BT种子基本信息
- 种子哈希:9d9600ec19ed324c71395de0b46de27e2cfb9957
- 文档大小:4.4 GB
- 文档个数:125个文档
- 下载次数:367次
- 下载速度:极快
- 收录时间:2020-06-28
- 最近下载:2025-01-02
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- NorthSec 2016/Guillaume Ross & Jordan Rogers - Real Solutions From Real Incidents Save Money and Your Job!.mp4 121.9 MB
- NorthSec 2019/NorthSec 2019 - Thomas Pornin - T1 Secure Programming For Embedded Systems.mp4 117.7 MB
- NorthSec 2019/NorthSec 2019 - Philip Young - Mainframe Hacking in 2019.mp4 104.3 MB
- NorthSec 2017/Richard Thieme - The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals.mp4 101.1 MB
- NorthSec 2019/NorthSec 2019 - Norman Shamas - Safer Online Sex Harm Reduction and Queer Dating Apps.mp4 101.1 MB
- NorthSec 2018/Masha Alimardani - Tightening the Net in Iran.mp4 95.0 MB
- NorthSec 2015/NorthSec 2015 - Rene Freingruber - EMET 5.2 Armor or Curtain.mp4 92.3 MB
- NorthSec 2019/NorthSec 2019 - Arezou Hosseinzad-Amirkhizi & Apurva Kumar - xRAT.mp4 91.5 MB
- NorthSec 2016/Mark Stanislav - Hide Yo’ Kids Hacking Your Family’s Connected Things.mp4 85.6 MB
- NorthSec 2017/Adam Shostack - Pentesting Lessons from Star Wars.mp4 83.8 MB
- NorthSec 2018/Eleanor Saitta - How to Think (About Complex Adversarial Systems).mp4 83.6 MB
- NorthSec 2018/Mark Mossberg - Binary analysis, meet the blockchain.mp4 78.9 MB
- NorthSec 2015/NorthSec 2015 - Philip Young - Why You Should (But Don't) Care About Mainframe Security.mp4 76.6 MB
- NorthSec 2016/Gabriella Coleman - How Anonymous narrowly Evaded the Cyberterrorism Rhetorical Machine.mp4 73.5 MB
- NorthSec 2019/NorthSec 2019 - Kristin Del Rosso - Using Geopolitical Conflicts for Threat Hunting.mp4 72.1 MB
- NorthSec 2016/Miroslav Stampar - Android Practical Introduction into the (In)Security.mp4 72.0 MB
- NorthSec 2019/NorthSec 2019 - Joan Calvet - The (Long) Journey to a Multi-Architecture Disassembler.mp4 71.4 MB
- NorthSec 2018/Sebastien Larinier (sebdraven) - Python and Machine Learning.mp4 69.0 MB
- NorthSec 2018/Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).mp4 68.2 MB
- NorthSec 2016/Etienne Martineau - Inter VM Data Exfiltration The Art of Cache Timing Covert Channel ....mp4 67.8 MB
- NorthSec 2016/René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures.mp4 65.5 MB
- NorthSec 2016/Masashi Crete Nishihata & John Scott Railton - Not Safe For Organizing....mp4 64.5 MB
- NorthSec 2017/Thomas Pornin - BearSSL SSL For all Things.mp4 62.6 MB
- NorthSec 2018/Martijn Grooten -- Getting ahead of the elliptic curve.mp4 61.2 MB
- NorthSec 2019/NorthSec 2019 - Eva Galperin - Where Do We Go From Here Stalkerware, Spouseware etc.mp4 60.4 MB
- NorthSec 2019/NorthSec 2019 - Hugo Porcher - Wajam From a Start-up to Massive Spread Adware.mp4 58.2 MB
- NorthSec 2018/Stephane Graber - What are containers exactly and can they be trusted.mp4 58.0 MB
- NorthSec 2016/Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis - YouTube.mp4 56.9 MB
- NorthSec 2018/Ron Bowes - Video game hacks, cheats, and glitches.mp4 56.7 MB
