/
|
Hackfest logo.jpg
|
5.1 KB
|
Hackfest thank you.txt
|
1.2 KB
|
/HackerSpace 2013/
|
HackerSpace - 25 avril 2013 - Attaques contre les serveurs DNS et contre-mesures.mp4
|
84.8 MB
|
HackerSpace - 26 sept - Hacker les aires.mp4
|
176.9 MB
|
HackerSpace - 27 juin - Assembleur x86 - Reverse - Shellcode.mp4
|
180.1 MB
|
HackerSpace - 28 novembre - Retour sur le Hackfest 2013.mp4
|
282.7 MB
|
HackerSpace - Jan 2013 - Why NTLM sucks part 1.mp4
|
5.4 MB
|
HackerSpace - Jan 2013 - Why NTLM sucks part 2.mp4
|
5.3 MB
|
HackerSpace - Mar 2013 - Tor.mp4
|
131.9 MB
|
/HackerSpace 2014/
|
HackerSpace - 23 janvier 2014 - Securite par revendication.mp4
|
80.0 MB
|
HackerSpace - 24 avril 2014 - HeartBleed De A to Z.mp4
|
80.9 MB
|
HackerSpace - 25 septembre 2014 - L'heritage et futur proche des techniques de survies Viral.mp4
|
256.4 MB
|
HackerSpace - 27 fevrier 2014 - Initiation aux buffer overflows.mp4
|
15.9 MB
|
HackerSpace - 27 mars - Hacking Jam Session.mp4
|
87.2 MB
|
HackerSpace - August 2014 - Mon pot de miel.mp4
|
59.4 MB
|
HackerSpace - Juin 2014 - Radiocommunication pour tous.mp4
|
95.1 MB
|
HackerSpace - July 2014 - We clean up shit.en(transcribed).srt
|
158.8 KB
|
HackerSpace - July 2014 - We clean up shit.mp4
|
90.6 MB
|
HackerSpace - May 2014 - BeEF me UP.mp4
|
33.7 MB
|
HackerSpace - Novembre 2014 - Retour sur le Hackfest et CTF 2014.mp4
|
265.4 MB
|
/HackerSpace 2015/
|
HackerSpace - Fevrier 2015 - How to secure a web server like a boss.mp4
|
348.0 MB
|
HackerSpace - Janvier 2015 - Return Oriented Programming.mp4
|
107.4 MB
|
HackerSpace - Juillet 2015 - Techniques d'enquête et outils.mp4
|
153.3 MB
|
HackerSpace - Juin 2015 - Atelier Workshop - Analyse de packet avec Python.mp4
|
139.4 MB
|
HackerSpace - Mars 2015 - Attaquer les applications Malware Android.mp4
|
367.4 MB
|
HackerSpace - Septembre 2015 - Introduction au développement sécuritaire.mp4
|
134.7 MB
|
/HackerSpace 2016/
|
Encoding vs Hashing vs Encrypting vs Obfuscating et la suite.mp4
|
343.3 MB
|
HackerSpace - 25 Février 2016 - SSL TLS pour les non-cryptologues.mp4
|
150.7 MB
|
HackerSpace - 28 Janvier 2016 - Is your Application DDoS Ready.en(transcribed).srt
|
67.1 KB
|
HackerSpace - 28 Janvier 2016 - Is your Application DDoS Ready.mp4
|
36.2 MB
|
HackerSpace - Retour sur le Hackfest 2016.en(transcribed).srt
|
74.9 KB
|
HackerSpace - Retour sur le Hackfest 2016.mp4
|
143.4 MB
|
/HackerSpace 2017/
|
HackerSpace - Réseau Zéro Confiance.mp4
|
84.1 MB
|
/Hackfest 6 2014/
|
Hackfest 2014 - Francois Lajeunesse-Robert a presente - Web Scrambler Reloaded.mp4
|
70.2 MB
|
Hackfest 2014 - Ian Amit presented - Red white and blue. Making sense of Red Teaming for good.mp4
|
138.3 MB
|
Hackfest 2014 - Jason Gillam presented - Web Penetration Testing with Burp and CO2.mp4
|
122.1 MB
|
Hackfest 2014 - Lockpicking NerfGun Challenge.mp4
|
7.1 MB
|
Hackfest 2014 - Nadim Kobeissi presented - miniLock - Advances in Usable Cryptography.mp4
|
123.7 MB
|
Hackfest 2014 - RenderMan aka Brad Haines presented.mp4
|
134.8 MB
|
Hackfest 2014 - Theo de Raadt presented - arc4random - randomization for all occasions.mp4
|
104.0 MB
|
/Hackfest 7 2015/
|
Hackfest 2015 - Francois Gagnon presented - Les communications dans les applications mobiles.mp4
|
86.6 MB
|
Hackfest 2015 - Francois Harvey presented.mp4
|
78.7 MB
|
Hackfest 2015 - John McAfee presented - The unconventional truth.mp4
|
21.3 MB
|
Hackfest 2015 - Johnny Xmas presented - 1993 BC Get Off my LAN.mp4
|
126.3 MB
|
