<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://nsec.io/2022-05-14-hybrid</loc>
<lastmod>2022-05-14T08:00:00+00:00</lastmod>
</url>
<url>
<loc>https://nsec.io/about-us/</loc>
</url>
<url>
<loc>https://nsec.io/archive/</loc>
</url>
<url>
<loc>https://nsec.io/badge2021/</loc>
</url>
<url>
<loc>https://nsec.io/become-a-sponsor/</loc>
</url>
<url>
<loc>https://nsec.io/blog/</loc>
</url>
<url>
<loc>https://nsec.io/cfp/</loc>
</url>
<url>
<loc>https://nsec.io/code-of-conduct/</loc>
</url>
<url>
<loc>https://nsec.io/community-room/</loc>
</url>
<url>
<loc>https://nsec.io/competition-hall-of-fame/</loc>
</url>
<url>
<loc>https://nsec.io/competition-write-ups/</loc>
</url>
<url>
<loc>https://nsec.io/competition/</loc>
</url>
<url>
<loc>https://nsec.io/contest-2021/</loc>
</url>
<url>
<loc>https://nsec.io/dedicated-sponsor/</loc>
</url>
<url>
<loc>https://nsec.io/discord/</loc>
</url>
<url>
<loc>https://nsec.io/diversity/</loc>
</url>
<url>
<loc>https://nsec.io/faq/</loc>
</url>
<url>
<loc>https://nsec.io/</loc>
</url>
<url>
<loc>https://nsec.io/newsletter/</loc>
</url>
<url>
<loc>https://nsec.io/past-editions/</loc>
</url>
<url>
<loc>https://nsec.io/photos/</loc>
</url>
<url>
<loc>https://nsec.io/privacy-policy/</loc>
</url>
<url>
<loc>https://nsec.io/schedule-community/</loc>
</url>
<url>
<loc>https://nsec.io/schedule-competition/</loc>
</url>
<url>
<loc>https://nsec.io/schedule-workshop/</loc>
</url>
<url>
<loc>https://nsec.io/schedule/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2017/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2018/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2019/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2020/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2021/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2022/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2023/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2024/</loc>
</url>
<url>
<loc>https://nsec.io/sessions/2025/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2017/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2018/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2019/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2020/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2021/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2022/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2023/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2024/</loc>
</url>
<url>
<loc>https://nsec.io/speakers/2025/</loc>
</url>
<url>
<loc>https://nsec.io/sponsors/</loc>
</url>
<url>
<loc>https://nsec.io/team/</loc>
</url>
<url>
<loc>https://nsec.io/training-sessions/</loc>
</url>
<url>
<loc>https://nsec.io/venue/</loc>
</url>
<url>
<loc>https://nsec.io/villages/</loc>
</url>
<url>
<loc>https://nsec.io/volunteer/</loc>
</url>
<url>
<loc>https://nsec.io/speaker/charles-f-hamilton-mrun1k0d3r</loc>
</url>
<url>
<loc>https://nsec.io/speaker/steven-wierckx</loc>
</url>
<url>
<loc>https://nsec.io/speaker/abhinav-singh</loc>
</url>
<url>
<loc>https://nsec.io/speaker/evan-hosinski</loc>
</url>
<url>
<loc>https://nsec.io/speaker/cindy-xiao</loc>
</url>
<url>
<loc>https://nsec.io/speaker/david-backer</loc>
</url>
<url>
<loc>https://nsec.io/speaker/steven-smiley</loc>
</url>
<url>
<loc>https://nsec.io/speaker/munaf-shariff</loc>
</url>
<url>
<loc>https://nsec.io/speaker/raunak-parmar</loc>
</url>
<url>
<loc>https://nsec.io/speaker/bobby-schwass</loc>
</url>
<url>
<loc>https://nsec.io/speaker/olaf-hartong</loc>
</url>
<url>
<loc>https://nsec.io/speaker/rogier-boon</loc>
</url>
<url>
<loc>https://nsec.io/speaker/chirag-savla</loc>
</url>
<url>
<loc>https://nsec.io/speaker/jay-pandya</loc>
</url>
<url>
<loc>https://nsec.io/speaker/harish-ramadoss</loc>
</url>
<url>
<loc>https://nsec.io/speaker/sebastien-dudek</loc>
</url>
<url>
<loc>https://nsec.io/speaker/hope-walker</loc>
</url>
<url>
<loc>https://nsec.io/speaker/logan-maclaren</loc>
</url>
<url>
<loc>https://nsec.io/speaker/lewis-moore</loc>
</url>
<url>
<loc>https://nsec.io/speaker/santiago-abastante</loc>
</url>
<url>
<loc>https://nsec.io/speaker/faan-rossouw</loc>
</url>
<url>
<loc>https://nsec.io/speaker/ben-gardiner</loc>
</url>
<url>
<loc>https://nsec.io/speaker/-</loc>
</url>
<url>
<loc>https://nsec.io/speaker/tammy-harper</loc>
</url>
<url>
<loc>https://nsec.io/speaker/mark-el-khoury</loc>
</url>
<url>
