Documentations pratiques
https://www.cyberciti.biz/tips/linux-security.html
Localiser une adresse IP
Utiliser la position GPS pour être plus précis ?
Comprendre le fonctionnement de OpenSSL
Liste des proxy dispo
https://git.zx2c4.com/Stripe-CTF/about/
https://www.undernews.fr/malwares-virus-antivirus/no-more-ransom-15-nouveaux-outils-gratuits-de-dechiffrage-de-ransomwares.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+undernews%2FoCmA+%28UnderNews%29
https://breakdev.org/
https://www.alexkras.com/
https://en.bitcoin.it/wiki/Vanitygen
https://blockchain.info/address/1Hax4B2j9FC3c73jHhfxrPQmv2zKuiSngv
https://securedorg.github.io/RE101/
https://www.secnumacademie.gouv.fr/
http://www.hexpresso.team/
https://reinproject.org/static/bitcoin-signature-tool/index.html
https://www.asafety.fr/mysql-injection-cheat-sheet/
https://math.rousse.me/challenge/2017/06/28/ndh-black-badge-challenge.html
https://p-te.fr/2017/06/25/ndh2k17-rent-a-kevin/
http://backplanedns.org/
http://beta.hackndo.com/retour-a-la-libc/
http://insecurity-insa.fr/writeUp
https://repo.zenk-security.com/
Liste de proxy dispo (moins fiable ?)
Un petit guide pour la sécurité
http://map.norsecorp.com/#/
https://www.hacking-social.com/sommaire-par-sujets/
https://ungeek.fr/le-petit-guide-du-chasseur-de-drapeaux/
https://www.bitfinex.com/trading/BTCUSD
https://ed25519.cr.yp.to/
https://www.hacking-social.com/sommaire-par-sujets/
https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-crypton.pdf
https://geekflare.com/http-header-implementation/
https://wiki.vvlibri.org/index.php?title=Apache_License_Version_2.0
https://torstatus.blutmagie.de/
https://www.blackhat.com/eu-17/training/schedule/index.html
https://www.redpacketsecurity.com
http://amanda.secured.org/how-to-start-reverse-engineering-malware/
http://www.globalsecuritymag.fr/-Vulnerabilites-.html
https://wpvulndb.com/
https://www.thefanclub.co.za/how-to/how-secure-ubuntu-1604-lts-server-part-1-basics
https://www.youtube.com/c/penetrationtestingwithddos/playlists
http://www.ssi.gouv.fr/particulier/bonnes-pratiques/
http://wikisecu.fr/doku.php
https://www.ssi.gouv.fr/administration/formations/cyberedu/contenu-pedagogique-cyberedu/
http://www.linuxtopia.org/LinuxSecurity/
https://www.keylength.com/fr
Sécurisation de docker :
https://remotephone.github.io/lab/homelab/budget/testing/2016/12/20/practical-docker.html
https://kalilinux.co/
https://techviral.com/best-hacking-ebooks/
https://doc.lagout.org/security/
https://nvd.nist.gov/
http://hackstory.net/Category:Hacker_Groups
https://blog.appcanary.com/2017/http-security-headers.html?utm_content=buffer40882&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
http://hackstory.net/Category:Hackers
http://phrack.org/papers/cyber_grand_shellphish.html
https://misteridigital.wordpress.com/2007/05/30/linux-tools/
https://www.thefanclub.co.za/how-to/how-secure-ubuntu-1604-lts-server-part-1-basics
https://packetstormsecurity.com/files/tags/exploit/
http://www.binarytides.com/install-tor-vidalia-and-polipo-on-ubuntu/
http://www.binarytides.com/proxify-applications-with-torsocks/
https://www.oftc.net/