Hackfest 2015 - Julien Mbony & Patrick Roy presented - L'impact du blockchain dans le monde virtuel.mp4
|
99.8 MB
|
Hackfest 2015 - Marc Andre Belanger - Top 5 des facons d'etre responsable de la perte de 1M.mp4
|
43.7 MB
|
Hackfest 2015 - Mike Larkin presented - Kernel WX Improvements In OpenBSD.mp4
|
75.2 MB
|
Hackfest 2015 - Nadia Vigneault presented - Forensic 201.mp4
|
146.1 MB
|
Hackfest 2015 - Nicolas Gregoire presented - Server Side Browsing.mp4
|
88.0 MB
|
Hackfest 2015 - Olivier Bilodeau & Thomas Dupuy presented Internet of {Things,Threats}.mp4
|
86.0 MB
|
Hackfest 2015 - Roy Firestein presented - Cymon - An Open Threat Intelligence System.mp4
|
124.1 MB
|
Hackfest 2015 - Shane MacDougall presented.mp4
|
87.3 MB
|
Hackfest 2015 - Theo de Raadt presented - Pledge - A new security technology in openbsd.mp4
|
146.4 MB
|
/Hackfest 8 2016/
|
Hackfest 2016 - Aaron Guzman presented Make iOS Hacking Great Again - The Easy Wins.mp4
|
107.2 MB
|
Hackfest 2016 - Aaron Hnatiw presented - Racing the Web.mp4
|
95.1 MB
|
Hackfest 2016 - Alexandre Guedon presented - Seecuritee Docker en production.mp4
|
60.6 MB
|
Hackfest 2016 - Benjamin Brown presented The New Wave Of Account Checkers And Underground Rewards Fraud.mp4
|
105.7 MB
|
Hackfest 2016 - Bernard Bolduc presente Histoire d'un hack.mp4
|
68.6 MB
|
Hackfest 2016 - Blake Cornell presented Come Bring all your Drones to the Yard.mp4
|
87.4 MB
|
Hackfest 2016 - Chad M. Dewey presented Pentesting Cruise Ships OR Hacking the High Seas.mp4
|
73.8 MB
|
Hackfest 2016 - Cheryl Biswas & Haydn Johnson presented Blue Team Reboot.mp4
|
86.1 MB
|
Hackfest 2016 - Cheryl Biswas presented A Stuxnet for Mainframes.mp4
|
85.5 MB
|
Hackfest 2016 - Chris Nickerson - Adversarial Simulation - Why your defenders are the Fighter Pilots.mp4
|
143.3 MB
|
Hackfest 2016 - Dumpster diving du 21ème siècle - The garbage is leaking juice.mp4
|
283.2 MB
|
Hackfest 2016 - Geoffrey Vaughan presented - Catching IMSI Catchers.mp4
|
39.0 MB
|
Hackfest 2016 - Hypotheses on burnout and stress related illnesses in relation to Cyber Security practitioners.mp4
|
76.6 MB
|
Hackfest 2016 - Ian Bouchard presented Abusing PHP 7s OPcache to Spawn Webshells.mp4
|
35.3 MB
|
Hackfest 2016 - Johnny Xmas & Benjamin Brown presented How I Darkweb Economies (and You Can Too).mp4
|
118.2 MB
|
Hackfest 2016 - Marc Dovero presente Le dispositif Franccais de lutte contre le cyber-terrorisme.mp4
|
114.3 MB
|
Hackfest 2016 - Mathieu Lavoie & David Decary-Hetu - De-anonymizing Bitcoin one transaction at a time.mp4
|
108.9 MB
|
Hackfest 2016 - Maxime Lamothe-Brassard presented - Hunting with LimaCharlie.mp4
|
55.4 MB
|
Hackfest 2016 - Michael Bennet - Clogging the Futures Series of Tubes - A look at HTTP2 DDoS Attacks.mp4
|
75.3 MB
|
Hackfest 2016 - Mickael Nadeau presented Game Hacking Exposed.mp4
|
100.1 MB
|
Hackfest 2016 - Nadia Vigneault & Sylvain Desharnais presented - Strateegies de fouille et recherches de preuves.mp4
|
118.5 MB
|
Hackfest 2016 - Patrick presente BurpSmartBuster - A smart way to find hidden treasures the next steps.mp4
|
46.4 MB
|
Hackfest 2016 - Paul Rascagneres presented Windows systems & code signing protection.mp4
|
75.8 MB
|
Hackfest 2016 - Pierre Ernst presented - Fixing the Java Serialization mess.mp4
|
93.6 MB
|
Hackfest 2016 - RenderMan and Murdoch_Monkey presented - Hacking the Internet of Dongs.mp4
|
136.4 MB
|
Hackfest 2016 - Sarah Jamie Lewis presented - Untangling the Dark Web - Unmasking Onion Services.mp4
|
72.6 MB
