FileMood

Download Hackfest

Hackfest

Name

Hackfest

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

19.1 GB

Total Files

323

Hash

305179C89B45702F78DDA78E3249B901EB04FF3B

/

Hackfest logo.jpg

5.1 KB

Hackfest thank you.txt

1.2 KB

/HackerSpace 2013/

HackerSpace - 25 avril 2013 - Attaques contre les serveurs DNS et contre-mesures.mp4

84.8 MB

HackerSpace - 26 sept - Hacker les aires.mp4

176.9 MB

HackerSpace - 27 juin - Assembleur x86 - Reverse - Shellcode.mp4

180.1 MB

HackerSpace - 28 novembre - Retour sur le Hackfest 2013.mp4

282.7 MB

HackerSpace - Jan 2013 - Why NTLM sucks part 1.mp4

5.4 MB

HackerSpace - Jan 2013 - Why NTLM sucks part 2.mp4

5.3 MB

HackerSpace - Mar 2013 - Tor.mp4

131.9 MB

/HackerSpace 2014/

HackerSpace - 23 janvier 2014 - Securite par revendication.mp4

80.0 MB

HackerSpace - 24 avril 2014 - HeartBleed De A to Z.mp4

80.9 MB

HackerSpace - 25 septembre 2014 - L'heritage et futur proche des techniques de survies Viral.mp4

256.4 MB

HackerSpace - 27 fevrier 2014 - Initiation aux buffer overflows.mp4

15.9 MB

HackerSpace - 27 mars - Hacking Jam Session.mp4

87.2 MB

HackerSpace - August 2014 - Mon pot de miel.mp4

59.4 MB

HackerSpace - Juin 2014 - Radiocommunication pour tous.mp4

95.1 MB

HackerSpace - July 2014 - We clean up shit.en(transcribed).srt

158.8 KB

HackerSpace - July 2014 - We clean up shit.mp4

90.6 MB

HackerSpace - May 2014 - BeEF me UP.mp4

33.7 MB

HackerSpace - Novembre 2014 - Retour sur le Hackfest et CTF 2014.mp4

265.4 MB

/HackerSpace 2015/

HackerSpace - Fevrier 2015 - How to secure a web server like a boss.mp4

348.0 MB

HackerSpace - Janvier 2015 - Return Oriented Programming.mp4

107.4 MB

HackerSpace - Juillet 2015 - Techniques d'enquête et outils.mp4

153.3 MB

HackerSpace - Juin 2015 - Atelier Workshop - Analyse de packet avec Python.mp4

139.4 MB

HackerSpace - Mars 2015 - Attaquer les applications Malware Android.mp4

367.4 MB

HackerSpace - Septembre 2015 - Introduction au développement sécuritaire.mp4

134.7 MB

/HackerSpace 2016/

Encoding vs Hashing vs Encrypting vs Obfuscating et la suite.mp4

343.3 MB

HackerSpace - 25 Février 2016 - SSL TLS pour les non-cryptologues.mp4

150.7 MB

HackerSpace - 28 Janvier 2016 - Is your Application DDoS Ready.en(transcribed).srt

67.1 KB

HackerSpace - 28 Janvier 2016 - Is your Application DDoS Ready.mp4

36.2 MB

HackerSpace - Retour sur le Hackfest 2016.en(transcribed).srt

74.9 KB

HackerSpace - Retour sur le Hackfest 2016.mp4

143.4 MB

/HackerSpace 2017/

HackerSpace - Réseau Zéro Confiance.mp4

84.1 MB

/Hackfest 6 2014/

Hackfest 2014 - Francois Lajeunesse-Robert a presente - Web Scrambler Reloaded.mp4

70.2 MB

Hackfest 2014 - Ian Amit presented - Red white and blue. Making sense of Red Teaming for good.mp4

138.3 MB

Hackfest 2014 - Jason Gillam presented - Web Penetration Testing with Burp and CO2.mp4

122.1 MB

Hackfest 2014 - Lockpicking NerfGun Challenge.mp4

7.1 MB

Hackfest 2014 - Nadim Kobeissi presented - miniLock - Advances in Usable Cryptography.mp4

123.7 MB

Hackfest 2014 - RenderMan aka Brad Haines presented.mp4

134.8 MB

Hackfest 2014 - Theo de Raadt presented - arc4random - randomization for all occasions.mp4

