats and Countermeasures in GSM Networks
JavaScript PDU Mode SMS Decoder
https://smspdu.benjaminerhart.com/Open Hardware
open-hardwareLibreboot
https://libreboot.org/Supported Motherboards - coreboot
https://www.coreboot.org/Supported_MotherboardsPINEBOOK – PINE64
https://www.pine64.org/?page_id=3707China's Loongson makes a 64-bit Mips processor that runs x86 and ARM code | VentureBeat | Business | by Dean Takahashi
https://venturebeat.com/2015/09/03/chinas-loongson-makes-a-64-bit-mips-processor-that-can-run-x86-and-arm-code/Rhombus-Tech
http://rhombus-tech.net/GitHub - osresearch/heads: A minimal Linux that runs as a coreboot ROM payload to provide a secure, flexible boot environment for laptops and servers.
https://github.com/osresearch/headsScreen
screenLCD test
http://www.lagom.nl/lcd-test/Storage
storageHard drives
hard-drivesPerpendicular recording
https://en.wikipedia.org/wiki/Perpendicular_recordingHeat-assisted magnetic recording
https://en.wikipedia.org/wiki/Heat-assisted_magnetic_recordingMagnetic cards
magnetic-cardsMagnetic stripe reader/writer ressources - L. Padilla
http://www.gae.ucm.es/~padilla/extrawork/stripe.htmlApp note for the AN10E40 - Magnetic Stripe Read Head Amplifier
Stripe Snoop
http://stripesnoop.sourceforge.netRetro archs
retroporn
https://de.wikipedia.org/wiki/Benutzer:Appaloosa/Hardware-BilderSun
sunSun NVRAM Fix
https://gigawa.lt/gigawa.lt/Sun_NVRAM.htmlSun NVRAM Fix
SGI
sgisgistuff
http://www.sgistuff.net/ARCS (computing)
https://en.wikipedia.org/wiki/ARCS_(computing)Download IRIX CDs
https://archive.org/search.php?query=sgi+irixSGI IRIX 6.5: Remote install using GNU/Linux install server
http://techpubs.spinlocksolutions.com/irix/remote-irix-6.5-installation-from-linux.htmlNekochan SGI Wiki
http://www.nekochan.net/wiki/Main_PageInstalling IRIX 6.5 on an SGI O2
http://www.andrewhazelden.com/blog/2010/07/installing-irix-6-5-on-an-sgi-o2/DINA - deBugs IRIX Netboot Appliance
http://shiftleft.com/mirrors/dina.harrydebug.com/WinWorld: IRIX 6.5
https://winworldpc.com/product/irix/65Obsolete : Booting the IRIX Installation from CD
https://software.majix.org/irix/install-bootcd.shtmlVAX
vaxVaxHaven
http://vaxhaven.com/VaxHavenOpenVMS System Manager's Manual
https://www.itec.suny.edu/scsys/vms/ovmsdoc073/v73/6017/6017pro_contents.htmlTransputer
https://en.wikipedia.org/wiki/TransputerCrypto
cryptoNitrokey | Secure your digital life
https://www.nitrokey.com/Low level security
low-level-securityBuffer overflow
stack-overflowc - Sending arbitrary bytes to fgets from stdin - Stack Overflow
https://stackoverflow.com/questions/36185321/sending-arbitrary-bytes-to-fgets-from-stdindelimiter - Cat EOF shell script not working as intended? - Stack Overflow
https://stackoverflow.com/questions/43476812/cat-eof-shell-script-not-working-as-intendedLinux 64-bit Buffer Overflow Tutorial
http://www.therabb1thole.co.uk/tutorial/linux-64-bit-buffer-overflow-tutorial/Architecture-Specific
architecture-specificUne faille critique sur les anciens processeurs x86 - Numerama
http://www.numerama.com/magazine/33898-une-faille-critique-sur-les-anciens-processeurs-x86.htmlSafeSpec, Banishing the Spectre of a Meltdown with Leakage-Free Speculation
ROP
ropROP course lecture (master CSI Bordeaux, 2014)
RopShell - Free Online ROP Gadgets Search
http://ropshell.comGitHub - ROPgadget
https://github.com/JonathanSalwan/ROPgadgetoh-my-scanf: scanf abuse for arbitrary memory write in ROP context
https://github.com/VulnHub/ctf-writeups/blob/master/2014/advent-ctf/oh-my-scanf.mdUEFI
uefiUEFI : Bootkits
https://www.sstic.org/media/SSTIC2013/SSTIC-actes/uefi_et_bootkits_pci/SSTIC2013-Slides-uefi_et_bootkits_pci-chifflier.pdfUEFI et bookits PCI : le danger vient d'en bas
https://www.ssi.gouv.fr/uploads/IMG/pdf/uefi-pci-bootkits_sstic_article_fr.pdfWriting and Debugging EBC Drivers
Unified Extensible Firmware Interface Specification v2.5
Programming UEFI for dummies
UEFI and Dreamboot
Ressources
ressourcesShellcodes database for study cases
http://shell-storm.org/shellcode/The Shellcoder’s Handbook
Misc
miscThe reasons why 64-bit programs require more stack memory | Intel
https://software.intel.com/en-us/blogs/2010/07/01/the-reasons-why-64-bit-programs-require-more-stack-memory/End-of-file
https://en.wikipedia.org/wiki/End-of-fileFeed binary stdin from inside gdb
https://dustri.org/b/feed-binary-stdin-from-inside-gdb.htmlLow level security
http://www.cs.umd.edu/~awruef/HackNYWorkshop.pdfTODO Rajouter recherche de vulns
Online x86 and x64 Intel Instruction Assembler
https://defuse.ca/online-x86-assembler.htmshell-storm | Online Assembler and Disassembler
http://shell-storm.org/online/Online-Assembler-and-Disassembler/Linux System Call Table for x86 64 · Ryan A. Chapman
https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/Shellcoding
shellcodingshell-storm | Shellcodes Database
http://shell-storm.org/shellcode/c - shellcode: pass arguments to execve in x86_64 assembly - Stack Overflow
https://stackoverflow.com/questions/19502555/shellcode-pass-arguments-to-execve-in-x86-64-assemblyARM-TODO
arm-todoLangage assembleur - Exemple de l’assembleur ARM, Tarik Graba, Télécom ParisTech
https://se202.rfc1149.net/arm_asm.pdfTODO shellcoders handbook
Interfaces
interfacesInterfacing the Standard Parallel Port
http://retired.beyondlogic.org/spp/parallel.pdfMatériel réseau
matériel-réseauCisco
ciscoPassword Recovery Procedure for the Cisco 2600 and 2800 Series Routers - Cisco
https://www.cisco.com/c/en/us/support/docs/routers/2600-series-multiservice-platforms/22188-pswdrec-2600.htmlIFM - Cisco IOS Enable Secret Type 5 Password Cracker
http://www.ifm.net.nz/cookbooks/cisco-ios-enable-secret-password-cracker.htmlShort Message service center
https://en.wikipedia.org/wiki/Short_Message_service_centerCell Phones
cell-phonesXiaomi bootloader unlock is a pain
xiaomiApply for unlocking Mi phones
http://www.miui.com/unlock/index_en.htmlWanted to unlock, reached maximum SMS, how long blocked now?
http://en.miui.com/thread-781915-1-1.htmlXiaomi's locked bootloader is insecure and useless · GitHub
https://gist.github.com/trietptm/3d789ba61ad767bd4efd9aab36edd982GitHub - mc-17/xiaomi-bootloader: Xiaomi BL research
https://github.com/mc-17/xiaomi-bootloaderSécurité
securityGeneralities
gen-secThe InfoSec Handbook - An Introduction to Information Security
Securité Informatique - Ethical Hacking
Computer Systems Security | MIT OpenCourseWare
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/index.htmTools
toolsHex to ASCII text converter
http://www.rapidtables.com/convert/number/hex-to-ascii.htmdCode - Solveurs, Crypto, Maths, Décodage, Outils en ligne
http://www.dcode.fr/Pentesting
pentestingLynis - Security auditing tool for Unix/Linux systems
https://cisofy.com/lynis/Nmap: the Network Mapper
https://nmap.org/Penetration Testing Software | Metasploit
https://www.metasploit.com/SSL Server Test
https://www.ssllabs.com/ssltest/pentestmonkey | Taking the monkey work out of pentesting
http://pentestmonkey.net/A Penetration Tester's Guide to IPMI and BMCs
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmiTests d’intrusion : L’approche Red Team
https://www.synetis.com/2015/11/18/tests-dintrusion-lapproche-red-team/Malware
malwareVirologie
virologieOpen Malware
http://openmalware.org/How to find malware? : /r/Malware
https://www.reddit.com/r/Malware/comments/2id252/how_to_find_malware/See rep0s category for more
reverse.it - Free Automated Malware Analysis Service
https://www.reverse.it/Malwares | Ensimag
Cryptanalysis & Encryption
cryptRSA
rsaEverything about nothing: RSA parameters in PEM file...