|
Hackfest 2016 - Stephanie Snow Carruthers presented This Phish Goes To 11.mp4
|
88.0 MB
|
Hackfest 2016 - Stephen Hall presented Your configs are bad and you should feel bad.mp4
|
49.6 MB
|
Hackfest 2016 - Sun Huang & Wayne Huang - Unveiling One of the Worlds Biggest and Oldest Cybercrime Gangs.mp4
|
76.9 MB
|
Hackfest 2016 - Sunny Wear presented Exploit Kits - The Biggest Threat You Know Nothing About.mp4
|
36.4 MB
|
/Hackfest 9 2017/
|
100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto).eng.srt
|
13.8 KB
|
100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto).mp4
|
29.0 MB
|
Attack Driven Development Getting Started in Application Security (Keith Hoodlet).eng.srt
|
104.5 KB
|
Attack Driven Development Getting Started in Application Security (Keith Hoodlet).mp4
|
129.6 MB
|
Banking on Insecurity Why Attackers Can Take the Money and Run (Cheryl Biswas).eng.srt
|
90.5 KB
|
Banking on Insecurity Why Attackers Can Take the Money and Run (Cheryl Biswas).mp4
|
133.7 MB
|
Between You and Me and the Network Security Boundary (Patrick Fussell).eng.srt
|
69.6 KB
|
Between You and Me and the Network Security Boundary (Patrick Fussell).mp4
|
46.6 MB
|
BITSInject - control your BITS, get SYSTEM (Dor Azouri).eng.srt
|
70.5 KB
|
BITSInject - control your BITS, get SYSTEM (Dor Azouri).mp4
|
78.3 MB
|
Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong).eng.srt
|
84.5 KB
|
Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong).mp4
|
96.7 MB
|
Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez).eng.srt
|
66.4 KB
|
Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez).mp4
|
76.6 MB
|
Élection présidentielle Française 2 0 (Damien Bancal).mp4
|
19.6 MB
|
Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon).eng.srt
|
79.0 KB
|
Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon).mp4
|
78.5 MB
|
Genetic Algorithms for Brute Forcing (Christopher Ellis).eng.srt
|
78.6 KB
|
Genetic Algorithms for Brute Forcing (Christopher Ellis).mp4
|
50.0 MB
|
Hadoop safari Hunting for vulnerabilities (Mahdi Braik & Thomas Debize).eng.srt
|
86.1 KB
|
Hadoop safari Hunting for vulnerabilities (Mahdi Braik & Thomas Debize).mp4
|
112.0 MB
|
How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas).eng.srt
|
132.4 KB
|
How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas).mp4
|
135.1 MB
|
Introducing CSE’s open source AssemblyLine (Steve Garon & John O’Brien).mp4
|
77.7 MB
|
Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité (Marc-André Bélanger).mp4
|
53.5 MB
|
Lessons Learned Hunting IoT Malware (Olivier Bilodeau).eng.srt
|
89.5 KB
|
Lessons Learned Hunting IoT Malware (Olivier Bilodeau).mp4
|
113.3 MB
|
Practical Analysis of Awareness (Kendra Coooley).eng.srt
|
72.0 KB
|
Practical Analysis of Awareness (Kendra Coooley).mp4
|
85.6 MB
|
Propriétés des preuves numériques et considérations à leur cueillette (Sylvain Desharnais).mp4
|
72.7 MB
|
Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner).eng.srt
|
88.9 KB
|
Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner).mp4
|
71.0 MB
|
Selenium dark side of the moon (Adam Reiser).eng.srt
|
86.6 KB
|
Selenium dark side of the moon (Adam Reiser).mp4
|
81.7 MB
|
SniffAir - OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott).eng.srt
|
61.0 KB
|
SniffAir - OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott).mp4
|
71.7 MB
|
Stantinko Un botnet aux multiples facettes (Matthieu Faou & Frédéric Vachon).mp4
|
52.4 MB
|
Static-Analysis Tools Now you’re Playing with Power (Philippe Arteau).eng.srt