104.0 MB

/Hackfest 7 2015/

Hackfest 2015 - Francois Gagnon presented - Les communications dans les applications mobiles.mp4

86.6 MB

Hackfest 2015 - Francois Harvey presented.mp4

78.7 MB

Hackfest 2015 - John McAfee presented - The unconventional truth.mp4

21.3 MB

Hackfest 2015 - Johnny Xmas presented - 1993 BC Get Off my LAN.mp4

126.3 MB

Hackfest 2015 - Julien Mbony & Patrick Roy presented - L'impact du blockchain dans le monde virtuel.mp4

99.8 MB

Hackfest 2015 - Marc Andre Belanger - Top 5 des facons d'etre responsable de la perte de 1M.mp4

43.7 MB

Hackfest 2015 - Mike Larkin presented - Kernel WX Improvements In OpenBSD.mp4

75.2 MB

Hackfest 2015 - Nadia Vigneault presented - Forensic 201.mp4

146.1 MB

Hackfest 2015 - Nicolas Gregoire presented - Server Side Browsing.mp4

88.0 MB

Hackfest 2015 - Olivier Bilodeau & Thomas Dupuy presented Internet of {Things,Threats}.mp4

86.0 MB

Hackfest 2015 - Roy Firestein presented - Cymon - An Open Threat Intelligence System.mp4

124.1 MB

Hackfest 2015 - Shane MacDougall presented.mp4

87.3 MB

Hackfest 2015 - Theo de Raadt presented - Pledge - A new security technology in openbsd.mp4

146.4 MB

/Hackfest 8 2016/

Hackfest 2016 - Aaron Guzman presented Make iOS Hacking Great Again - The Easy Wins.mp4

107.2 MB

Hackfest 2016 - Aaron Hnatiw presented - Racing the Web.mp4

95.1 MB

Hackfest 2016 - Alexandre Guedon presented - Seecuritee Docker en production.mp4

60.6 MB

Hackfest 2016 - Benjamin Brown presented The New Wave Of Account Checkers And Underground Rewards Fraud.mp4

105.7 MB

Hackfest 2016 - Bernard Bolduc presente Histoire d'un hack.mp4

68.6 MB

Hackfest 2016 - Blake Cornell presented Come Bring all your Drones to the Yard.mp4

87.4 MB

Hackfest 2016 - Chad M. Dewey presented Pentesting Cruise Ships OR Hacking the High Seas.mp4

73.8 MB

Hackfest 2016 - Cheryl Biswas & Haydn Johnson presented Blue Team Reboot.mp4

86.1 MB

Hackfest 2016 - Cheryl Biswas presented A Stuxnet for Mainframes.mp4

85.5 MB

Hackfest 2016 - Chris Nickerson - Adversarial Simulation - Why your defenders are the Fighter Pilots.mp4

143.3 MB

Hackfest 2016 - Dumpster diving du 21ème siècle - The garbage is leaking juice.mp4

283.2 MB

Hackfest 2016 - Geoffrey Vaughan presented - Catching IMSI Catchers.mp4

39.0 MB

Hackfest 2016 - Hypotheses on burnout and stress related illnesses in relation to Cyber Security practitioners.mp4

76.6 MB

Hackfest 2016 - Ian Bouchard presented Abusing PHP 7s OPcache to Spawn Webshells.mp4

35.3 MB

Hackfest 2016 - Johnny Xmas & Benjamin Brown presented How I Darkweb Economies (and You Can Too).mp4

118.2 MB

Hackfest 2016 - Marc Dovero presente Le dispositif Franccais de lutte contre le cyber-terrorisme.mp4

114.3 MB

Hackfest 2016 - Mathieu Lavoie & David Decary-Hetu - De-anonymizing Bitcoin one transaction at a time.mp4

108.9 MB

Hackfest 2016 - Maxime Lamothe-Brassard presented - Hunting with LimaCharlie.mp4

55.4 MB

Hackfest 2016 - Michael Bennet - Clogging the Futures Series of Tubes - A look at HTTP2 DDoS Attacks.mp4

75.3 MB

Hackfest 2016 - Mickael Nadeau presented Game Hacking Exposed.mp4

100.1 MB

Hackfest 2016 - Nadia Vigneault & Sylvain Desharnais presented - Strateegies de fouille et recherches de preuves.mp4

