NorthSec/NorthSec 2015/NorthSec 2015 - Chris Prince - Privacy, Surveillance & Oversight.mp4 |
51.5 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Dave Lewis - DDoS Barbarians at the Gate.mp4 |
49.6 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Eric Evenchick - Hopping on the CAN bus.mp4 |
28.7 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Eugene Rodionov & Aleksandr Matrosov - OO RE with HexraysCodeXplorer.mp4 |
43.9 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Guillaume Ross - CTF or WTF.mp4 |
26.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Jean Francois Cloutier & Francois Gagnon - CHEKS.mp4 |
38.1 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Joan Calvet - The Sednit Group, Cyber Espionage In Eastern Europe.mp4 |
32.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Mathieu Lavoie - Bitcoin Putting the Pseudo Back in Pseudonymous.mp4 |
22.2 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Olivier Bilodeau - Two Years Of Montrehack the local CTF training initiative.mp4 |
31.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Paul Rascagneres - The Uroburos case Analysis of the tools used by this Actor.mp4 |
46.9 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Philip Young - Why You Should (But Don't) Care About Mainframe Security.mp4 |
73 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Philippe Arteau - Breaking PRNGs.mp4 |
17.5 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Rene Freingruber - EMET 5.2 Armor or Curtain.mp4 |
88 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Robert Wood - Threat Modeling for the Gaming Industry.mp4 |
39.8 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Trevor Perrin - TextSecure Protocol Present and Future.mp4 |
27.5 MB |
NorthSec/NorthSec 2016/Eric Evenchick - CANtact An Open Tool for Automotive Exploitation.mp4 |
34.9 MB |
NorthSec/NorthSec 2016/Etienne Martineau - Inter VM Data Exfiltration The Art of Cache Timing Covert Channel ....mp4 |
64.6 MB |
NorthSec/NorthSec 2016/Eugene Rodionov & Alexander Matrosov Analysis of High level Intermediate ....mp4 |
53 MB |
NorthSec/NorthSec 2016/Gabriella Coleman - How Anonymous narrowly Evaded the Cyberterrorism Rhetorical Machine.mp4 |
70.1 MB |
NorthSec/NorthSec 2016/Guillaume Ross & Jordan Rogers - Real Solutions From Real Incidents Save Money and Your Job!.mp4 |
116.2 MB |
NorthSec/NorthSec 2016/Jake Sethi Reiner - Security Problems of an Eleven Year Old and How to Solve Them.mp4 |
9.7 MB |
NorthSec/NorthSec 2016/Laurent Desaulniers - Stupid Pentester Tricks.mp4 |
37 MB |
NorthSec/NorthSec 2016/Lex Gill - Law, Metaphor and the Encrypted Machine.mp4 |
43.9 MB |
NorthSec/NorthSec 2016/Mark Stanislav - Hide Yo’ Kids Hacking Your Family’s Connected Things.mp4 |
81.6 MB |
NorthSec/NorthSec 2016/Masashi Crete Nishihata & John Scott Railton - Not Safe For Organizing....mp4 |
61.5 MB |
NorthSec/NorthSec 2016/Miroslav Stampar - Android Practical Introduction into the (In)Security.mp4 |
68.7 MB |
NorthSec/NorthSec 2016/Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis - YouTube.mp4 |
54.2 MB |
NorthSec/NorthSec 2016/Philippe Arteau - The New Wave of Deserialization Bugs.mp4 |
40.9 MB |
NorthSec/NorthSec 2016/René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures.mp4 |
62.5 MB |