http://sgros.blogspot.fr/2012/12/rsa-parameters-in-pem-file.htmlopenssl - RSA: Get exponent and modulus given a public key - Stack Overflow
https://stackoverflow.com/questions/3116907/rsa-get-exponent-and-modulus-given-a-public-keyencryption - RSA public key and private key lengths - Information Security Stack Exchange
https://security.stackexchange.com/questions/90169/rsa-public-key-and-private-key-lengthsASN.1 Parser | phpseclib
http://phpseclib.sourceforge.net/x509/asn1parse.phpGitHub - Ganapati/RsaCtfTool: RSA tool for ctf - retreive private key from weak public key and/or uncipher data
https://github.com/Ganapati/RsaCtfToolfactordb.com | CrackStation-like for big primes factorization
http://www.factordb.com/Crypto.PublicKey.RSA python
https://www.dlitz.net/software/pycrypto/api/current/Crypto.PublicKey.RSA-module.htmlLe journal d'un reverser: Playing with RSA and python
http://0x90909090.blogspot.fr/2015/10/playing-with-rsa-and-python.htmlCrackStation
https://crackstation.net/quipqiup - cryptoquip and cryptogram solver
http://quipqiup.com/Cryptographie et cryptanalyse : Ars Cryptographica
https://www.apprendre-en-ligne.net/crypto/menu/index.htmldCode - Solveurs, Crypto, Maths, Décodage, Outils en ligne
http://www.dcode.fr/Stocker des Bitcoin de façon sûre
https://desfontain.es/blog/stockage-securise-de-bitcoins.htmlLogJam Attack (real-time breaking of weak Diffie-Hellman key exchange) - Computerphile
Forensic
forensicTestDisk
http://www.cgsecurity.org/wiki/TestDiskForensicsWiki
http://www.forensicswiki.orgVolatility : An advanced memory forensics framework
https://github.com/volatilityfoundation/volatilityThe Art of Memory Forensics
https://news.asis.io/sites/default/files/The%20Art%20of%20Memory%20Forensics.pdfSteganography
steganographieBasic methods of Audio Steganography (spectrograms)
https://solusipse.net/blog/post/basic-methods-of-audio-steganography-spectrograms/Stegosploit : Exploit Delivery via Steganography and Polyglots
http://stegosploit.info/Angecryption
Cyberdefense
cyberdefenseAttributing Cyber Attacks
https://ridt.co/d/rid-buchanan-attributing-cyber-attacks.pdfTODO Thomas Rid
Trove of Stolen NSA Data Is ‘Devastating’ Loss for Intelligence Community – Foreign Policy
https://foreignpolicy.com/2017/04/17/trove-of-stolen-nsa-data-is-devastating-loss-for-intelligence-community/Links-to-afraid-people
links-to-afraid-peopleGmail : Google accepte de changer sa méthode d'analyse des courriels pour des fins publicitaires
http://www.developpez.com/actu/108690/Gmail-Google-accepte-de-changer-sa-methode-d-analyse-des-courriels-pour-des-fins-publicitaires-apres-avoir-ete-accuse-d-avoir-lu-des-communications/Les instances MongoDB prises en otage sont passées de 12 000 à plus de 27 000 en moins de 12 heures
http://www.developpez.com/actu/111134/Les-instances-MongoDB-prises-en-otage-sont-passees-de-12-000-a-plus-de-27-000-en-moins-de-12-heures-d-apres-un-chercheur/Facebook travaille sur une interface cerveau-machine pour lire les pensées
https://www.developpez.com/actu/131441/Facebook-travaille-sur-une-interface-cerveau-machine-pour-lire-les-pensees-et-utiliser-des-applications-de-messagerie-et-de-realite-augmentee/Un hacker vole 900 Go de données au spécialiste du hack sur mobile Cellebrite
http://www.developpez.com/actu/111896/Un-hacker-vole-900-Go-de-donnees-au-specialiste-du-hack-sur-mobile-Cellebrite-l-entreprise-recommande-aux-utilisateurs-de-changer-leurs-MdP/Un programme de reconnaissance faciale d'une startup russe permet d'identifier un inconnu dans la rue instantanément
https://www.developpez.com/actu/99378/Un-programme-de-reconnaissance-faciale-d-une-startup-russe-permet-d-identifier-un-inconnu-dans-la-rue-instantanement-juste-en-prenant-sa-photo/Apparatus and method for preventing switching from a channel during an advertisement display
http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220060070095%22.PGNR.&OS=DN/20060070095&RS=DN/20060070095Le wifi pour mesurer les flux à Rennes
http://www.letelegramme.fr/economie/commerce-le-wifi-pour-mesurer-les-flux-a-rennes-09-02-2017-11393947.phpStable Multi-Target Tracking in Real-Time Surveillance Video
Tracking par les émissions Wifi et Bluetooth
https://tuxicoman.jesuislibre.net/2015/10/tracking-par-les-emissions-wifi-et-bluetooth.htmlExploiter la chaleur des doigts pour révéler le code de verrouillage de votre smartphone
https://www.developpez.com/actu/123321/Exploiter-la-chaleur-des-doigts-pour-reveler-le-code-de-verrouillage-de-votre-smartphone-des-chercheurs-y-sont-parvenus/Le piratage d'une énorme base de données corporate cause une fuite des données personnelles
https://www.developpez.com/actu/123753/Le-piratage-d-une-enorme-base-de-donnees-corporate-cause-une-fuite-des-donnees-personnelles-de-33-millions-d-employes-americains/Vault 7 : Wikileaks dévoile l'arsenal informatique de la CIA
https://www.developpez.com/actu/121874/Vault-7-Wikileaks-devoile-l-arsenal-informatique-de-la-CIA-l-agence-est-capable-de-contourner-le-chiffrement-de-WhatsApp/La CIA aurait-elle installé des implants malveillants sur les iPhone depuis la chaîne d'approvisionnement ?
https://www.developpez.com/actu/125286/La-CIA-aurait-elle-installe-des-implants-malveillants-sur-les-iPhone-depuis-la-chaine-d-approvisionnement-C-est-ce-qu-indique-WikiLeaks/USA : les fournisseurs d'accès internet libres de vendre aux annonceurs l'historique de navigation des internautes
https://www.developpez.com/actu/126841/USA-les-fournisseurs-d-acces-internet-libres-de-vendre-aux-annonceurs-l-historique-de-navigation-des-internautes-sans-leur-consentement/A description of the Penetrating Hard Targets project - The Washington Post
https://www.washingtonpost.com/apps/g/page/world/a-description-of-the-penetrating-hard-targets-project/691/Mais avec qui communique l'application Android Izly?