118.5 MB

Hackfest 2016 - Patrick presente BurpSmartBuster - A smart way to find hidden treasures the next steps.mp4

46.4 MB

Hackfest 2016 - Paul Rascagneres presented Windows systems & code signing protection.mp4

75.8 MB

Hackfest 2016 - Pierre Ernst presented - Fixing the Java Serialization mess.mp4

93.6 MB

Hackfest 2016 - RenderMan and Murdoch_Monkey presented - Hacking the Internet of Dongs.mp4

136.4 MB

Hackfest 2016 - Sarah Jamie Lewis presented - Untangling the Dark Web - Unmasking Onion Services.mp4

72.6 MB

Hackfest 2016 - Stephanie Snow Carruthers presented This Phish Goes To 11.mp4

88.0 MB

Hackfest 2016 - Stephen Hall presented Your configs are bad and you should feel bad.mp4

49.6 MB

Hackfest 2016 - Sun Huang & Wayne Huang - Unveiling One of the Worlds Biggest and Oldest Cybercrime Gangs.mp4

76.9 MB

Hackfest 2016 - Sunny Wear presented Exploit Kits - The Biggest Threat You Know Nothing About.mp4

36.4 MB

/Hackfest 9 2017/

100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto).eng.srt

13.8 KB

100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto).mp4

29.0 MB

Attack Driven Development Getting Started in Application Security (Keith Hoodlet).eng.srt

104.5 KB

Attack Driven Development Getting Started in Application Security (Keith Hoodlet).mp4

129.6 MB

Banking on Insecurity Why Attackers Can Take the Money and Run (Cheryl Biswas).eng.srt

90.5 KB

Banking on Insecurity Why Attackers Can Take the Money and Run (Cheryl Biswas).mp4

133.7 MB

Between You and Me and the Network Security Boundary (Patrick Fussell).eng.srt

69.6 KB

Between You and Me and the Network Security Boundary (Patrick Fussell).mp4

46.6 MB

BITSInject - control your BITS, get SYSTEM (Dor Azouri).eng.srt

70.5 KB

BITSInject - control your BITS, get SYSTEM (Dor Azouri).mp4

78.3 MB

Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong).eng.srt

84.5 KB

Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong).mp4

96.7 MB

Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez).eng.srt

66.4 KB

Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez).mp4

76.6 MB

Élection présidentielle Française 2 0 (Damien Bancal).mp4

19.6 MB

Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon).eng.srt

79.0 KB

Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon).mp4

78.5 MB

Genetic Algorithms for Brute Forcing (Christopher Ellis).eng.srt

78.6 KB

Genetic Algorithms for Brute Forcing (Christopher Ellis).mp4

50.0 MB

Hadoop safari Hunting for vulnerabilities (Mahdi Braik & Thomas Debize).eng.srt

86.1 KB

Hadoop safari Hunting for vulnerabilities (Mahdi Braik & Thomas Debize).mp4

112.0 MB

How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas).eng.srt

132.4 KB

How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas).mp4

135.1 MB

Introducing CSE’s open source AssemblyLine (Steve Garon & John O’Brien).mp4

77.7 MB

Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité (Marc-André Bélanger).mp4

53.5 MB

Lessons Learned Hunting IoT Malware (Olivier Bilodeau).eng.srt

89.5 KB

Lessons Learned Hunting IoT Malware (Olivier Bilodeau).mp4

113.3 MB

Practical Analysis of Awareness (Kendra Coooley).eng.srt

72.0 KB

Practical Analysis of Awareness (Kendra Coooley).mp4

85.6 MB

Propriétés des preuves numériques et considérations à leur cueillette (Sylvain Desharnais).mp4

72.7 MB

Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner).eng.srt

88.9 KB

Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner).mp4

71.0 MB

Selenium dark side of the moon (Adam Reiser).eng.srt

86.6 KB

Selenium dark side of the moon (Adam Reiser).mp4

81.7 MB

SniffAir - OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott).eng.srt

61.0 KB

SniffAir - OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott).mp4

71.7 MB

Stantinko Un botnet aux multiples facettes (Matthieu Faou & Frédéric Vachon).mp4

52.4 MB

Static-Analysis Tools Now you’re Playing with Power (Philippe Arteau).eng.srt

78.1 KB

Static-Analysis Tools Now you’re Playing with Power (Philippe Arteau).mp4

118.2 MB

Superhéros Tous Comment l’empathie peut aider l’inclusion des personnel avec ASD-ADHD (Michelle).mp4