|
78.1 KB
|
Static-Analysis Tools Now you’re Playing with Power (Philippe Arteau).mp4
|
118.2 MB
|
Superhéros Tous Comment l’empathie peut aider l’inclusion des personnel avec ASD-ADHD (Michelle).mp4
|
99.5 MB
|
The Black Art of Wireless Post-Exploitation (Gabriel Ryan).eng.srt
|
92.2 KB
|
The Black Art of Wireless Post-Exploitation (Gabriel Ryan).mp4
|
41.1 MB
|
Vaccination - An Anti-Honeypot Approach (Gal Bitensky).eng.srt
|
74.9 KB
|
Vaccination - An Anti-Honeypot Approach (Gal Bitensky).mp4
|
85.1 MB
|
/Hackfest 10 2018/
|
Automatisation de la réponse, introduction au standard OpenC2 (David Girard).mp4
|
17.4 MB
|
Blazing Secure Egress Traffic with Smokescreen ( Marc-André Tremblay).eng.srt
|
55.8 KB
|
Blazing Secure Egress Traffic with Smokescreen ( Marc-André Tremblay).mp4
|
15.6 MB
|
Breach Analytica Exploring the history & design of hacked data services (Trevor and Pamela).eng.srt
|
80.0 KB
|
Breach Analytica Exploring the history & design of hacked data services (Trevor and Pamela).mp4
|
35.5 MB
|
CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner).eng.srt
|
111.7 KB
|
CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner).mp4
|
25.1 MB
|
Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi).eng.srt
|
37.4 KB
|
Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi).mp4
|
15.2 MB
|
Discours d'ouverture du Hackfest 2018 avec l'honorable Karina Gould.mp4
|
17.8 MB
|
Don’t Bring Me Down Weaponized Botnets Anyone (Cheryl Biswas).eng.srt
|
55.1 KB
|
Don’t Bring Me Down Weaponized Botnets Anyone (Cheryl Biswas).mp4
|
92.1 MB
|
Exploiting Connected Medical Devices Lessons Learned & Data Earned (Saurabh Harit).eng.srt
|
69.2 KB
|
Exploiting Connected Medical Devices Lessons Learned & Data Earned (Saurabh Harit).mp4
|
18.7 MB
|
Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio).eng.srt
|
50.2 KB
|
Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio).mp4
|
42.4 MB
|
Hacking COMBUS in a Paradox security system (Kirils Solovjovs).eng.srt
|
75.3 KB
|
Hacking COMBUS in a Paradox security system (Kirils Solovjovs).mp4
|
20.3 MB
|
Harakiri Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman).eng.srt
|
71.5 KB
|
Harakiri Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman).mp4
|
8.7 MB
|
How to bypass an IDS with netcat and linux (Kirill Shipulin).eng.srt
|
39.0 KB
|
How to bypass an IDS with netcat and linux (Kirill Shipulin).mp4
|
26.6 MB
|
ICS A deeper dive into defending and attacking operational technology (Liam Graves).eng.srt
|
66.1 KB
|
ICS A deeper dive into defending and attacking operational technology (Liam Graves).mp4
|
32.0 MB
|
La chasse aux menaces est ouverte - Débuter le Threat Hunting (Éric Gagnon).mp4
|
35.6 MB
|
Mise à jour des menaces et des risques informatique au Canada (Steve Waterhouse).mp4
|
75.1 MB
|
More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White).eng.srt
|
93.8 KB
|
More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White).mp4
|
25.5 MB
|
Parlons d’enjeux nationaux sécurité informatique envers la démocratie Un état de situation (panel).mp4
|
25.5 MB
|
RGPD en Europe 6 mois d’expériences (Damien Bancal).mp4
|
40.7 MB
|
RHme3 hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner).eng.srt
|
141.0 KB
|
RHme3 hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner).mp4
|
78.6 MB
|
Shut Up and Take My Money Scraping the Venmo Public Feed (Johnny Xmas).eng.srt
|
94.3 KB
|
Shut Up and Take My Money Scraping the Venmo Public Feed (Johnny Xmas).mp4