https://blog.grunblatt.org/mais-avec-qui-communique-lapplication-android-izly.htmlInsecam - World biggest online cameras directory
http://www.insecam.org/Chiffrement : le gouvernement australien plaide pour l'installation de portes dérobées
https://www.developpez.com/actu/146475/Chiffrement-le-gouvernement-australien-plaide-pour-l-installation-de-portes-derobees-et-espere-convaincre-l-alliance-Five-Eyes-de-le-suivre/Amazon obtient le brevet d'un système permettant d'empêcher la comparaison des prix en ligne au sein de ses boutiques physiques
https://www.developpez.com/actu/144773/Amazon-obtient-le-brevet-d-un-systeme-permettant-d-empecher-la-comparaison-des-prix-en-ligne-au-sein-de-ses-boutiques-physiques/Telegram : les services de renseignement US ont tenté de soudoyer ses développeurs pour affaiblir leur chiffrement
https://www.developpez.com/actu/144448/Telegram-les-services-de-renseignement-US-ont-tente-de-soudoyer-ses-developpeurs-pour-affaiblir-leur-chiffrement-d-apres-le-fondateur-de-la-societe/Vault7 : WikiLeaks révèle que le projet CherryBlossom de la CIA permettait de surveiller les internautes
https://www.developpez.com/actu/144408/Vault7-WikiLeaks-revele-que-le-projet-CherryBlossom-de-la-CIA-permettait-de-surveiller-les-internautes-de-nouveaux-documents-publies/L'Allemagne envisage de surveiller les communications chiffrées et prendre les empreintes digitales des mineurs
https://www.developpez.com/actu/144278/Face-a-la-menace-terroriste-l-Allemagne-envisage-de-surveiller-les-communications-chiffrees-et-prendre-les-empreintes-digitales-des-mineurs/Industroyer : un malware conçu pour prendre le contrôle des lignes électriques est celui qui a récemment plongé Kiev dans le noir
https://www.developpez.com/actu/143577/Industroyer-un-malware-concu-pour-prendre-le-controle-des-lignes-electriques-est-celui-qui-a-recemment-plonge-Kiev-dans-le-noir/L'UE veut donner à la police un accès direct aux données hébergées dans le cloud pour faire face à la montée du terrorisme
https://www.developpez.com/actu/142635/Vie-privee-l-UE-veut-donner-a-la-police-un-acces-direct-aux-donnees-hebergees-dans-le-cloud-pour-faire-face-a-la-montee-du-terrorisme/Printer steganography
https://en.wikipedia.org/wiki/Printer_steganographyUn hacker réussit à contourner la sécurité d'une arme à feu intelligente et déclencher un tir sans autorisation
https://www.developpez.com/actu/152306/Un-hacker-reussit-a-contourner-la-securite-d-une-arme-a-feu-intelligente-et-declencher-un-tir-sans-autorisation/Comment les apps Figaro, L'Équipe ou Closer participent au pistage de 10 millions de Français (localisation tous les 3min)
http://www.numerama.com/politique/282934-enquete-comment-les-apps-figaro-lequipe-ou-closer-participent-au-pistage-de-10-millions-de-francais.htmlLa NSA aurait découvert l'identité réelle de Satoshi Nakamoto, le mystérieux créateur du Bitcoin
https://www.developpez.com/actu/157522/La-NSA-aurait-decouvert-l-identite-reelle-de-Satoshi-Nakamoto-le-mysterieux-createur-du-Bitcoin/L'annuaire inversé universel de Facebook - Korben
https://korben.info/annuaire-inverse-universel-de-facebook-06.htmlUSA : 465 000 stimulateurs cardiaques vulnérables à des cyberattaques rappelés par les autorités pour l'application de patchs de sécurité
https://www.developpez.com/actu/158000/USA-465-000-stimulateurs-cardiaques-vulnerables-a-des-cyberattaques-rappeles-par-les-autorites-pour-l-application-de-patchs-de-securite/USA : comment la NSA arrive à espionner les déplacements de tous les véhicules
https://www.developpez.com/actu/158050/USA-comment-la-NSA-arrive-a-espionner-les-deplacements-de-tous-les-vehicules-une-autre-revelation-de-l-entrepreneur-americain-Alexander-Muse/Royaume-Uni : bilan catastrophique pour une expérience de vidéosurveillance « intelligente »
http://www.lemonde.fr/pixels/article/2017/09/01/royaume-uni-bilan-catastrophique-pour-une-experience-de-videosurveillance-intelligente_5179761_4408996.htmlEtudiants à Rennes. Après la polémique, le Crous renonce aux lits connectés
http://www.ouest-france.fr/bretagne/rennes-35000/etudiants-rennes-lits-connectes-le-crous-arrete-tout-5229988Une faille de sécurité dans les assistants vocaux populaires permet de mener des attaques par l'envoi de commandes vocales inaudibles
https://www.developpez.com/actu/159387/Une-faille-de-securite-dans-les-assistants-vocaux-populaires-permet-de-mener-des-attaques-par-l-envoi-de-commandes-vocales-inaudibles/Un serveur mal configuré par SVR Tracking expose plus d'un demi-million de véhicules suivis par l'entreprise
https://www.developpez.com/actu/161887/Un-serveur-mal-configure-par-SVR-Tracking-expose-plus-d-un-demi-million-de-vehicules-suivis-par-l-entreprise-alerte-Kromtech-Security-Center/En Chine, des caméras devinent qui sont les passants dans la rue
http://www.lemonde.fr/asie-pacifique/video/2017/09/28/en-chine-des-cameras-devinent-qui-sont-les-passants-dans-la-rue_5193010_3216.htmlFrance : les députés approuvent la saisie de matériel informatique et la copie de données d'un suspect, dans le cadre de la lutte contre le terrorisme
https://www.developpez.com/actu/162736/France-les-deputes-approuvent-la-saisie-de-materiel-informatique-et-la-copie-de-donnees-d-un-suspect-dans-le-cadre-de-la-lutte-contre-le-terrorisme/Bercy simule une opération de phishing et plus de 30 000 de ses agents tombent dans le piège en l'espace de 2 h seulement
https://www.developpez.com/actu/163727/Mois-de-la-cybersecurite-Bercy-simule-une-operation-de-phishing-et-plus-de-30-000-de-ses-agents-tombent-dans-le-piege-en-l-espace-de-2-h-seulement/Grande-Bretagne : le gouvernement veut emprisonner toute personne regardant un contenu terroriste pour lutter contre l'extrémisme en ligne
https://www.developpez.com/actu/163819/Grande-Bretagne-le-gouvernement-veut-emprisonner-toute-personne-regardant-un-contenu-terroriste-pour-lutter-contre-l-extremisme-en-ligne/Arguments contre Microsoft - Sebsauvage
http://sebsauvage.net/wiki/doku.php?id=microsoftUn site continue à miner de la cryptomonnaie même lorsque vous fermez la page principale, en cachant une fenêtre derrière la barre des tâches
https://www.developpez.com/actu/176373/Un-site-continue-a-miner-de-la-cryptomonnaie-meme-lorsque-vous-fermez-la-page-principale-en-cachant-une-fenetre-derriere-la-barre-des-taches/Breaking the x86 Instruction Set - Black Hat
Chinese Street surveillance. Object / Face Recognition
Surveillance de masse : La Chine passe à la vitesse supérieure
À cause d'une ligne de code, des milliers de personnes se sont retrouvées dans des prisons en Turquie !
https://www.developpez.com/actu/185177/A-cause-d-une-ligne-de-code-des-milliers-de-personnes-se-sont-retrouvees-dans-des-prisons-en-Turquie-Le-cauchemar-de-la-nation-est-numerique/Coincheck, la plateforme d'échange, a été victime d'un piratage de plus de 500 millions $
https://www.developpez.com/actu/184982/Coincheck-la-plateforme-d-echange-a-ete-victime-d-un-piratage-de-plus-de-500-millions-releguant-MtGox-a-la-2e-place-parmi-les-plus-gros-vols/Meltdown et Spectre : Intel recommande l'arrêt du déploiement des correctifs
https://www.developpez.com/actu/183949/Meltdown-et-Spectre-Intel-recommande-l-arret-du-deploiement-des-correctifs-des-soucis-avec-la-microarchitecture-Ivy-Bridge-et-suivantes/Des hackers pourraient avoir volé les données médicales de la moitié de la population norvégienne, les autorités essayent de rassurer
https://www.developpez.com/actu/183846/Des-hackers-pourraient-avoir-vole-les-donnees-medicales-de-la-moitie-de-la-population-norvegienne-les-autorites-essayent-de-rassurer/AMD PSP : le module cryptographique est affecté par une vulnérabilité, un dépassement de pile qui mène à son contrôle total
https://www.developpez.com/actu/181743/AMD-PSP-le-module-cryptographique-est-affecte-par-une-vulnerabilite-un-depassement-de-pile-qui-mene-a-son-controle-total/Annonce d'une faille de sécurité dans macOS, la quasi-totalité des moutures de l'OS seraient affectées
https://www.developpez.com/actu/181240/Apple-inaugure-le-Nouvel-An-avec-l-annonce-d-une-faille-de-securite-dans-macOS-la-quasi-totalite-des-moutures-de-l-OS-seraient-affectees/Vulnerabilities in Insulin Pumps Can Lead to Overdose