99.5 MB

The Black Art of Wireless Post-Exploitation (Gabriel Ryan).eng.srt

92.2 KB

The Black Art of Wireless Post-Exploitation (Gabriel Ryan).mp4

41.1 MB

Vaccination - An Anti-Honeypot Approach (Gal Bitensky).eng.srt

74.9 KB

Vaccination - An Anti-Honeypot Approach (Gal Bitensky).mp4

85.1 MB

/Hackfest 10 2018/

Automatisation de la réponse, introduction au standard OpenC2 (David Girard).mp4

17.4 MB

Blazing Secure Egress Traffic with Smokescreen ( Marc-André Tremblay).eng.srt

55.8 KB

Blazing Secure Egress Traffic with Smokescreen ( Marc-André Tremblay).mp4

15.6 MB

Breach Analytica Exploring the history & design of hacked data services (Trevor and Pamela).eng.srt

80.0 KB

Breach Analytica Exploring the history & design of hacked data services (Trevor and Pamela).mp4

35.5 MB

CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner).eng.srt

111.7 KB

CAN Signal Extraction from Openxc with Radare2 (Ben Gardiner).mp4

25.1 MB

Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi).eng.srt

37.4 KB

Digital Certificate Cybercrime Exploitation and Decentralizing using Blockchain (Mahsa Moosavi).mp4

15.2 MB

Discours d'ouverture du Hackfest 2018 avec l'honorable Karina Gould.mp4

17.8 MB

Don’t Bring Me Down Weaponized Botnets Anyone (Cheryl Biswas).eng.srt

55.1 KB

Don’t Bring Me Down Weaponized Botnets Anyone (Cheryl Biswas).mp4

92.1 MB

Exploiting Connected Medical Devices Lessons Learned & Data Earned (Saurabh Harit).eng.srt

69.2 KB

Exploiting Connected Medical Devices Lessons Learned & Data Earned (Saurabh Harit).mp4

18.7 MB

Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio).eng.srt

50.2 KB

Finding Valuable Needles in Global Source Code Haystacks with Automation (Jay Lagorio).mp4

42.4 MB

Hacking COMBUS in a Paradox security system (Kirils Solovjovs).eng.srt

75.3 KB

Hacking COMBUS in a Paradox security system (Kirils Solovjovs).mp4

20.3 MB

Harakiri Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman).eng.srt

71.5 KB

Harakiri Manipulating binaries to optimize closed source fuzzing (Sebastien Feldman).mp4

8.7 MB

How to bypass an IDS with netcat and linux (Kirill Shipulin).eng.srt

39.0 KB

How to bypass an IDS with netcat and linux (Kirill Shipulin).mp4

26.6 MB

ICS A deeper dive into defending and attacking operational technology (Liam Graves).eng.srt

66.1 KB

ICS A deeper dive into defending and attacking operational technology (Liam Graves).mp4

32.0 MB

La chasse aux menaces est ouverte - Débuter le Threat Hunting (Éric Gagnon).mp4

35.6 MB

Mise à jour des menaces et des risques informatique au Canada (Steve Waterhouse).mp4

75.1 MB

More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White).eng.srt

93.8 KB

More MitM Makes Mana Mostly Mediate Mischievous Message (Dominic White).mp4

25.5 MB

Parlons d’enjeux nationaux sécurité informatique envers la démocratie Un état de situation (panel).mp4

25.5 MB

RGPD en Europe 6 mois d’expériences (Damien Bancal).mp4

40.7 MB

RHme3 hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner).eng.srt

141.0 KB

RHme3 hacking through failure (Colin DeWinter & Jonathan Beverley & Ben Gardiner).mp4

78.6 MB

Shut Up and Take My Money Scraping the Venmo Public Feed (Johnny Xmas).eng.srt

94.3 KB

Shut Up and Take My Money Scraping the Venmo Public Feed (Johnny Xmas).mp4

19.9 MB

So You Want To Be A Consultant Here’s The Fine Print… (Justin Ryder).eng.srt

61.4 KB

So You Want To Be A Consultant Here’s The Fine Print… (Justin Ryder).mp4

91.1 MB

Surviving a Cat-astrophe The Art of Crisis Management as told through LOLcatz (Jen Ellis).eng.srt