|
19.9 MB
|
So You Want To Be A Consultant Here’s The Fine Print… (Justin Ryder).eng.srt
|
61.4 KB
|
So You Want To Be A Consultant Here’s The Fine Print… (Justin Ryder).mp4
|
91.1 MB
|
Surviving a Cat-astrophe The Art of Crisis Management as told through LOLcatz (Jen Ellis).eng.srt
|
76.6 KB
|
Surviving a Cat-astrophe The Art of Crisis Management as told through LOLcatz (Jen Ellis).mp4
|
86.9 MB
|
Throwing it out the Windows Exfiltration d’identifiants Active Directory (Léanne Dutil).mp4
|
27.5 MB
|
Utilisation de GPU pour l’inspection de trafic réseau (Martin Dubois).mp4
|
28.6 MB
|
Vibing Your Way Through an Enterprise - How Attackers are Becoming More Sneaky (Matt Eidelberg).eng.srt
|
56.5 KB
|
Vibing Your Way Through an Enterprise - How Attackers are Becoming More Sneaky (Matt Eidelberg).mp4
|
42.3 MB
|
Who wrote this smart contract Privacy and Anonymity in Blockchain (Alina Matyukhina).mp4
|
22.3 MB
|
Your Bank’s Digital Side Door (Steven Danneman).eng.srt
|
75.4 KB
|
Your Bank’s Digital Side Door (Steven Danneman).mp4
|
35.7 MB
|
/Hackfest 11 2019/
|
7 habits of highly effective adversaries (Joe Gray).eng.srt
|
70.1 KB
|
7 habits of highly effective adversaries (Joe Gray).mp4
|
84.8 MB
|
A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil).eng.srt
|
60.3 KB
|
A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil).mp4
|
46.9 MB
|
A more secure management of front-end dependencies (Jérémy Matos).eng.srt
|
63.8 KB
|
A more secure management of front-end dependencies (Jérémy Matos).mp4
|
53.2 MB
|
Adventures in obfuscated mobile adware (Kristina Balaam).eng.srt
|
56.2 KB
|
Adventures in obfuscated mobile adware (Kristina Balaam).mp4
|
54.7 MB
|
Avez-vous confiance en votre PKI (Joniel Gagné Laurin).mp4
|
36.2 MB
|
Brokers Guild Incident Response (Vincent Marcus).eng.srt
|
65.8 KB
|
Brokers Guild Incident Response (Vincent Marcus).mp4
|
46.6 MB
|
Capture de traffic réseau - haute vitesse et filtre avancés (Martin Dubois).mp4
|
85.0 MB
|
Comment bâtir un labo pour détonations de malware (Jean-Philippe Taggart & Jerome Segura).mp4
|
60.2 MB
|
Conclusions from Tracking Server attacks at scale (Ophir Harpaz & Daniel Golberg).eng.srt
|
71.2 KB
|
Conclusions from Tracking Server attacks at scale (Ophir Harpaz & Daniel Golberg).mp4
|
50.0 MB
|
Curiosity Killed the Cat Legal Implications of Off-Duty Vulnerability Exposure (Anna Manley).eng.srt
|
121.6 KB
|
Curiosity Killed the Cat Legal Implications of Off-Duty Vulnerability Exposure (Anna Manley).mp4
|
84.3 MB
|
Cybersécurité et pays en voie de développementAmérique Latine et Caraïbes (Blaise Arbouet).mp4
|
62.7 MB
|
Cérémonie de fermeture - CTF (Franck & Crew).mp4
|
23.1 MB
|
Cérémonie de fermeture - Stats et Social Engineering (Patrick & Crew).eng.srt
|
13.8 KB
|
Cérémonie de fermeture - Stats et Social Engineering (Patrick & Crew).mp4
|
15.4 MB
|
Dark What Démystifier le buzz via la présentation d’un outil open-source (Félix Lehoux).mp4
|
87.0 MB
|
Design The Art of Building Security Programs (J. Wolfgang Goerlich).mp4
|
78.2 MB
|
Everyone is hackable. How long will it take you to notice (Shira Shamban).eng.srt
|
51.7 KB
|
Everyone is hackable. How long will it take you to notice (Shira Shamban).mp4
|
50.0 MB
|
F2P - Free to pawn (Marc André Bélanger).mp4
|
64.4 MB
|
Gold nuggeting Intuition, apprentissage machine et test d’intrusion (Serge Olivier Paquette).mp4
|
56.1 MB
|
Initiation à la sociologie au service du SE et de l’OSINT (Hugo Benoist).mp4