https://threatpost.com/vulnerabilities-in-insulin-pumps-can-lead-to-overdose/121064/La Chine équipe ses policiers de lunettes avec reconnaissance faciale
http://www.frandroid.com/produits-android/lunettes-intelligentes/487179_tous-aux-abris-la-chine-equipe-ses-policiers-de-lunettes-avec-reconnaissance-facialeEtats-Unis: Une université distribue des capteurs d'activités physiques à ses étudiants
https://www.20minutes.fr/insolite/1778683-20160202-etats-unis-universite-distribue-capteurs-activites-physiques-etudiantsLeaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero users
http://securityaffairs.co/wordpress/68684/digital-id/nsa-memo-anonymizing-systems.htmlIoT : des pirates s'appuient sur le thermostat connecté d'un aquarium pour pénétrer le réseau d'un casino et extirper 10 Go de data
https://www.developpez.com/actu/198106/IoT-des-pirates-s-appuient-sur-le-thermostat-connecte-d-un-aquarium-pour-penetrer-le-reseau-d-un-casino-et-extirper-10-Go-de-data/Des hackers construisent une carte-clé maîtresse pour ouvrir des millions de chambres d'hôtel, grâce à une faille dans les serrures d'un fabricant
https://www.developpez.com/actu/200560/Des-hackers-construisent-une-carte-cle-maitresse-pour-ouvrir-des-millions-de-chambres-d-hotel-grace-a-une-faille-dans-les-serrures-d-un-fabricant/Des vulnérabilités critiques affectant des voitures BMW dévoilées, certaines d'entre elles sont exploitables à distance
https://www.developpez.com/actu/205359/Des-vulnerabilites-critiques-affectant-des-voitures-BMW-devoilees-certaines-d-entre-elles-sont-exploitables-a-distance/Un lycée chinois se sert de la reconnaissance faciale pour déterminer l'attention des élèves pendant les cours, afin d'améliorer l'enseignement
https://www.developpez.com/actu/206251/Un-lycee-chinois-se-sert-de-la-reconnaissance-faciale-pour-determiner-l-attention-des-eleves-pendant-les-cours-afin-d-ameliorer-l-enseignement/USA : des hackers auraient piraté un système de gestion de carburant d'une station-service, avant d'emporter 600 gallons de carburant
https://www.developpez.com/actu/213936/USA-des-hackers-auraient-pirate-un-systeme-de-gestion-de-carburant-d-une-station-service-avant-d-emporter-600-gallons-de-carburant/Thermanator : nouvelle forme d'attaque cybercriminelle de vol de mot de passe, qui exploite l'énergie thermique résiduelle laissée sur les claviers
https://www.developpez.com/actu/214216/Thermanator-nouvelle-forme-d-attaque-cybercriminelle-de-vol-de-mot-de-passe-qui-exploite-l-energie-thermique-residuelle-laissee-sur-les-claviers/Des chercheurs mettent en oeuvre une attaque efficace par usurpation de GPS et réussissent à tromper facilement les humains
https://www.developpez.com/actu/215172/Des-chercheurs-mettent-en-oeuvre-une-attaque-efficace-par-usurpation-de-GPS-et-reussissent-a-tromper-facilement-les-humains/USA : un fournisseur installe une application d'accès à distance sur des systèmes de vote et ravive les doutes sur la crédibilité des élections
https://www.developpez.com/actu/215576/USA-un-fournisseur-installe-une-application-d-acces-a-distance-sur-des-systemes-de-vote-et-ravive-les-doutes-sur-la-credibilite-des-elections/Une faille de sécurité de dispositifs IdO rend un demi-milliard d'appareils en entreprise vulnérables, les imprimantes sont aussi un vecteur d'attaque
https://www.developpez.com/actu/216198/Une-faille-de-securite-de-dispositifs-IdO-rend-un-demi-milliard-d-appareils-en-entreprise-vulnerables-les-imprimantes-sont-aussi-un-vecteur-d-attaque/La Télévision, œil de demain (1947) - J.K Raymond Millet [Extrait] - Les Documents Cinematographiques
Envoyé spécial. Facebook, l'envers du réseau
Critical Flaws in Syringe Pump, Device Gateways Threaten Patient Safety
https://threatpost.com/critical-flaws-in-syringe-pump-device-gateways-threaten-patient-safety/137067/Room 641A
https://en.wikipedia.org/wiki/Room_641AResearchers Figured Out How to Hack a Tesla’s Locks in Under Two Seconds
https://motherboard.vice.com/en_us/article/438ydj/break-into-a-tesla-key-fob-lockBlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
https://www.usenix.org/conference/usenixsecurity18/presentation/soltanChine : Google propose un prototype de son moteur de recherche qui lie les utilisateurs à leurs numéros de téléphone
https://www.developpez.com/actu/224488/Chine-Google-propose-un-prototype-de-son-moteur-de-recherche-qui-lie-les-utilisateurs-a-leurs-numeros-de-telephone/Cash investigation - Les secrets inavouables de nos téléphones portables (Intégrale) - Cash Investigation
Garage Door Hacking - Veritasium
Someone Posted Weed and Viagra Spam On a US Department of Agriculture Site - Motherboard
https://motherboard.vice.com/en_us/article/wjyxkw/weed-and-viagra-spam-us-department-of-agriculture-siteLa police chinoise forcerait des villes entières à installer un spyware Android, que faire pour en minimiser l'impact ?
https://www.developpez.com/actu/226144/La-police-chinoise-forcerait-des-villes-entieres-a-installer-un-spyware-Android-que-faire-pour-en-minimiser-l-impact/Australie : le projet de loi visant à contraindre les télécoms à installer des spyware sur mobile, pourrait "nuire gravement" à la cybersécurité
https://www.developpez.com/actu/226160/Australie-le-projet-de-loi-visant-a-contraindre-les-telecoms-a-installer-des-spyware-sur-mobile-pourrait-nuire-gravement-a-la-cybersecurite/DEFCON 2018 : une machine à voter actuellement utilisée dans 23 États est susceptible d'être piratée à distance via une attaque réseau
https://www.developpez.com/actu/226788/DEFCON-2018-une-machine-a-voter-actuellement-utilisee-dans-23-Etats-est-susceptible-d-etre-piratee-a-distance-via-une-attaque-reseau/Philips Vulnerability Exposes Sensitive Cardiac Patient Information
https://threatpost.com/philips-vulnerability-exposes-sensitive-cardiac-patient-information/136669/Threatlist: Manufacturing, a Top Target for Espionage
https://threatpost.com/threatlist-manufacturing-a-top-target-for-espionage/134808/Hacker Compromises Air Force Captain to Steal Sensitive Drone Info
https://threatpost.com/hacker-compromises-air-force-captain-to-steal-sensitive-drone-info/133915/Cisco Patches High-Severity Bug in VoIP Phones
https://threatpost.com/cisco-patches-high-severity-bug-in-voip-phones/133905/Russian spy agency GRU responsible for international cyberwar, UK government says
https://www.independent.co.uk/news/world/europe/russia-gru-sergei-skripal-hacking-cyber-war-donald-trump-elections-a8567356.htmlThe Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies - Bloomberg Businessweek
https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companiesThreatList: 83% of Routers Contain Vulnerable Code
https://threatpost.com/threatlist-83-of-routers-contain-vulnerable-code/137966/Facebook a confirmé que les hackers ont volé des données personnelles détaillées de 14 millions de personnes, sur les 30 millions de comptes piratés
https://www.developpez.com/actu/228596/Facebook-a-confirme-que-les-hackers-ont-vole-des-donnees-personnelles-detaillees-de-14-millions-de-personnes-sur-les-30-millions-de-comptes-pirates/USA : une nouvelle preuve de piratage de matériel Supermicro dans une société de Télécom, montrant que la Chine continue son opération de sabotage
https://www.developpez.com/actu/228240/USA-une-nouvelle-preuve-de-piratage-de-materiel-Supermicro-dans-une-societe-de-Telecom-montrant-que-la-Chine-continue-son-operation-de-sabotage/Le Royaume-Uni pratique des cyberattaques qui pourraient couper l'électricité à Moscou, pour réprimer la Russie sans recourir à une attaque nucléaire
https://www.developpez.com/actu/227979/Le-Royaume-Uni-pratique-des-cyberattaques-qui-pourraient-couper-l-electricite-a-Moscou-pour-reprimer-la-Russie-sans-recourir-a-une-attaque-nucleaire/Security Seals Used to Protect Voting Machines Can Be Easily Opened With Shim Crafted from a Soda Can - Motherboard
https://motherboard.vice.com/en_us/article/mbdw73/security-seals-used-to-protect-voting-machines-can-be-easily-opened-with-shim-crafted-from-a-soda-canCompteurs communicants : ONZO