76.6 KB

Surviving a Cat-astrophe The Art of Crisis Management as told through LOLcatz (Jen Ellis).mp4

86.9 MB

Throwing it out the Windows Exfiltration d’identifiants Active Directory (Léanne Dutil).mp4

27.5 MB

Utilisation de GPU pour l’inspection de trafic réseau (Martin Dubois).mp4

28.6 MB

Vibing Your Way Through an Enterprise - How Attackers are Becoming More Sneaky (Matt Eidelberg).eng.srt

56.5 KB

Vibing Your Way Through an Enterprise - How Attackers are Becoming More Sneaky (Matt Eidelberg).mp4

42.3 MB

Who wrote this smart contract Privacy and Anonymity in Blockchain (Alina Matyukhina).mp4

22.3 MB

Your Bank’s Digital Side Door (Steven Danneman).eng.srt

75.4 KB

Your Bank’s Digital Side Door (Steven Danneman).mp4

35.7 MB

/Hackfest 11 2019/

7 habits of highly effective adversaries (Joe Gray).eng.srt

70.1 KB

7 habits of highly effective adversaries (Joe Gray).mp4

84.8 MB

A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil).eng.srt

60.3 KB

A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil).mp4

46.9 MB

A more secure management of front-end dependencies (Jérémy Matos).eng.srt

63.8 KB

A more secure management of front-end dependencies (Jérémy Matos).mp4

53.2 MB

Adventures in obfuscated mobile adware (Kristina Balaam).eng.srt

56.2 KB

Adventures in obfuscated mobile adware (Kristina Balaam).mp4

54.7 MB

Avez-vous confiance en votre PKI (Joniel Gagné Laurin).mp4

36.2 MB

Brokers Guild Incident Response (Vincent Marcus).eng.srt

65.8 KB

Brokers Guild Incident Response (Vincent Marcus).mp4

46.6 MB

Capture de traffic réseau - haute vitesse et filtre avancés (Martin Dubois).mp4

85.0 MB

Comment bâtir un labo pour détonations de malware (Jean-Philippe Taggart & Jerome Segura).mp4

60.2 MB

Conclusions from Tracking Server attacks at scale (Ophir Harpaz & Daniel Golberg).eng.srt

71.2 KB

Conclusions from Tracking Server attacks at scale (Ophir Harpaz & Daniel Golberg).mp4

50.0 MB

Curiosity Killed the Cat Legal Implications of Off-Duty Vulnerability Exposure (Anna Manley).eng.srt

121.6 KB

Curiosity Killed the Cat Legal Implications of Off-Duty Vulnerability Exposure (Anna Manley).mp4

84.3 MB

Cybersécurité et pays en voie de développementAmérique Latine et Caraïbes (Blaise Arbouet).mp4

62.7 MB

Cérémonie de fermeture - CTF (Franck & Crew).mp4

23.1 MB

Cérémonie de fermeture - Stats et Social Engineering (Patrick & Crew).eng.srt

13.8 KB

Cérémonie de fermeture - Stats et Social Engineering (Patrick & Crew).mp4

15.4 MB

Dark What Démystifier le buzz via la présentation d’un outil open-source (Félix Lehoux).mp4

87.0 MB

Design The Art of Building Security Programs (J. Wolfgang Goerlich).mp4

78.2 MB

Everyone is hackable. How long will it take you to notice (Shira Shamban).eng.srt

51.7 KB

Everyone is hackable. How long will it take you to notice (Shira Shamban).mp4

50.0 MB

F2P - Free to pawn (Marc André Bélanger).mp4

64.4 MB

Gold nuggeting Intuition, apprentissage machine et test d’intrusion (Serge Olivier Paquette).mp4

56.1 MB

Initiation à la sociologie au service du SE et de l’OSINT (Hugo Benoist).mp4

59.5 MB

Introduction to Security and Machine Learning (Wendy Edwards).eng.srt

94.7 KB

Introduction to Security and Machine Learning (Wendy Edwards).mp4

76.6 MB

Mind the gap - managing insecurity in enterprise IoT (Cheryl Biswas).eng.srt

80.9 KB

Mind the gap - managing insecurity in enterprise IoT (Cheryl Biswas).mp4

95.9 MB

Quand les mails du gouvernement se promènent dans le darknet (Damien Bancal).mp4

31.2 MB

Recent developments in designing price-stable cryptocurrencies (Mahsa Moosavi).eng.srt