NorthSec/NorthSec 2016/Sophia D’Antoine - Practical Uses of Program Analysis Automatic Exploit Generation.mp4 |
43.5 MB |
NorthSec/NorthSec 2017/Adam Shostack - Pentesting Lessons from Star Wars.mp4 |
79.9 MB |
NorthSec/NorthSec 2017/Charles F. Hamilton - Don’t Kill My Cat.mp4 |
20.8 MB |
NorthSec/NorthSec 2017/Chris Prince - How Surveillance Law was Expanded in Canada, What the Media has Reported, What’s Next.mp4 |
33.1 MB |
NorthSec/NorthSec 2017/David Goulet - Deep Dive Into Tor Onion Services.mp4 |
51.7 MB |
NorthSec/NorthSec 2017/Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4 |
27.1 MB |
NorthSec/NorthSec 2017/Jackson Thuraisamy & Jason Tran - Hacking POS PoS Systems.mp4 |
30.3 MB |
NorthSec/NorthSec 2017/James Kettle - Backslash Powered Scanning Implementing Human Intuition.mp4 |
32 MB |
NorthSec/NorthSec 2017/Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 |
32.4 MB |
NorthSec/NorthSec 2017/Masarah Paquet-Clouston & Olivier Bilodeau - Attacking Linux Moose Unraveled an Ego Market.mp4 |
43 MB |
NorthSec/NorthSec 2017/Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer.mp4 |
40.1 MB |
NorthSec/NorthSec 2017/Pierre-Alexandre Braeken - Hack Microsoft Using Microsoft Signed Binaries.mp4 |
42.6 MB |
NorthSec/NorthSec 2017/Richard Thieme - The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals.mp4 |
96.5 MB |
NorthSec/NorthSec 2017/Shawn Marriott - Data Science Tools and Techniques for the Blue Team.mp4 |
34.4 MB |
NorthSec/NorthSec 2017/Thomas Pornin - BearSSL SSL For all Things.mp4 |
59.7 MB |
NorthSec/NorthSec 2018/Charles Hamilton - A Journey into Red Team.en.transcribed.srt |
169 KB |
NorthSec/NorthSec 2018/Charles Hamilton - A Journey into Red Team.mp4 |
35.4 MB |
NorthSec/NorthSec 2018/Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).en.transcribed.srt |
181 KB |
NorthSec/NorthSec 2018/Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).mp4 |
65 MB |
NorthSec/NorthSec 2018/Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.en.transcribed.srt |
103 KB |
NorthSec/NorthSec 2018/Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.mp4 |
47.1 MB |
NorthSec/NorthSec 2018/Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.en.transcribed.srt |
137 KB |
NorthSec/NorthSec 2018/Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.mp4 |
53.2 MB |
NorthSec/NorthSec 2018/Dimitry Snezhkov -- Quick Retooling with.NET Payloads.en.transcribed.srt |
132 KB |
NorthSec/NorthSec 2018/Dimitry Snezhkov -- Quick Retooling with.NET Payloads.mp4 |
51.7 MB |
NorthSec/NorthSec 2018/Eleanor Saitta - How to Think (About Complex Adversarial Systems).en.transcribed.srt |
127 KB |
NorthSec/NorthSec 2018/Eleanor Saitta - How to Think (About Complex Adversarial Systems).mp4 |
79.7 MB |
NorthSec/NorthSec 2018/Filip Kafla -- From Hacking Team to Hacked Team to….en.transcribed.srt |
37 KB |
NorthSec/NorthSec 2018/Filip Kafla -- From Hacking Team to Hacked Team to….mp4 |
24.1 MB |
NorthSec/NorthSec 2018/Karla Burnett - Ichthyology Phishing as a Science.en.transcribed.srt |
101 KB |
NorthSec/NorthSec 2018/Karla Burnett - Ichthyology Phishing as a Science.mp4 |
23.7 MB |
NorthSec/NorthSec 2018/Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.en.transcribed.srt |
162 KB |
NorthSec/NorthSec 2018/Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.mp4 |
53.1 MB |
NorthSec/NorthSec 2018/Laurent Desaulniers - Stupid Purple Teamer Tricks.en.transcribed.srt |