In County Crippled by Hurricane, Water Utility Targeted in Ransomware Attack
https://threatpost.com/in-county-crippled-by-hurricane-water-utility-targeted-in-ransomware-attack/138327/Up to 35 Million 2018 Voter Records For Sale on Hacking Forum
https://threatpost.com/up-to-35-million-2018-voter-records-for-sale-on-hacking-forum/138295/NotPetya Linked to Industroyer Attack on Ukraine Energy Grid
https://threatpost.com/notpetya-linked-to-industroyer-attack-on-ukraine-energy-grid/138287/Some Solar Power Meters are Vulnerable to Command Injection Attacks
https://threatpost.com/solar-power-firm-patches-meters-vulnerable-to-command-injection-attacks/122324/Nuclear Power Plant Disrupted by Cyber Attack
https://threatpost.com/nuclear-power-plant-disrupted-by-cyber-attack/121216/GreyEnergy – Une menace ciblant les infrastructures industrielles critiques
https://korben.info/greyenergy-une-menace-ciblant-les-infrastructures-industrielles-critiques.htmlRemote Code Implantation Flaw Found in Medtronic Cardiac Programmers
https://threatpost.com/remote-code-implantation-flaw-found-in-medtronic-cardiac-programmers/138363/USA : un système informatique du département de la santé piraté et les données personnelles de plus de 75 000 individus compromises
https://www.developpez.com/actu/230157/USA-un-systeme-informatique-du-departement-de-la-sante-pirate-et-les-donnees-personnelles-de-plus-de-75-000-individus-compromises/La cybersécurité confrontée à une pénurie mondiale de près de 3 millions de personnes qualifiées, selon une étude
https://www.developpez.com/actu/229476/La-cybersecurite-confrontee-a-une-penurie-mondiale-de-pres-de-3-millions-de-personnes-qualifiees-selon-une-etude/Human pose estimation through walls using WiFi reflections and AI
British Airways Data Breach Takes Off Again with 185K More Victims
https://threatpost.com/british-airways-data-breach-takes-off-again-with-185k-more-victims/138600/Plus de la moitié des réseaux de systèmes de contrôle industriel (ICS) serait vulnérable à des attaques ciblées selon un rapport
https://www.developpez.com/actu/230897/Plus-de-la-moitie-des-reseaux-de-systemes-de-controle-industriel-ICS-serait-vulnerable-a-des-attaques-ciblees-selon-un-rapport/West Virginia Using Internet Voting
https://www.schneier.com/blog/archives/2018/10/west_virginia_u.htmlSecurity Vulnerabilities in US Weapons Systems
https://www.schneier.com/blog/archives/2018/10/security_vulner_17.htmlGas Pump Hack
https://www.schneier.com/blog/archives/2018/07/gas_pump_hack.htmlMore on the NSA's Use of Traffic Shaping (BGP hacking)
https://www.schneier.com/blog/archives/2017/07/more_on_the_nsa_2.htmlRevealed: The Internet's Biggest Security Hole (BGP hacking) - Kim Zetters
https://www.wired.com/2008/08/revealed-the-in/IoT Flaw Allows Hijacking of Connected Construction Cranes
https://threatpost.com/iot-flaw-allows-hijacking-of-connected-construction-cranes/138648/Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
https://motherboard.vice.com/en_us/article/9k74az/triton-malware-russian-government-saudi-arabia-petrol-plantWatch Hackers Steal a Tesla (using the passive entry feature of the car)
https://motherboard.vice.com/en_us/article/43ee8m/watch-hackers-steal-a-tesla-model-s-key-fob-hackEbay is full of used voting machines full of real electoral data and riddled with security defects
https://boingboing.net/2018/10/25/windows-ce-and-usb.htmlHow Israel Rules The World Of Cyber Security
Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections
https://threatpost.com/newsmaker-interview-tom-kellermann-on-hacking-the-midterm-elections/138791/Continued use of mag stripe make U.S. chip cards being compromised in the millions
https://threatpost.com/u-s-chip-cards-are-being-compromised-in-the-millions/139028/Signal Microcontrollers Open to Side-Channel Attacks
https://threatpost.com/mixed-signal-microcontrollers-open-to-side-channel-attacks/134793/Smart Cities sécuritaires : la CNIL forfait - LQDN
https://www.laquadrature.net/2018/11/06/smart-cities-securitaires-la-cnil-forfait/Censure antiterroriste : Macron se soumet aux géants du Web pour instaurer une surveillance généralisée – LQDN
https://www.laquadrature.net/2018/11/14/censure-antiterroriste-macron-se-soumet-aux-geants-du-web-pour-instaurer-une-surveillance-generalisee/Hidden Cameras in Streetlights by the DEA
https://www.schneier.com/blog/archives/2018/11/hidden_cameras_.htmlRobust Website Fingerprinting Through the Cache Occupancy Channel
https://arxiv.org/pdf/1811.07153.pdfLe chasseur américain F-35 Lightning II aurait plus à craindre du piratage informatique que des armes ennemies
https://www.developpez.com/actu/233635/Le-chasseur-americain-F-35-Lightning-II-aurait-plus-a-craindre-du-piratage-informatique-que-des-armes-ennemies/Update Mechanisms Allow Remote Attacks on UEFI Firmware (MITM RCE)
https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/Un hacker a piraté 50 000 imprimantes connectées à internet pour encourager les gens à s'abonner à la chaine YouTube de PewDiePie
https://www.developpez.com/actu/235850/Un-hacker-a-pirate-50-000-imprimantes-connectees-a-internet-pour-encourager-les-gens-a-s-abonner-a-la-chaine-YouTube-de-PewDiePie/En Chine, les voitures électriques transmettraient des données au gouvernement à l'insu des propriétaires
https://www.developpez.com/actu/235897/En-Chine-les-voitures-electriques-transmettraient-des-donnees-au-gouvernement-a-l-insu-des-proprietaires/France : les données de plus de 500 000 Français ont été compromises par les pirates lors d'une cyberattaque visant le service Ariane
https://www.developpez.com/actu/237561/France-les-donnees-de-plus-de-500-000-Francais-ont-ete-compromises-par-les-pirates-lors-d-une-cyberattaque-visant-le-service-Ariane/La marine américaine aurait subi une cyberattaque de la part des pirates chinois, des informations ultra-sensibles auraient été dérobées
https://www.developpez.com/actu/237874/La-marine-americaine-aurait-subi-une-cyberattaque-de-la-part-des-pirates-chinois-des-informations-ultra-sensibles-auraient-ete-derobees/Reconnaissance faciale au lycée : l’expérimentation avant la généralisation – LQDN
https://www.laquadrature.net/2018/12/19/reconnaissance-faciale-au-lycee-lexperimentation-avant-la-generalisation/Chine : des écoles se servent « d'uniformes intelligents » pour savoir à quel endroit exact se trouvent les élèves
https://www.developpez.com/actu/239347/Chine-des-ecoles-se-servent-d-uniformes-intelligents-pour-savoir-a-quel-endroit-exact-se-trouvent-les-eleves-afin-de-booster-l-assiduite/Facebook sait comment vous suivre en utilisant la poussière ou des rayures sur l'objectif de votre appareil photo
https://www.developpez.com/actu/239983/Facebook-sait-comment-vous-suivre-en-utilisant-la-poussiere-ou-des-rayures-sur-l-objectif-de-votre-appareil-photo-d-apres-un-brevet-depose-en-2015/T-Mobile, Sprint, and AT&T Are Selling Customers' Real-Time Location Data, And It's Falling Into the Wrong Hands
https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobileHebei court unveils program to expose deadbeat debtors
http://www.chinadaily.com.cn/a/201901/16/WS5c3edfb8a3106c65c34e4d75.htmlDes entreprises chinoises collectent les données émotionnelles de leurs employés pour réduire les erreurs humaines, selon des responsables
https://www.developpez.com/actu/201050/Des-entreprises-chinoises-collectent-les-donnees-emotionnelles-de-leurs-employes-pour-reduire-les-erreurs-humaines-selon-des-responsables/Saudi Absher site lets men control women's travel, stop them escaping
https://www.thisisinsider.com/absher-saudi-website-men-control-women-stop-escape-2019-1Google Gmail tracks purchase history
https://www.cnbc.com/2019/05/17/google-gmail-tracks-purchase-history-how-to-delete-it.htmlThe Sky's the Limit For Satellite Hacks
https://threatpost.com/rsa-conference-2019-the-skys-the-limit-for-satellite-hacks/142541/Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers - VICE
https://www.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computersTriton is the world’s most murderous malware, and it's spreading - MIT Technology Review