|
59.5 MB
|
Introduction to Security and Machine Learning (Wendy Edwards).eng.srt
|
94.7 KB
|
Introduction to Security and Machine Learning (Wendy Edwards).mp4
|
76.6 MB
|
Mind the gap - managing insecurity in enterprise IoT (Cheryl Biswas).eng.srt
|
80.9 KB
|
Mind the gap - managing insecurity in enterprise IoT (Cheryl Biswas).mp4
|
95.9 MB
|
Quand les mails du gouvernement se promènent dans le darknet (Damien Bancal).mp4
|
31.2 MB
|
Recent developments in designing price-stable cryptocurrencies (Mahsa Moosavi).eng.srt
|
32.9 KB
|
Recent developments in designing price-stable cryptocurrencies (Mahsa Moosavi).mp4
|
30.8 MB
|
Surface d’attaque du gouvernement (Steve Waterhouse).mp4
|
39.8 MB
|
Techniques d’attaque et de défense dans AWS (Cédric Thibault).mp4
|
105.6 MB
|
The Mechanics of Malware’s Darkside (Yagnesh Waran P & Laura Harris).mp4
|
82.4 MB
|
The OSINT Space is Growing Are we Ready (Adrian Korn).eng.srt
|
62.3 KB
|
The OSINT Space is Growing Are we Ready (Adrian Korn).mp4
|
46.9 MB
|
Unveiling the not-PowerShell cult (Mangatas Tondang).eng.srt
|
74.3 KB
|
Unveiling the not-PowerShell cult (Mangatas Tondang).mp4
|
116.4 MB
|
War in the fifth dimension - An overview of the Weaponization of Information (Alana Stazz).eng.srt
|
110.3 KB
|
War in the fifth dimension - An overview of the Weaponization of Information (Alana Stazz).mp4
|
113.7 MB
|
You shall not pass, even if you look like a hobbit-an appeal to smarter physical sec (Remy Baccino).mp4
|
105.4 MB
|
Zero-trust à l’ère des fuites massives d’informations (Nicolas-Loïc Fortin).mp4
|
87.6 MB
|
/Hackfest 12 2020/
|
Behavior & Reputation based filtering reloaded (Philippe Humeau & Thibault Koechlin).eng.srt
|
92.8 KB
|
Behavior & Reputation based filtering reloaded (Philippe Humeau & Thibault Koechlin).mp4
|
109.8 MB
|
Template Injection in Action (Philippe Arteau).eng.srt
|
149.7 KB
|
Template Injection in Action (Philippe Arteau).mp4
|
388.9 MB
|
Trust, but Verify Maintaining Democracy In Spite (Allie Mellen).eng.srt
|
74.5 KB
|
Trust, but Verify Maintaining Democracy In Spite (Allie Mellen).mp4
|
118.1 MB
|
Urban Exploration - A COVID-Friendly Hacker Hobby (Johnny Xmas).eng.srt
|
62.1 KB
|
Urban Exploration - A COVID-Friendly Hacker Hobby (Johnny Xmas).mp4
|
459.2 MB
|
You Shared What Seriously (Don & Bronwyn Mallory).eng.srt
|
82.5 KB
|
You Shared What Seriously (Don & Bronwyn Mallory).mp4
|
107.9 MB
|
/Hackfest 2021/
|
Décrocher son stage ou sa première expérience en TI (Karolynn Boutet).mp4
|
53.3 MB
|
Hackfest CTFs 2021 - CDW Canada Opening Remarks.eng(transcribed).eng(transcribed).srt
|
5.3 KB
|
Hackfest CTFs 2021 - CDW Canada Opening Remarks.mp4
|
6.3 MB
|
L'importance d'un cadre de conformité en PME (Steve Lavoie).mp4
|
33.0 MB
|
Le grand saut en Cybersécurité (Danny Boivin).mp4
|
28.7 MB
|
Metasploit 101 (Amiran Alavidze & Dan Reimer).eng(transcribed) (2).eng(transcribed).srt
|
300.7 KB
|
Metasploit 101 (Amiran Alavidze & Dan Reimer).mp4
|
260.1 MB
|
Réseaux sociaux et vie privée Les dangers et les bonnes pratiques à adopter (Julien Teste Harnois).mp4
|
22.2 MB
|
Security Tools 101 Tools of the Trade (Josh Galvez).eng(transcribed) (2).eng(transcribed).srt
|
65.3 KB
|
Security Tools 101 Tools of the Trade (Josh Galvez).mp4
|
40.1 MB
|
Table ronde sur l'éducation en matière de sécurité de l'information et vie privée.mp4
|
78.6 MB
|
Threat modeling Field guide to staying ahead of the bad guys (Samuel Dussault).eng(transcribed) (2).eng(transcribed).srt