- NorthSec 2019/NorthSec 2019 - Mathieu Saulnier - The SOC Counter ATT&CK.mp4 55.8 MB
- NorthSec 2018/Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.mp4 55.7 MB
- NorthSec 2018/Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.mp4 55.7 MB
- NorthSec 2016/Eugene Rodionov & Alexander Matrosov Analysis of High level Intermediate ....mp4 55.5 MB
- NorthSec 2018/Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.mp4 54.4 MB
- NorthSec 2018/Dimitry Snezhkov -- Quick Retooling with.NET Payloads.mp4 54.2 MB
- NorthSec 2017/David Goulet - Deep Dive Into Tor Onion Services.mp4 54.2 MB
- NorthSec 2019/NorthSec 2019 - Yamila Vanesa Levalle - M33tfinder.mp4 54.1 MB
- NorthSec 2015/NorthSec 2015 - Chris Prince - Privacy, Surveillance & Oversight.mp4 54.0 MB
- NorthSec 2019/NorthSec 2019 - Kurtis Armour & Jacob Grant - Threat hunting in the cloud.mp4 53.3 MB
- NorthSec 2019/NorthSec 2019 - Elissa Shevinsky - What is our Ethical Obligation to Ship Secure Code.mp4 52.6 MB
- NorthSec 2018/Paul Rascagneres & Warren Mercer - Surprise Supplies!.mp4 52.1 MB
- NorthSec 2015/NorthSec 2015 - Dave Lewis - DDoS Barbarians at the Gate.mp4 52.1 MB
- NorthSec 2018/Robert Sell - Exploits in Wetware.mp4 49.9 MB
- NorthSec 2018/Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.mp4 49.4 MB
- NorthSec 2015/NorthSec 2015 - Paul Rascagneres - The Uroburos case Analysis of the tools used by this Actor.mp4 49.2 MB
- NorthSec 2019/NorthSec 2019 - Erica Portnoy - Making it easier for everyone to get Let's Encrypt certs w Certbot.mp4 46.1 MB
- NorthSec 2016/Lex Gill - Law, Metaphor and the Encrypted Machine.mp4 46.0 MB
- NorthSec 2015/NorthSec 2015 - Eugene Rodionov & Aleksandr Matrosov - OO RE with HexraysCodeXplorer.mp4 46.0 MB
- NorthSec 2016/Sophia D’Antoine - Practical Uses of Program Analysis Automatic Exploit Generation.mp4 45.6 MB
- NorthSec 2017/Masarah Paquet-Clouston & Olivier Bilodeau - Attacking Linux Moose Unraveled an Ego Market.mp4 45.1 MB
- NorthSec 2017/Pierre-Alexandre Braeken - Hack Microsoft Using Microsoft Signed Binaries.mp4 44.6 MB
- NorthSec 2016/Philippe Arteau - The New Wave of Deserialization Bugs.mp4 42.9 MB
- NorthSec 2017/Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer.mp4 42.0 MB
- NorthSec 2015/NorthSec 2015 - Robert Wood - Threat Modeling for the Gaming Industry.mp4 41.7 MB
- NorthSec 2015/NorthSec 2015 - Jean Francois Cloutier & Francois Gagnon - CHEKS.mp4 39.9 MB
- NorthSec 2016/Laurent Desaulniers - Stupid Pentester Tricks.mp4 38.8 MB
- NorthSec 2018/Charles Hamilton - A Journey into Red Team.mp4 37.1 MB
- NorthSec 2019/NorthSec 2019 - Philippe Lamontagne - Post-Quantum Manifesto.mp4 36.8 MB
- NorthSec 2016/Eric Evenchick - CANtact An Open Tool for Automotive Exploitation.mp4 36.6 MB
- NorthSec 2017/Shawn Marriott - Data Science Tools and Techniques for the Blue Team.mp4 36.1 MB
- NorthSec 2017/Chris Prince - How Surveillance Law was Expanded in Canada, What the Media has Reported, What’s Next.mp4 34.7 MB
- NorthSec 2017/Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 34.0 MB