43 KB |
NorthSec/NorthSec 2018/Laurent Desaulniers - Stupid Purple Teamer Tricks.mp4 |
18 MB |
NorthSec/NorthSec 2018/Laurent Desaulniers - Stupid RedTeamer Tricks.en.transcribed.srt |
53 KB |
NorthSec/NorthSec 2018/Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 |
20.2 MB |
NorthSec/NorthSec 2018/Marc-André Labonté - The Blackbear Project.en.transcribed.srt |
47 KB |
NorthSec/NorthSec 2018/Marc-André Labonté - The Blackbear Project.mp4 |
29.1 MB |
NorthSec/NorthSec 2018/Mark Mossberg - Binary analysis, meet the blockchain.en.transcribed.srt |
142 KB |
NorthSec/NorthSec 2018/Mark Mossberg - Binary analysis, meet the blockchain.mp4 |
75.3 MB |
NorthSec/NorthSec 2018/Martijn Grooten -- Getting ahead of the elliptic curve.en.transcribed.srt |
123 KB |
NorthSec/NorthSec 2018/Martijn Grooten -- Getting ahead of the elliptic curve.mp4 |
58.4 MB |
NorthSec/NorthSec 2018/Masha Alimardani - Tightening the Net in Iran.en.transcribed.srt |
110 KB |
NorthSec/NorthSec 2018/Masha Alimardani - Tightening the Net in Iran.mp4 |
90.6 MB |
NorthSec/NorthSec 2018/Melanie Segado -- Brain Implants & Mind Reading.en.transcribed.srt |
102 KB |
NorthSec/NorthSec 2018/Melanie Segado -- Brain Implants & Mind Reading.mp4 |
31.2 MB |
NorthSec/NorthSec 2018/Olivier Arteau -- Prototype pollution attacks in NodeJS applications.en.transcribed.srt |
65 KB |
NorthSec/NorthSec 2018/Olivier Arteau -- Prototype pollution attacks in NodeJS applications.mp4 |
23.5 MB |
NorthSec/NorthSec 2018/Paul Rascagneres & Warren Mercer - Surprise Supplies!.en.transcribed.srt |
122 KB |
NorthSec/NorthSec 2018/Paul Rascagneres & Warren Mercer - Surprise Supplies!.mp4 |
49.7 MB |
NorthSec/NorthSec 2018/Robert Sell - Exploits in Wetware.en.transcribed.srt |
140 KB |
NorthSec/NorthSec 2018/Robert Sell - Exploits in Wetware.mp4 |
47.5 MB |
NorthSec/NorthSec 2018/Ron Bowes - Video game hacks, cheats, and glitches.en.transcribed.srt |
134 KB |
NorthSec/NorthSec 2018/Ron Bowes - Video game hacks, cheats, and glitches.mp4 |
54.1 MB |
NorthSec/NorthSec 2018/Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.en.transcribed.srt |
135 KB |
NorthSec/NorthSec 2018/Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.mp4 |
51.9 MB |
NorthSec/NorthSec 2018/Sebastien Larinier (sebdraven) - Python and Machine Learning.mp4 |
65.8 MB |
NorthSec/NorthSec 2018/Silvia Väli - Only an Electron away from code execution.en.transcribed.srt |
59 KB |
NorthSec/NorthSec 2018/Silvia Väli - Only an Electron away from code execution.mp4 |
25.7 MB |
NorthSec/NorthSec 2018/Stephane Graber - What are containers exactly and can they be trusted.en.transcribed.srt |
134 KB |
NorthSec/NorthSec 2018/Stephane Graber - What are containers exactly and can they be trusted.mp4 |
55.3 MB |
NorthSec/NorthSec 2018/Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.en.transcribed.srt |
47 KB |
NorthSec/NorthSec 2018/Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.mp4 |
18.9 MB |
NorthSec/NorthSec 2018/Thomas Pornin - Non-Crypto Constant-Time Coding.mp4 |
29.4 MB |
NorthSec/NorthSec 2018/Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.en.transcribed.srt |
55 KB |
NorthSec/NorthSec 2018/Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.mp4 |
24.6 MB |
NorthSec/NorthSec Logo.jpg |
12 KB |
NorthSec/NorthSec thank you.txt |
756 B |