|
101.7 KB
|
Threat modeling Field guide to staying ahead of the bad guys (Samuel Dussault).mp4
|
51.2 MB
|
/Hackfest 2022/
|
8 stratégies efficaces pour rater sa gestion de crise - Alexandre Fournier.eng.srt
|
88.5 KB
|
8 stratégies efficaces pour rater sa gestion de crise - Alexandre Fournier.mp4
|
45.5 MB
|
AppSec the missing link - Francois Lajeunesse Robert.eng.srt
|
80.3 KB
|
AppSec the missing link - Francois Lajeunesse Robert.mp4
|
43.5 MB
|
Avoir les bleus dans un monde rouge - Jacques Sauvé.eng.srt
|
54.7 KB
|
Avoir les bleus dans un monde rouge - Jacques Sauvé.mp4
|
44.4 MB
|
AWS sous attaque - Cédric Thibault.eng.srt
|
101.8 KB
|
AWS sous attaque - Cédric Thibault.mp4
|
63.3 MB
|
Certification 101 - Steve Lavoie.eng.srt
|
58.4 KB
|
Certification 101 - Steve Lavoie.mp4
|
42.3 MB
|
Defrauding merchants like it's Y2k - Craig Barretto and Yuk Fai Chan.eng.srt
|
39.6 KB
|
Defrauding merchants like it's Y2k - Craig Barretto and Yuk Fai Chan.mp4
|
23.0 MB
|
Discours d'ouverture - Éric Caire.eng.srt
|
11.9 KB
|
Discours d'ouverture - Éric Caire.mp4
|
3.9 MB
|
Le droit et la cybersécurité - qui est responsable quand un objet connecté disjoncte - Vanessa Henri.eng.srt
|
106.5 KB
|
Le droit et la cybersécurité - qui est responsable quand un objet connecté disjoncte - Vanessa Henri.mp4
|
52.9 MB
|
Les interventions policières sur les facilitateurs du crime - David Décary Hétu.eng.srt
|
42.9 KB
|
Les interventions policières sur les facilitateurs du crime - David Décary Hétu.mp4
|
20.9 MB
|
Mon cheminement vers la sécurité mon père m'a forcé - William P Hogue et Éric Hogue.eng.srt
|
24.3 KB
|
Mon cheminement vers la sécurité mon père m'a forcé - William P Hogue et Éric Hogue.mp4
|
18.0 MB
|
Office under siege Understanding, discovering and preventing attacks against M365 - Dmitriy Beryoza.eng.srt
|
87.1 KB
|
Office under siege Understanding, discovering and preventing attacks against M365 - Dmitriy Beryoza.mp4
|
52.8 MB
|
Pourquoi comment financer une startup en cybersécurité via le capital de risque - Gabriel Tremblay.eng.srt
|
82.2 KB
|
Pourquoi comment financer une startup en cybersécurité via le capital de risque - Gabriel Tremblay.mp4
|
37.4 MB
|
Purple RD Red and Blue Tradecraft around Remote Desktop Protocol - Olivier Bilodeau.eng.srt
|
74.4 KB
|
Purple RD Red and Blue Tradecraft around Remote Desktop Protocol - Olivier Bilodeau.mp4
|
46.5 MB
|
Purple teaming From SIlos to Heroes - Martin Dubé et Dany Lafrenière.eng.srt
|
70.9 KB
|
Purple teaming From SIlos to Heroes - Martin Dubé et Dany Lafrenière.mp4
|
46.5 MB
|
Savoir négocier et se vendre - Karolynn Boulet.eng.srt
|
66.1 KB
|
Savoir négocier et se vendre - Karolynn Boulet.mp4
|
28.2 MB
|
Un Hacking Workflow - VsCode, Git, Terraform et Malware Dev - Félix Lehoux.eng.srt
|
98.5 KB
|
Un Hacking Workflow - VsCode, Git, Terraform et Malware Dev - Félix Lehoux.mp4
|
45.0 MB
|
You can CTF but can you pentest - Stephen Hall.eng.srt
|
86.9 KB
|
You can CTF but can you pentest - Stephen Hall.mp4
|
42.6 MB
|
/Hackfest Holidays 2020/
|
ByeBye Sécurité Informatique - Québec 2020.mp4
|
112.3 MB
|
Hacking Android & iOS apps with Deep Links and XSS.eng.srt
|
111.5 KB
|
Hacking Android & iOS apps with Deep Links and XSS.mp4
|
84.5 MB
|
Introduction to Burp Suite and Web hacking (Bilingual FREN).mp4
|
49.7 MB
|
Noel au pays des firmwares (workshop).mp4
|
79.7 MB
|
The ReZer0 loader a malicious Dot Net based loader with a flaw.eng.srt
|
54.6 KB
|
The ReZer0 loader a malicious Dot Net based loader with a flaw.mp4