<loc>https://nsec.io/speaker/ashley-manraj</loc>
</url>
<url>
<loc>https://nsec.io/speaker/philippe-dugrezer0x64</loc>
</url>
<url>
<loc>https://nsec.io/speaker/guillaume-valadon</loc>
</url>
<url>
<loc>https://nsec.io/speaker/gaetan</loc>
</url>
<url>
<loc>https://nsec.io/speaker/philippe-pepos-petitclerc</loc>
</url>
<url>
<loc>https://nsec.io/speaker/emilio-gonzalez</loc>
</url>
<url>
<loc>https://nsec.io/speaker/francois-labreche</loc>
</url>
<url>
<loc>https://nsec.io/speaker/wietze</loc>
</url>
<url>
<loc>https://nsec.io/speaker/reza-sharifi</loc>
</url>
<url>
<loc>https://nsec.io/speaker/andrew-buchanan</loc>
</url>
<url>
<loc>https://nsec.io/speaker/max-cm</loc>
</url>
<url>
<loc>https://nsec.io/speaker/connor-laidlaw</loc>
</url>
<url>
<loc>https://nsec.io/speaker/dirk-jan-mollema</loc>
</url>
<url>
<loc>https://nsec.io/speaker/sanne-maasakkers</loc>
</url>
<url>
<loc>https://nsec.io/speaker/jeremy-miller</loc>
</url>
<url>
<loc>https://nsec.io/speaker/manu-jose</loc>
</url>
<url>
<loc>https://nsec.io/speaker/joshua-prager</loc>
</url>
<url>
<loc>https://nsec.io/speaker/ben-schroeder</loc>
</url>
<url>
<loc>https://nsec.io/speaker/christian-paquin</loc>
</url>
<url>
<loc>https://nsec.io/speaker/robbe-van-roey</loc>
</url>
<url>
<loc>https://nsec.io/speaker/ron-bowes</loc>
</url>
<url>
<loc>https://nsec.io/speaker/xavier-facelina</loc>
</url>
<url>
<loc>https://nsec.io/speaker/charl-alexandre-le-brun</loc>
</url>
<url>
<loc>https://nsec.io/speaker/simon-lachkar</loc>
</url>
<url>
<loc>https://nsec.io/speaker/francois-proulx</loc>
</url>
<url>
<loc>https://nsec.io/speaker/pierre-nicolas-allard-coutu</loc>
</url>
<url>
<loc>https://nsec.io/speaker/philippe-marchand</loc>
</url>
<url>
<loc>https://nsec.io/speaker/kristine-barbara</loc>
</url>
<url>
<loc>https://nsec.io/speaker/brad-edwards</loc>
</url>
<url>
<loc>https://nsec.io/speaker/maxime-arquilliere</loc>
</url>
<url>
<loc>https://nsec.io/speaker/coline-c</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-begin</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-end</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-offensive-development</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hacking-securing-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-practical-burp-advanced-tactics</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-command--conquer-a-hands-on-c2-primer-for-aspiring-red--blue-teamers</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-aws-security-the-purple-team-way</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-agentic-ai-for-threat-hunting</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-hardware-re-a-gentle-intro</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-the-ransomware-negotiation-lab</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-diy-continuous-security-practical-security-engineering</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-breaking-and-hardening-the-cloud-advanced-hooking-and-shellcoding-in-a-hardened-environment</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-private-key-leaks-in-the-wild-insights-from-certificate-transparency</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-a-systematic-approach-to-evading-antivirus-software</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-increasing-detection-engineering-maturity-with-detection-as-code</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-a-needle-in-a-haystack-identifying-an-infostealer-attack-through-trillions-of-events-in-a-large-scale-modern-soc</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-trust-me-im-a-shortcut-new-lnk-abuse-methods</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-internet-blackout-2026-in-iran1next-level-internet-censorship-a-technical-breakdown-of-techniques-and-tactics</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-commit-push-compromise-attacking-modern-github-orgs</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-researchers-vs-threat-actors-in-cloud-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-measuring-ai-ability-to-complete-long-cybersecurity-tasks</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-the-merchant-of-venice-trading-latency-for-security-at-scale</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-mapping-deception-solutions-with-bloodhound-opengraph</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