- NorthSec 2015/NorthSec 2015 - Joan Calvet - The Sednit Group, Cyber Espionage In Eastern Europe.mp4 33.9 MB
- NorthSec 2017/James Kettle - Backslash Powered Scanning Implementing Human Intuition.mp4 33.6 MB
- NorthSec 2015/NorthSec 2015 - Olivier Bilodeau - Two Years Of Montrehack the local CTF training initiative.mp4 32.8 MB
- NorthSec 2018/Melanie Segado -- Brain Implants & Mind Reading.mp4 32.7 MB
- NorthSec 2017/Jackson Thuraisamy & Jason Tran - Hacking POS PoS Systems.mp4 31.7 MB
- NorthSec 2018/Thomas Pornin - Non-Crypto Constant-Time Coding.mp4 30.8 MB
- NorthSec 2018/Marc-André Labonté - The Blackbear Project.mp4 30.5 MB
- NorthSec 2015/NorthSec 2015 - Eric Evenchick - Hopping on the CAN bus.mp4 30.1 MB
- NorthSec 2015/NorthSec 2015 - Trevor Perrin - TextSecure Protocol Present and Future.mp4 28.9 MB
- NorthSec 2017/Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4 28.4 MB
- NorthSec 2015/NorthSec 2015 - Guillaume Ross - CTF or WTF.mp4 27.5 MB
- NorthSec 2018/Silvia Väli - Only an Electron away from code execution.mp4 26.9 MB
- NorthSec 2018/Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.mp4 25.8 MB
- NorthSec 2018/Filip Kafla -- From Hacking Team to Hacked Team to….mp4 25.3 MB
- NorthSec 2018/Karla Burnett - Ichthyology Phishing as a Science.mp4 24.9 MB
- NorthSec 2018/Olivier Arteau -- Prototype pollution attacks in NodeJS applications.mp4 24.6 MB
- NorthSec 2015/NorthSec 2015 - Mathieu Lavoie - Bitcoin Putting the Pseudo Back in Pseudonymous.mp4 23.3 MB
- NorthSec 2017/Charles F. Hamilton - Don’t Kill My Cat.mp4 21.8 MB
- NorthSec 2018/Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 21.2 MB
- NorthSec 2018/Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.mp4 19.8 MB
- NorthSec 2018/Laurent Desaulniers - Stupid Purple Teamer Tricks.mp4 18.8 MB
- NorthSec 2015/NorthSec 2015 - Philippe Arteau - Breaking PRNGs.mp4 18.4 MB
- NorthSec 2016/Jake Sethi Reiner - Security Problems of an Eleven Year Old and How to Solve Them.mp4 10.2 MB
- NorthSec 2018/Daniel Bohannon - Invoke-DOSfuscation Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation).en.transcribed.srt 185.0 kB
- NorthSec 2018/Charles Hamilton - A Journey into Red Team.en.transcribed.srt 173.1 kB
- NorthSec 2018/Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development.en.transcribed.srt 166.0 kB
- NorthSec 2018/Mark Mossberg - Binary analysis, meet the blockchain.en.transcribed.srt 145.4 kB
- NorthSec 2018/Robert Sell - Exploits in Wetware.en.transcribed.srt 143.3 kB
- NorthSec 2018/Dave gattaca Lewis - Data Breaches Barbarians in the Throne Room.en.transcribed.srt 140.6 kB
- NorthSec 2018/Sarah Friend & Jon Maurelian - Smart contract vulnerabilities.en.transcribed.srt 138.7 kB
- NorthSec 2018/Ron Bowes - Video game hacks, cheats, and glitches.en.transcribed.srt 137.3 kB
- NorthSec 2018/Stephane Graber - What are containers exactly and can they be trusted.en.transcribed.srt 136.8 kB
- NorthSec 2018/Dimitry Snezhkov -- Quick Retooling with.NET Payloads.en.transcribed.srt 135.2 kB