https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/[D] Has anyone noticed a lot of ML research into facial recognition of Uyghur people lately? : MachineLearning
https://www.reddit.com/r/MachineLearning/comments/bvzc7w/d_has_anyone_noticed_a_lot_of_ml_research_into/Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk | Threatpost
https://threatpost.com/critical-bug-infusion-pump-lives-at-risk/145660/Un mystérieux groupe de hacker iranien pirate des séquenceurs d'ADN - ZDNet
https://www.zdnet.fr/actualites/un-mysterieux-groupe-de-hacker-iranien-pirate-des-sequenceurs-d-adn-39886075.htmUSA : le DHS annonce une intrusion au sein des salles de contrôle des compagnies d'électricité, un présumé groupe russe pointé du doigt
https://www.developpez.com/actu/216414/USA-le-DHS-annonce-une-intrusion-au-sein-des-salles-de-controle-des-compagnies-d-electricite-un-presume-groupe-russe-pointe-du-doigt/Des pirates informatiques attaquent un prestataire du Service de sécurité russe, dévoilent un projet de désanonymisation de Tor, et d'autres projets
https://securite.developpez.com/actu/270620/Des-pirates-informatiques-attaquent-un-prestataire-du-Service-de-securite-russe-devoilent-un-projet-de-desanonymisation-de-Tor-et-d-autres-projets/Piratage de données financières de la Bulgarie : la nation entière a été frappée, les données de plus de 5 millions de personnes rendues publiques
https://securite.developpez.com/actu/270865/Piratage-de-donnees-financieres-de-la-Bulgarie-la-nation-entiere-a-ete-frappee-les-donnees-de-plus-de-5-millions-de-personnes-rendues-publiques/Les autorités UK ont fait des copies illégales du SIS, donnant accès aux données de citoyens de l'UE à des sociétés américaines
https://www.developpez.com/actu/271514/Les-autorites-UK-ont-fait-des-copies-illegales-du-SIS-donnant-acces-aux-donnees-de-citoyens-de-l-UE-a-des-societes-americaines/Palantir's Surveillance Service for Law Enforcement
https://www.schneier.com/blog/archives/2019/07/palantirs_surve.htmlSpearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers
https://arxiv.org/pdf/1907.05972.pdfGyrophone: Recognizing Speech From Gyroscope Signals
https://crypto.stanford.edu/gyrophone/files/gyromic.pdf'URGENT/11' Critical Infrastructure Bugs Threaten VxWorks systems
https://threatpost.com/urgent-11-critical-infrastructure-eternalblue/146731/Firmware Bugs Plague Server Supply Chain (Gigabyte, vuln in BMC), 7 Vendors Impacted
https://threatpost.com/firmware-bugs-plague-supply-chain/146519/MobilBye: Attacking ADAS (autonomous vehicles) with Camera Spoofing
https://arxiv.org/pdf/1906.09765.pdfWithout Any Warrants, CBP Searched My Devices at the Airport - Seth Harp
https://theintercept.com/2019/06/22/cbp-border-searches-journalists/Inside the West's failed fight against China's ‘Cloud Hopper’ hackers
https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper/Cell Networks Hacked by (Probable) Nation-State Attackers - Schneier on Security
https://www.schneier.com/blog/archives/2019/07/cell_networks_h.htmlHackers are stealing years of call records from hacked cell networks – TechCrunch
Des milliers d'utilisateurs iOS ont été espionnés chaque semaine pendant deux ans par des hackers qui ont exploité 14 failles 0-day
https://ios.developpez.com/actu/275530/Des-milliers-d-utilisateurs-iOS-ont-ete-espionnes-chaque-semaine-pendant-deux-ans-par-des-hackers-qui-ont-exploite-14-failles-0-day/Barclays a testé un logiciel de surveillance cauchemardesque sur ses employés
https://cyberguerre.numerama.com/3287-barclays-a-teste-un-logiciel-de-surveillance-cauchemardesque-sur-ses-employes.htmlGhost ships, crop circles, and soft gold: A GPS mystery in Shanghai - MIT Technology Review
https://www.technologyreview.com/s/614689/ghost-ships-crop-circles-and-soft-gold-a-gps-mystery-in-shanghai/Moscow's Facial Recognition Tech Will Outlast the Coronavirus - VICE News
Un cybercriminel vole la BD d'identification de toute la population argentine
https://securite.developpez.com/actu/328120/Un-cybercriminel-vole-la-BD-d-identification-de-toute-la-population-argentine-les-donnees-du-president-Alberto-Fernandez-et-des-superstars-du-football-Lionel-Messi-et-Sergio-Aguero-piratees/Donnez-nous vos données biométriques pour obtenir votre déjeuner en 5 secondes, disent les écoles britanniques aux enfants : la reconnaissance faciale et le paiement des repas un système efficace ?
https://www.developpez.com/actu/328119/Donnez-nous-vos-donnees-biometriques-pour-obtenir-votre-dejeuner-en-5-secondes-disent-les-ecoles-britanniques-aux-enfants-la-reconnaissance-faciale-et-le-paiement-des-repas-un-systeme-efficace/Reverse Engineering
reverse-engineeringGetting Started with Reverse Engineering
https://jlospinoso.github.io/developing/software/software%20engineering/reverse%20engineering/assembly/2015/03/06/reversing-with-ida.htmlReversing C++ (Paper)
http://repository.root-me.org/Reverse%20Engineering/EN%20-%20Reversing%20C++%20-%20Blackhat%20-%20Yason%20Sabanal%20-%20paper.pdfReversing C++ (Slides)
http://repository.root-me.org/Reverse%20Engineering/EN%20-%20Reversing%20C++%20-%20Blackhat%20-%20Yason%20Sabanal%20-%20slides.pdfCracker du dotNet
http://bork0.dl2.free.fr/php/cracking/cracker-du-dotnet.phpReversing : Secrets of Reverse Engineering (Foundations, Low-Level Software, Windows Fundamentals, Reversing Tools, Beyond the Documentation, File Formats, Auditing Program Binaries, Reversing Malware, Piracy and Copy Protection, Antireversing Techniques, Breaking Protections, Reversing .NET, Decompilation) - Eldad Eilam
ELF binaries, remote debugging and IDA pro
http://solidsec.blogspot.fr/2015/09/reversing-elf-binaries-remote-debugging.htmlThe.IDA.Pro.Book.2ed
LLDB to GDB Command Map
https://lldb.llvm.org/lldb-gdb.htmlARM
arml'ARM c'est rigolo - Baboon's Blog
http://baboon.rce.free.fr/index.php?post/2009/11/08/l-ARM-c-est-rigoloWindows
windowsWinDbg
windbgPyKd
pykdPyKD Tutorial - part 1 - Sina & Shahriar's Blog
https://rayanfam.com/topics/pykd-tutorial-part1/PyKD Tutorial - part 2 - Sina & Shahriar's Blog
https://rayanfam.com/topics/pykd-tutorial-part2/User Manual rus · Wiki · pykd / pykd · GitLab
https://githomelab.ru/pykd/pykd/wikis/User-Manual-rusFiles · master · pykd / pykdwin · GitLab
https://githomelab.ru/pykd/pykdwin/tree/mastersetBp doesnt work, why? (#3) · Issues · pykd / pykd · GitLab
https://githomelab.ru/pykd/pykd/issues/3#note_14PyFuzz2/windbg.py at master · susperius/PyFuzz2 · GitHub
https://github.com/susperius/PyFuzz2/blob/master/node/debugging/windbg.pyTODO searchMemory for paptterns
TODO How to detach in a clean way
Reverse engineering vendor firmware drivers for little fun and no profit [linux.conf.au 2014]
Damaging Hard Drives with an Ultrasonic Attack
https://spqr.eecs.umich.edu/papers/bolton-blue-note-IEEESSP-2018.pdfTempest - Make Your Monitor Play Beethoven 2.0 (it works !!)
FBI: Smart Meter Hacks Likely to Spread
https://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/Softwares
softwareUtilities
utilitiesSynchronization and backup programs
https://wiki.archlinux.org/index.php/Synchronization_and_backup_programsDash
https://wiki.archlinux.org/index.php/Dashcrontab.guru - the cron schedule expression editor
https://crontab.guruCrontab Generator - Generate crontab syntax
https://crontab-generator.org/Shinken Monitoring - Index
http://www.shinken-monitoring.org/Grapher - Mode d'emploi
http://macetprof.free.fr/MacEtProf/Grapher_files/GrapherManuel05112009.pdfBrowsh - text-based browser
https://www.brow.sh/Environnements de bureau
environnementsReddit Unixporn
https://www.reddit.com/r/unixporn/Awesome WM
https://awesomewm.org/Fully automated color changing
https://www.reddit.com/r/unixporn/comments/6al0o8/fully_automated_color_changing_i3_hardware/GTK Themes
gtk-themesAdapta : An adaptive Gtk+ theme based on Material Design Guidelines
https://github.com/adapta-project/adapta-gtk-themePaper Icon Theme
https://snwh.org/paperUniform look for Qt and GTK applications - ArchWiki
https://wiki.archlinux.org/index.php/Uniform_look_for_Qt_and_GTK_applicationsLinux Master Race
https://www.reddit.com/r/linuxmasterrace/LaTeX
latex\usepackage{mathpazo} nice looking !