32.9 KB

Recent developments in designing price-stable cryptocurrencies (Mahsa Moosavi).mp4

30.8 MB

Surface d’attaque du gouvernement (Steve Waterhouse).mp4

39.8 MB

Techniques d’attaque et de défense dans AWS (Cédric Thibault).mp4

105.6 MB

The Mechanics of Malware’s Darkside (Yagnesh Waran P & Laura Harris).mp4

82.4 MB

The OSINT Space is Growing Are we Ready (Adrian Korn).eng.srt

62.3 KB

The OSINT Space is Growing Are we Ready (Adrian Korn).mp4

46.9 MB

Unveiling the not-PowerShell cult (Mangatas Tondang).eng.srt

74.3 KB

Unveiling the not-PowerShell cult (Mangatas Tondang).mp4

116.4 MB

War in the fifth dimension - An overview of the Weaponization of Information (Alana Stazz).eng.srt

110.3 KB

War in the fifth dimension - An overview of the Weaponization of Information (Alana Stazz).mp4

113.7 MB

You shall not pass, even if you look like a hobbit-an appeal to smarter physical sec (Remy Baccino).mp4

105.4 MB

Zero-trust à l’ère des fuites massives d’informations (Nicolas-Loïc Fortin).mp4

87.6 MB

/Hackfest 12 2020/

Behavior & Reputation based filtering reloaded (Philippe Humeau & Thibault Koechlin).eng.srt

92.8 KB

Behavior & Reputation based filtering reloaded (Philippe Humeau & Thibault Koechlin).mp4

109.8 MB

Template Injection in Action (Philippe Arteau).eng.srt

149.7 KB

Template Injection in Action (Philippe Arteau).mp4

388.9 MB

Trust, but Verify Maintaining Democracy In Spite (Allie Mellen).eng.srt

74.5 KB

Trust, but Verify Maintaining Democracy In Spite (Allie Mellen).mp4

118.1 MB

Urban Exploration - A COVID-Friendly Hacker Hobby (Johnny Xmas).eng.srt

62.1 KB

Urban Exploration - A COVID-Friendly Hacker Hobby (Johnny Xmas).mp4

459.2 MB

You Shared What Seriously (Don & Bronwyn Mallory).eng.srt

82.5 KB

You Shared What Seriously (Don & Bronwyn Mallory).mp4

107.9 MB

/Hackfest 2021/

Décrocher son stage ou sa première expérience en TI (Karolynn Boutet).mp4

53.3 MB

Hackfest CTFs 2021 - CDW Canada Opening Remarks.eng(transcribed).eng(transcribed).srt

5.3 KB

Hackfest CTFs 2021 - CDW Canada Opening Remarks.mp4

6.3 MB

L'importance d'un cadre de conformité en PME (Steve Lavoie).mp4

33.0 MB

Le grand saut en Cybersécurité (Danny Boivin).mp4

28.7 MB

Metasploit 101 (Amiran Alavidze & Dan Reimer).eng(transcribed) (2).eng(transcribed).srt

300.7 KB

Metasploit 101 (Amiran Alavidze & Dan Reimer).mp4

260.1 MB

Réseaux sociaux et vie privée Les dangers et les bonnes pratiques à adopter (Julien Teste Harnois).mp4

22.2 MB

Security Tools 101 Tools of the Trade (Josh Galvez).eng(transcribed) (2).eng(transcribed).srt

65.3 KB

Security Tools 101 Tools of the Trade (Josh Galvez).mp4

40.1 MB

Table ronde sur l'éducation en matière de sécurité de l'information et vie privée.mp4

78.6 MB

Threat modeling Field guide to staying ahead of the bad guys (Samuel Dussault).eng(transcribed) (2).eng(transcribed).srt

101.7 KB

Threat modeling Field guide to staying ahead of the bad guys (Samuel Dussault).mp4

51.2 MB

/Hackfest 2022/

8 stratégies efficaces pour rater sa gestion de crise - Alexandre Fournier.eng.srt