|
37.0 MB
|
/iHack 2015/
|
iHack 2015 - Ecosysteme Developpement Android - Reversing et Debuggage d'applications Android.mp4
|
342.1 MB
|
iHack 2015 - Network Forensics.mp4
|
75.3 MB
|
iHack 2015 - Vie privee en ligne soyez anonyme.mp4
|
155.1 MB
|
iHack 2015.mp4
|
5.5 MB
|
/iHack 2016/
|
iHack 2016 - Blue team pour PME.mp4
|
129.8 MB
|
iHack 2016 - Data Exfiltration.mp4
|
103.7 MB
|
iHack 2016 - Relever les empreintes d'une application web.mp4
|
151.1 MB
|
iHack 2016.mp4
|
5.1 MB
|
/iHack 2021/
|
DockerxQemu Emulation Adventure (Miu).eng.srt
|
31.9 KB
|
DockerxQemu Emulation Adventure (Miu).mp4
|
24.1 MB
|
IBM Power Systems and IBM I OS History and Security (Ahmed Shah).eng.srt
|
47.3 KB
|
IBM Power Systems and IBM I OS History and Security (Ahmed Shah).mp4
|
27.0 MB
|
Injection SQL, comment ça marche (Sébastien Huneault - TheRage).mp4
|
51.2 MB
|
Kubernetes Security Attacking and Defending K8s Clusters (Magno Logan).eng.srt
|
119.3 KB
|
Kubernetes Security Attacking and Defending K8s Clusters (Magno Logan).mp4
|
67.2 MB
|
La French Connection LIVE - iHack 2021 Edition.mp4
|
70.4 MB
|
L’art du pitch - Un outil journalistique pour communiquer en infosec (Sam Harper).mp4
|
23.4 MB
|
Où est Charlie Introduction à la recherche numérique de personnes disparues (Marc-Antoine Roux).mp4
|
25.5 MB
|
SPLINTERNET - (Franck Desert).mp4
|
73.4 MB
|
/Polar Conference 2023/
|
Capturing the Flag Team Building via Competitive Learning (Chris Carlis & Mike Connor).eng.srt
|
99.4 KB
|
Capturing the Flag Team Building via Competitive Learning (Chris Carlis & Mike Connor).mp4
|
37.6 MB
|
CISOs Panel - How to secure our data (Justin Grudzien - Cheryl Biswas - Kendra Cooley - Mehdi Talei).eng.srt
|
105.4 KB
|
CISOs Panel - How to secure our data (Justin Grudzien - Cheryl Biswas - Kendra Cooley - Mehdi Talei).mp4
|
75.3 MB
|
La souveraineté de nos données (Stéphane Garneau).eng.srt
|
82.3 KB
|
La souveraineté de nos données (Stéphane Garneau).mp4
|
50.1 MB
|
Simplifying Cybersecurity Through Consolidation (Victor Tavares).eng.srt
|
79.5 KB
|
Simplifying Cybersecurity Through Consolidation (Victor Tavares).mp4
|
54.8 MB
|
Stop Trying to Boil the Ocean - Making Better Risk Decisions to Prevent Future - Seth Matheson Tenable.eng.srt
|
62.7 KB
|
Stop Trying to Boil the Ocean - Making Better Risk Decisions to Prevent Future - Seth Matheson Tenable.mp4
|
43.6 MB
|
The bad guys are a lot more organized than we think, we are targeted now more (Stéphane Asselin).eng.srt
|
101.3 KB
|
The bad guys are a lot more organized than we think, we are targeted now more (Stéphane Asselin).mp4
|
61.3 MB
|
The Missing Pieces to Building and Adopting AppSec Capabilities (Jon Shapransky).eng.srt
|
80.3 KB
|
The Missing Pieces to Building and Adopting AppSec Capabilities (Jon Shapransky).mp4
|
49.2 MB
|
Évitez le banc des accusés Un guide pour les gestionnaires de cybersécurité.eng.srt
|
90.3 KB
|
Évitez le banc des accusés Un guide pour les gestionnaires de cybersécurité.mp4
|
48.5 MB
|
/QuebecSec 2019/
|
Explorons le malspam avec Emotet - QuébecSec janvier 2019.mp4
|
57.7 MB
|
Ian-Kyle Wagner présente Darknets, sécurité et anonymité.en(transcribed).srt
|
82.3 KB
|
Ian-Kyle Wagner présente Darknets, sécurité et anonymité.mp4
|
112.1 MB
|
RansomeWare Lands (1 2) (Franck Desert).mp4
|
300.7 MB
|
RansomeWare Lands (2 3) (Franck Desert).mp4
|
199.4 MB
|
RansomeWare Lands Futures Weird Awakens (3 3) (Franck Desert).mp4
|
252.8 MB
|
Total files 323
|