\usepackage{diagbox}
tablesgenerator.com
http://www.tablesgenerator.com/The LaTeX Font Catalogue - Sans Serif Fonts
http://www.tug.dk/FontCatalogue/sansseriffonts.htmlLaTeX Templates - The Legrand Orange Book
http://www.latextemplates.com/template/the-legrand-orange-bookA very minimal introduction to TikZ
http://cremeronline.com/LaTeX/minimaltikz.pdfThe Listings Package
http://texdoc.net/texmf-dist/doc/latex/listings/listings.pdfBeamer
beamerBeamer custom class
https://pmallappa.github.io/blog/2017/03/11/beamer-not-beamer/GitHub - Poeschl/DarkConsole-Beamer-Theme
https://github.com/Poeschl/DarkConsole-Beamer-ThemeGitHub - martinbjeldbak/ultimate-beamer-theme-list: A collection of custom Beamer themes
https://github.com/martinbjeldbak/ultimate-beamer-theme-listwiki2beamer home
http://wiki2beamer.sourceforge.net/The wiki2beamer example
http://wiki2beamer.sourceforge.net/wiki2beamer-example.pdfBeamer appearance cheat sheet
http://www.cpt.univ-mrs.fr/~masson/latex/Beamer-appearance-cheat-sheet.pdftikz pgf - How can we draw a duck (in order to create a tikzducks package and store it in CTAN)? - TeX - LaTeX Stack Exchange
https://tex.stackexchange.com/questions/346695/how-can-we-draw-a-duck-in-order-to-create-a-tikzducks-package-and-store-it-in-cDraw TikZ directly in text
https://tex.stackexchange.com/questions/89821/how-to-draw-a-solid-colored-circleLaTeX Table Generator
https://www.tablesgenerator.com/CircuiTikZ
http://texdoc.net/texmf-dist/doc/latex/circuitikz/circuitikzmanual.pdfPolar plot using pgfplots/tikz - TeX - LaTeX Stack Exchange
https://tex.stackexchange.com/questions/267938/polar-plot-using-pgfplots-tikzOpenSMTPD, Dovecot and SpamAssassin
http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.htmlRessources
ressourcesrep0s
rep0sRepo ivanlef0u
http://ivanlef0u.fr/repo/Repo Zenk-Security
https://repo.zenk-security.com/X-Files
https://doc.lagout.org/Repo Root Me
http://repository.root-me.orgVX Vault
http://vxvault.net/ViriList.phphttp://vxvault.net/ : tracker de malwares ;infected:O3aNDL5z pour DL les archives, qui ont elles-même un mdp: infected
LeakForums
https://leakforums.netExploit Database
https://www.exploit-db.compbwcz exploits
http://pbwcz.cz/Hot%20Database/exploit.html0day.today
http://0day.today/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
https://github.com/Hack-with-Github/Awesome-Hackingz0ro Repository - Powered by z0ro
http://index-of.es/My Noob Life :)
http://repo.mynooblife.org/My Noob Life :) | "Private section"
http://repo.mynooblife.org/.priv8/Index of /files/defcon
https://stalkr.net/files/defcon/Rawsec's CyberSecurity Inventory
http://list.rawsec.ml/index.htmlSeclists - A collection of multiple types of lists used during security assessment
https://github.com/danielmiessler/SecListsCTFs
ctfsRoot Me
https://www.root-me.orgHack The Box :: Penetration Testing Labs
https://www.hackthebox.euNewbieContest
https://www.newbiecontest.org/Vulnhub
https://www.vulnhub.com/HackThis
https://www.hackthis.co.ukThe Enigma Group
https://www.enigmagroup.org/Hack This Site!
https://www.hackthissite.org/WebGoat: A deliberately insecure Web Application
https://github.com/WebGoat/WebGoat/wikiW3Challs : World Wide Web Challenges
https://w3challs.comopenclassrooms old courses, parce que c'était mieux avant
https://openclassrooms.com/old-courses-pdfcommandlinefu
http://www.commandlinefu.com/commands/browseRegExr: Learn, Build, & Test RegEx
http://regexr.com/Comptoir du Hardware
http://www.comptoir-hardware.com/Mémo-Wiki Deimos
https://wiki.deimos.fr/AccueilThreatpost
https://threatpost.comInformation Security
https://www.information-security.fr/Daily Security
https://dailysecurity.fr/hackndo - Think out of the box
http://hackndo.comSecurimag
https://securimag.org/wp/The poetry of (in)security
https://www.ckn.io/index.htmlCommands
commandesBooks/PDF/Vector images manipulations
manipulation-pdfgs file.pdf # show pdf file
pdftk 1.pdf 2.pdf 3.pdf cat output out.pdf # preserves bookmarks
gs -sDEVICE=pdfwrite -dColorConversionStrategy=/LeaveColorUnchanged -dDownsampleMonoImages=false -dDownsampleGrayImages=false -dDownsampleColorImages=false -dAutoFilterColorImages=false -dAutoFilterGrayImages=false -dColorImageFilter=/FlateEncode -dGrayImageFilter=/FlateEncode -o out.pdf in.pdf
gs -sDEVICE=pdfwrite -o merged.pdf in1.pdf in2.pdf # does not preserve bookmarks
gs -sDEVICE=pdfwrite -dNoOutputFonts -o out.pdf in.pdf # text to path
rsvg-convert -f pdf -o file.pdf file.svg
cpdf -twoup in.pdf -o out.pdf # merges 2 pages into one
qpdf --pages . 2-z -- in.pdf out.pdf # remove page 1
qpdf --pages in.pdf 2-z -- --empty out.pdf # remove page 1 and discards metadata
pdftk a.pdf dump_data > info.txt pdftk out.pdf update_info info.txt output final.pdf
pdftk A=a.pdf B=b.pdf cat A1-[N] B A[N+1]-end output out.pdf
eval `/Applications/DjView.app/Contents/setpath.sh` djvused -e print-outline book.djvu > toc.txt djvused -e 'set-outline toc.txt' book.djvu
scantailor
pdfimages -j -jp2 in.pdf out
for x in *.jpg; do c44 -dpi 300 $x; done; djvm -c out.djvu *.djvu # convert & merge greyscale images to djvu
Audio/Video
audio-videoffmpeg -i videoplayback.mp4 -i audio.mp4 -c copy -map 0:0 -map 1:0 -shortest output.mp4
youtube-dl --extract-audio --audio-format flac https://www.youtube.com/watch?v=
cd ~/Downloads/ && scdl -l https://soundcloud.com/[user]/[track]
ffmpeg -framerate 24 -f image2 -s 1280x700 -start_number 80 -i pic%05d.png -vcodec libx264 -crf 25 -pix_fmt yuv420p output.mp4
ffmpeg -i input.ts -acodec copy -vcodec copy out.mp4 # re-warp video flux (broken container)
ffmpeg -i video.mp4 -vcodec copy -acodec copy -t 00:42:42 video.a.mp4 -vcodec copy -acodec copy -ss 00:42:42 video.b.mp4 # split video in two
echo "file 'video1.a.mp4'" >> vidlist.txt && echo "file 'video2.b.mp4'" >> vidlist.txt && ffmpeg -f concat -i vidlist.txt -c copy output1.mp4 && rm vidlist.txt # concatenate videos with same codec
Sysadmin
sysadminlsof -i
sync && echo 3 > /proc/sys/vm/drop_caches
df -h
du -hd 2 [folder]
sudo journalctl -f # <- "follow" (realtime)
sudo journalctl -f _COMM=smtpd
journalctl --vacuum-time=1h
sudo find / -nogroup -nouser
WINEARCH=win32 wine wineboot && winetricks dotnet462
wine program.exe
pacman -Syu --ignore=miniupnpc --ignore=nodejs --ignore=npm
sudo pacman -Rns $(pacman -Qtdq) # apt-get autoremove equivalent for arch
certbot certonly --manual -d '*.xif.fr'
iptables -A INPUT -s xxx.xxx.xxx.xxx -j DROP # ban ip (-D pour deban)
Shell/Files
shellstty sane
alias ls='ls --color=auto' && alias ll='ls -Al'
find . -name ._* -exec rm -v {} \;
wilcards : `ls *.???`
Bash et les raccourcis clavier
https://linuxfr.org/users/postroutine/journaux/bash-et-les-raccourcis-claviergrep -RF "the string to search" .