88.5 KB

8 stratégies efficaces pour rater sa gestion de crise - Alexandre Fournier.mp4

45.5 MB

AppSec the missing link - Francois Lajeunesse Robert.eng.srt

80.3 KB

AppSec the missing link - Francois Lajeunesse Robert.mp4

43.5 MB

Avoir les bleus dans un monde rouge - Jacques Sauvé.eng.srt

54.7 KB

Avoir les bleus dans un monde rouge - Jacques Sauvé.mp4

44.4 MB

AWS sous attaque - Cédric Thibault.eng.srt

101.8 KB

AWS sous attaque - Cédric Thibault.mp4

63.3 MB

Certification 101 - Steve Lavoie.eng.srt

58.4 KB

Certification 101 - Steve Lavoie.mp4

42.3 MB

Defrauding merchants like it's Y2k - Craig Barretto and Yuk Fai Chan.eng.srt

39.6 KB

Defrauding merchants like it's Y2k - Craig Barretto and Yuk Fai Chan.mp4

23.0 MB

Discours d'ouverture - Éric Caire.eng.srt

11.9 KB

Discours d'ouverture - Éric Caire.mp4

3.9 MB

Le droit et la cybersécurité - qui est responsable quand un objet connecté disjoncte - Vanessa Henri.eng.srt

106.5 KB

Le droit et la cybersécurité - qui est responsable quand un objet connecté disjoncte - Vanessa Henri.mp4

52.9 MB

Les interventions policières sur les facilitateurs du crime - David Décary Hétu.eng.srt

42.9 KB

Les interventions policières sur les facilitateurs du crime - David Décary Hétu.mp4

20.9 MB

Mon cheminement vers la sécurité mon père m'a forcé - William P Hogue et Éric Hogue.eng.srt

24.3 KB

Mon cheminement vers la sécurité mon père m'a forcé - William P Hogue et Éric Hogue.mp4

18.0 MB

Office under siege Understanding, discovering and preventing attacks against M365 - Dmitriy Beryoza.eng.srt

87.1 KB

Office under siege Understanding, discovering and preventing attacks against M365 - Dmitriy Beryoza.mp4

52.8 MB

Pourquoi comment financer une startup en cybersécurité via le capital de risque - Gabriel Tremblay.eng.srt

82.2 KB

Pourquoi comment financer une startup en cybersécurité via le capital de risque - Gabriel Tremblay.mp4

37.4 MB

Purple RD Red and Blue Tradecraft around Remote Desktop Protocol - Olivier Bilodeau.eng.srt

74.4 KB

Purple RD Red and Blue Tradecraft around Remote Desktop Protocol - Olivier Bilodeau.mp4

46.5 MB

Purple teaming From SIlos to Heroes - Martin Dubé et Dany Lafrenière.eng.srt

70.9 KB

Purple teaming From SIlos to Heroes - Martin Dubé et Dany Lafrenière.mp4

46.5 MB

Savoir négocier et se vendre - Karolynn Boulet.eng.srt

66.1 KB

Savoir négocier et se vendre - Karolynn Boulet.mp4

28.2 MB

Un Hacking Workflow - VsCode, Git, Terraform et Malware Dev - Félix Lehoux.eng.srt

98.5 KB

Un Hacking Workflow - VsCode, Git, Terraform et Malware Dev - Félix Lehoux.mp4

45.0 MB

You can CTF but can you pentest - Stephen Hall.eng.srt

86.9 KB

You can CTF but can you pentest - Stephen Hall.mp4

42.6 MB

/Hackfest Holidays 2020/

ByeBye Sécurité Informatique - Québec 2020.mp4

112.3 MB

Hacking Android & iOS apps with Deep Links and XSS.eng.srt

111.5 KB

Hacking Android & iOS apps with Deep Links and XSS.mp4

84.5 MB

Introduction to Burp Suite and Web hacking (Bilingual FREN).mp4

49.7 MB

Noel au pays des firmwares (workshop).mp4

79.7 MB

The ReZer0 loader a malicious Dot Net based loader with a flaw.eng.srt

54.6 KB

The ReZer0 loader a malicious Dot Net based loader with a flaw.mp4

37.0 MB

/iHack 2015/

iHack 2015 - Ecosysteme Developpement Android - Reversing et Debuggage d'applications Android.mp4