- NorthSec 2018/Eleanor Saitta - How to Think (About Complex Adversarial Systems).en.transcribed.srt 130.1 kB
- NorthSec 2018/Martijn Grooten -- Getting ahead of the elliptic curve.en.transcribed.srt 125.7 kB
- NorthSec 2018/Paul Rascagneres & Warren Mercer - Surprise Supplies!.en.transcribed.srt 125.1 kB
- NorthSec 2018/Masha Alimardani - Tightening the Net in Iran.en.transcribed.srt 112.9 kB
- NorthSec 2018/Danny Cooper & Allan Wirth - Homeward Bound Scanning Private IP Space with DNS Rebinding.en.transcribed.srt 105.3 kB
- NorthSec 2018/Melanie Segado -- Brain Implants & Mind Reading.en.transcribed.srt 104.7 kB
- NorthSec 2019/NorthSec 2019 - Joan Calvet - The (Long) Journey to a Multi-Architecture Disassembler.en(transcribed).srt 103.9 kB
- NorthSec 2018/Karla Burnett - Ichthyology Phishing as a Science.en.transcribed.srt 103.2 kB
- NorthSec 2019/NorthSec 2019 - Philip Young - Mainframe Hacking in 2019.en(transcribed).srt 96.4 kB
- NorthSec 2019/NorthSec 2019 - Thomas Pornin - T1 Secure Programming For Embedded Systems.en(transcribed).srt 94.4 kB
- NorthSec 2019/NorthSec 2019 - Arezou Hosseinzad-Amirkhizi & Apurva Kumar - xRAT.en(transcribed).srt 82.4 kB
- NorthSec 2019/NorthSec 2019 - Kurtis Armour & Jacob Grant - Threat hunting in the cloud.en(transcribed).srt 78.4 kB
- NorthSec 2019/NorthSec 2019 - Norman Shamas - Safer Online Sex Harm Reduction and Queer Dating Apps.en(transcribed).srt 76.8 kB
- NorthSec 2019/NorthSec 2019 - Kristin Del Rosso - Using Geopolitical Conflicts for Threat Hunting.en(transcribed).srt 74.3 kB
- NorthSec 2018/Olivier Arteau -- Prototype pollution attacks in NodeJS applications.en.transcribed.srt 66.2 kB
- NorthSec 2018/Silvia Väli - Only an Electron away from code execution.en.transcribed.srt 60.4 kB
- NorthSec 2018/Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators.en.transcribed.srt 56.0 kB
- NorthSec 2019/NorthSec 2019 - Eva Galperin - Where Do We Go From Here Stalkerware, Spouseware etc.en(transcribed).srt 54.7 kB
- NorthSec 2018/Laurent Desaulniers - Stupid RedTeamer Tricks.en.transcribed.srt 54.4 kB
- NorthSec 2019/NorthSec 2019 - Mathieu Saulnier - The SOC Counter ATT&CK.en(transcribed).srt 50.6 kB
- NorthSec 2019/NorthSec 2019 - Hugo Porcher - Wajam From a Start-up to Massive Spread Adware.en(transcribed).srt 50.3 kB
- NorthSec 2018/Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware.en.transcribed.srt 48.6 kB
- NorthSec 2018/Marc-André Labonté - The Blackbear Project.en.transcribed.srt 48.3 kB
- NorthSec 2019/NorthSec 2019 - Philippe Lamontagne - Post-Quantum Manifesto.en(transcribed).srt 46.2 kB
- NorthSec 2018/Laurent Desaulniers - Stupid Purple Teamer Tricks.en.transcribed.srt 44.4 kB
- NorthSec 2019/NorthSec 2019 - Elissa Shevinsky - What is our Ethical Obligation to Ship Secure Code.en(transcribed).srt 40.4 kB
- NorthSec 2018/Filip Kafla -- From Hacking Team to Hacked Team to….en.transcribed.srt 37.6 kB
- NorthSec 2019/NorthSec 2019 - Yamila Vanesa Levalle - M33tfinder.en(transcribed).srt 31.7 kB
- NorthSec Logo.jpg 12.2 kB
- NorthSec thank you.txt 849 Bytes
==查看完整文档列表==