touch -m -a -t [YYYYMMDDhhmm.ss] [file]
Better than 'which' : command -v [command name]
Dev
devsudo dtruss
otool -L executable
nm --demangle --defined-only --dynamic libfoo.so
PYTHONDONTWRITEBYTECODE=0 jupyter notebook notebook.ipynb --NotebookApp.token=
python3 -m cProfile -o program.prof my_program.py && snakeviz program.prof
pip3 install --user --editable path/to/library
git rebase --interactive HEAD~2
git archive --format=zip HEAD -o ../[name].zip
zip -r catlist catlist -x *.git*
install_name_tool -change /usr/local/lib/libblah.0.dylib @rpath/libblah.dylib monsuperprogramme
Network
networkIncoming SSH tunnels
http://wiki.xif.fr/xifnet/procedures/ssh_tunnelioslaves-master xif nashorn -C --open-port=T8081 ssh -f -N -T -R8081:localhost:8080 sshtun@nashorn.net.xif.fr -o IdentityFile=~/.ssh/sshtun -p 2222
Outgoing SSH tunnel : ssh -ND 3128 xif@nashorn.net.xif.fr -p 2222 -4 -o CheckHostIP=no -o IdentityFile=~/.ssh/xif@-xifnet-generic- # Then in Firefox proxy settings : SOCKSv5 localhost:3128
Start build machines : xif@el-presidente$ sudo ./parpsu-o9-trigger ioslaves-master xif satanas --on=GATEWAY el-presidente /!\ L'USB-keep-powered est branché sur bam-bam -> éteindre satanas avant /!\
Procédure Wireguard
Misc Xif / OS X
misc-xifgit clone https://github.com/qTox/qTox.git cd qTox && LDFLAGS="-framework CoreVideo -framework AudioToolbox -framework VideoToolbox" cmake . -DSMILEYS=MIN
diskutil unmount force /Volumes/[Volume]
defaults write NSGlobalDomain NSAppSleepDisabled -bool YES
diskutil list
mkdir /Volumes/UPSUD && sshfs -o nolocalcaches -o volname="UPSUD" -o idmap=file -o nomap=ignore -o modules=iconv,from_code=UTF-8,to_code=UTF-8-MAC -o uidfile=~/.ssh/sshfs-uids "felix.faisant@tp-ssh1.dep-informatique.u-psud.fr:/home/tp-home004/ffaisan" "/Volumes/UPSUD" -o CheckHostIP=no && open "/Volumes/UPSUD"
rsync -rlt --delete --progress --partial -e "ssh -p 2222 -i /Users/xif/.ssh/http@nashorn" /Volumes/BigData/Photos http@nashorn.net.xif.fr:/srv/http/photos
cmake ../VTK-7.1.0 -DVTK_USE_QVTK:BOOL=ON -DVTK_USE_CARBON:BOOL=OFF -DCMAKE_INSTALL_PREFIX=/usr/local -DVTK_USE_GUISUPPORT:BOOL=ON -DQT_QMAKE_EXECUTABLE:PATH=/Library/Qt/5.7/clang_64/bin/qmake -DVTK_QT_VERSION:STRING=5 -DBUILD_SHARED_LIBS:BOOL=ON -DVTK_USE_CXX11_FEATURES:BOOL=ON -DBUILD_TESTING:BOOL=ON -DVTK_WRAP_PYTHON:BOOL=ON -DVTK_PYTHON_VERSION:STRING=3.4 -DVTK_USE_N_WAY_ARRAYS:BOOL=ON -DVTK_USE_CHARTS:BOOL=ON
./bootstrap.sh --with-libraries=[...boost libraries...] --with-python=python3.6 sudo ./b2 install -j2 link=shared,static toolset=clang cxxflags="-stdlib=libc++" linkflags="-stdlib=libc++"
sudo pip install --upgrade youtube-dl
Xod Wiki
https://srv01.silvercraft.fr/wiki/doku.php?id=linuxXif Wiki
https://wiki.xif.fr/procedures/indexMisc
miscFSF 30 years
https://urchn.org/wp/wp-content/uploads/2014/12/FSF_30_720p.m4vTruecraft
https://truecraft.iogrifon monitoring
https://monitoring.grifon.fr/munin/grifon.fr/index.htmlchrome://net-internals/
Temp xif
temp-xifLibretro
https://docs.libretro.com/development/libretro-overview/WBO — Online collaborative whiteboard
https://wbo.openode.io/Cross-platform Interface - WireGuard
https://www.wireguard.com/xplatform/wireguard-go - Go implementation of WireGuard
https://git.zx2c4.com/wireguard-go/about/Gestionnaires de mots de passe - LinuxFr.org
https://linuxfr.org/news/gestionnaires-de-mots-de-passePandoc - a universal document converter
https://pandoc.org/demos.htmlSTARTTLS Everywhere
https://starttls-everywhere.orgmathcha - math editor
https://www.mathcha.io/editorRootAsRole: This module provides a secure alternative to sudo/su commands
https://github.com/SamerW/RootAsRole/PeerTube 1.0 : la plateforme de vidéos libre et fédérée – Framablog
https://framablog.org/2018/10/15/peertube-1-0-la-plateforme-de-videos-libre-et-federee/4D Toys. An interactive toy for 4D children.
http://4dtoys.comGuru Maps - Offline OSM Maps & Navigation for Android
https://gurumaps.appSyncthing
https://syncthing.nethvPlot
https://hvplot.pyviz.orgScanTailor Advanced
https://github.com/4lex4/scantailor-advancedNumba: A High Performance Python Compiler
http://numba.pydata.orgcyclosm
https://cyclosm.github.io/cyclosm-cartocss-style/example.htmlLe langage de programmation Julia gagne de plus en plus en popularité au sein de la communauté scientifique depuis janvier 2018
https://www.developpez.com/actu/243260/Le-langage-de-programmation-Julia-gagne-de-plus-en-plus-en-popularite-au-sein-de-la-communaute-scientifique-depuis-janvier-2018/(function(){ var url = location.href; var title = document.title || url; window.open('https://blah.xif.fr/?blah=' + encodeURIComponent(url)+'&title='+encodeURIComponent(title),'_blank'); })();
AMD Optimizing C/C++ Compiler - AMD
https://developer.amd.com/amd-aocc/Comparaison de technologies Web pour implémenter une application de dessin basique - LinuxFr.org
https://linuxfr.org/news/comparaison-de-technologies-web-pour-implementer-une-application-de-dessin-basiqueWt, C++ Web Toolkit
https://www.webtoolkit.eu/wtInfinite Data Structures [<3 Haskell]
GNU Taler
https://taler.net/fr/Le calcul sur processeur graphique dans un notebook : l'interpréteur C++ Cling s'étend vers CUDA
https://hpc.developpez.com/actu/227620/Le-calcul-sur-processeur-graphique-dans-un-notebook-l-interpreteur-Cplusplus-Cling-s-etend-vers-CUDA/cppit/jucipp: A lightweight & cross-platform IDE supporting the most recent C++ standards
https://github.com/cppit/jucippLisp, The Quantum Programmer's Choice [motivation to learn Lisp]
Gitea - A painless self-hosted Git service.
https://gitea.ioG'MIC - GREYC's Magic for Image Computing: A Full-Featured Open-Source Framework for Image Processing
http://gmic.euThe CImg Library - C++ Template Image Processing Toolkit
http://cimg.euVue.js
https://vuejs.orgBEEP Core protocol central
http://beepcore.orgLLVM et Clang s'apprêtent à faire un bond en avant avec OpenCL et CUDA, avec l'intégration d'AMD HIP et d'OpenCL C++
https://hpc.developpez.com/actu/198898/LLVM-et-Clang-s-appretent-a-faire-un-bond-en-avant-avec-OpenCL-et-CUDA-avec-l-integration-d-AMD-HIP-et-d-OpenCL-Cplusplus/Vulkan (API)
https://fr.wikipedia.org/wiki/Vulkan_(API)RISC-V bords
risc-v-bordsBoards & Software - SiFive
https://www.sifive.com/boardsVegaBoard
https://vegaboards.com/GAPuino GAP8 development board - GreenWaves Technologies
https://greenwaves-technologies.com/product/gapuino/Dual-Core RISC-V 64Bit K210 AI Board - Kendryte KD233 - AnalogLamb
https://www.analoglamb.com/product/dual-core-risc-v-64bit-k210-ai-board-kendryte-kd233/Sipeed MAix BiT for RISC-V AI+IoT - Seeed Studio
https://www.seeedstudio.com/Artificial-Intelligence/Machine-Learning-c-1220/Computer-Vision-c-1221/Sipeed-MAix-BiT-for-RISC-V-AI-IoT-p-2872.htmlSipeed MAIX-I module WiFi version ( 1st RISC-V 64 AI Module, K210 inside ) - Seeed Studio
https://www.seeedstudio.com/Artificial-Intelligence/Machine-Learning-c-1220/Computer-Vision-c-1221/Sipeed-MAIX-I-module-WiFi-version-1st-RISC-V-64-AI-Module-K210-inside-p-3206.htmlLoFive RISC-V by Qwerty Embedded Design | GroupGets
https://groupgets.com/manufacturers/qwerty-embedded-design/products/lofive-risc-vlowRISC
https://www.lowrisc.orgLinuxBoot
https://www.linuxboot.orgJackTrip for OS X (OSX-Linux audio bridge)
https://ccrma.stanford.edu/software/jacktrip/osx/index.htmlLe Go par l'exemple
https://go.developpez.com/tutoriels/go-par-l-exemple/MultiPath TCP - Linux Kernel implementation
http://www.multipath-tcp.orggoogle/guetzli: Perceptual JPEG encoder
https://github.com/google/guetzliAbout Enlightenment
https://www.enlightenment.org/about-enlightenmentgnu ddd / gdbgui
Encode/AAC – FFmpeg -> libfdk_aac on linux
https://trac.ffmpeg.org/wiki/Encode/AACCoconut Programming Language
http://coconut-lang.orgROOT Data analysis Framework
https://root.cern.chConvert API
https://www.convertapi.com