342.1 MB

iHack 2015 - Network Forensics.mp4

75.3 MB

iHack 2015 - Vie privee en ligne soyez anonyme.mp4

155.1 MB

iHack 2015.mp4

5.5 MB

/iHack 2016/

iHack 2016 - Blue team pour PME.mp4

129.8 MB

iHack 2016 - Data Exfiltration.mp4

103.7 MB

iHack 2016 - Relever les empreintes d'une application web.mp4

151.1 MB

iHack 2016.mp4

5.1 MB

/iHack 2021/

DockerxQemu Emulation Adventure (Miu).eng.srt

31.9 KB

DockerxQemu Emulation Adventure (Miu).mp4

24.1 MB

IBM Power Systems and IBM I OS History and Security (Ahmed Shah).eng.srt

47.3 KB

IBM Power Systems and IBM I OS History and Security (Ahmed Shah).mp4

27.0 MB

Injection SQL, comment ça marche (Sébastien Huneault - TheRage).mp4

51.2 MB

Kubernetes Security Attacking and Defending K8s Clusters (Magno Logan).eng.srt

119.3 KB

Kubernetes Security Attacking and Defending K8s Clusters (Magno Logan).mp4

67.2 MB

La French Connection LIVE - iHack 2021 Edition.mp4

70.4 MB

L’art du pitch - Un outil journalistique pour communiquer en infosec (Sam Harper).mp4

23.4 MB

Où est Charlie Introduction à la recherche numérique de personnes disparues (Marc-Antoine Roux).mp4

25.5 MB

SPLINTERNET - (Franck Desert).mp4

73.4 MB

/Polar Conference 2023/

Capturing the Flag Team Building via Competitive Learning (Chris Carlis & Mike Connor).eng.srt

99.4 KB

Capturing the Flag Team Building via Competitive Learning (Chris Carlis & Mike Connor).mp4

37.6 MB

CISOs Panel - How to secure our data (Justin Grudzien - Cheryl Biswas - Kendra Cooley - Mehdi Talei).eng.srt

105.4 KB

CISOs Panel - How to secure our data (Justin Grudzien - Cheryl Biswas - Kendra Cooley - Mehdi Talei).mp4

75.3 MB

La souveraineté de nos données (Stéphane Garneau).eng.srt

82.3 KB

La souveraineté de nos données (Stéphane Garneau).mp4

50.1 MB

Simplifying Cybersecurity Through Consolidation (Victor Tavares).eng.srt

79.5 KB

Simplifying Cybersecurity Through Consolidation (Victor Tavares).mp4

54.8 MB

Stop Trying to Boil the Ocean - Making Better Risk Decisions to Prevent Future - Seth Matheson Tenable.eng.srt

62.7 KB

Stop Trying to Boil the Ocean - Making Better Risk Decisions to Prevent Future - Seth Matheson Tenable.mp4

43.6 MB

The bad guys are a lot more organized than we think, we are targeted now more (Stéphane Asselin).eng.srt

101.3 KB

The bad guys are a lot more organized than we think, we are targeted now more (Stéphane Asselin).mp4

61.3 MB

The Missing Pieces to Building and Adopting AppSec Capabilities (Jon Shapransky).eng.srt

80.3 KB

The Missing Pieces to Building and Adopting AppSec Capabilities (Jon Shapransky).mp4

49.2 MB

Évitez le banc des accusés Un guide pour les gestionnaires de cybersécurité.eng.srt

90.3 KB

Évitez le banc des accusés Un guide pour les gestionnaires de cybersécurité.mp4

48.5 MB

/QuebecSec 2019/

Explorons le malspam avec Emotet - QuébecSec janvier 2019.mp4

57.7 MB

Ian-Kyle Wagner présente Darknets, sécurité et anonymité.en(transcribed).srt

82.3 KB

Ian-Kyle Wagner présente Darknets, sécurité et anonymité.mp4

112.1 MB

RansomeWare Lands (1 2) (Franck Desert).mp4

300.7 MB

RansomeWare Lands (2 3) (Franck Desert).mp4

199.4 MB

RansomeWare Lands Futures Weird Awakens (3 3) (Franck Desert).mp4

252.8 MB

 

Total files 323


Copyright © 2025 FileMood.com