-doxxing-proof-authentic-digital-media-trust-the-asset-protect-the-source</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-hacking-browsers-the-easy-way</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-adventures-in-process-injection-how-i-accidentally-built-a-debugger-again</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-le-futur-sinvente-avant-hier</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-the-opengraph-diary-attack-path-management-applied-to-ansible</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-living-off-the-pipeline-defensive-research-weaponized</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-stolen-laptops--defeating-dma-countermeasures</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-cybermenaces-geopolitiques-au-canada--etat-des-lieux-et-perspectives-strategiques</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-from-experts-to-everyone-democratizing-threat-modeling-at-ubisoft</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-when-serverless-becomes-a-foothold-abusing-azure-function-apps-in-modern-cloud-environments</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-aptl-an-open-source-agentic-purple-team-lab</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-sold-to-the-highest-bidder--the-escalation-of-adint-from-geolocation-tracking-to-intrusion-vector</loc>
</url>
<url>
<loc>https://nsec.io/session/2026-hacking-5g-from-radio-security-to-the-apis</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-begin</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-end</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-offensive-development</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hacking-securing-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-practical-burp-advanced-tactics</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-efficient-web-hacking-with-caido</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-baremetal-emulation</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-basic-amateur-radio-exam</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-flying-under-the-radar-abusing-http-to-bypass-suricata</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-red-team-live-coding-session</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-get-off-your-high-horse--how-your-expertise-doesnt-matter-in-an-ipv-context</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-reconstructing-rust-types-a-practical-guide-for-reverse-engineers</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-reading-the-docs-hardware-hacking</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-runzero-video</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-registration--enregistrement</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-2--ctf-jour-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-2-continued--ctf-jour-2-suite</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-hacker-jeopardy</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-3--ctf-jour-3</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-costume-contest</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-1--ctf-jour-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-closing-ceremony--ceremonie-de-cloture-du-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-2--breakfast-by-corsek--ctf-jour-2-et-dejeuner-par-corsek</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-post-jeopardy-pizza-by-okiok</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-day-3--breakfast-by-google--ctf-jour-3-et-dejeuner-par-google</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-garderie-childcare-vendredifriday</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-garderie-childcare-jeudithursday</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ctf-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-garderie-childcare-dimanchesunday</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-garderie-childcare-samedisaturday</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-merch-village-day-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-merch-village-day-5</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-merch-village-day-4</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-merch-village-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-merch-village-day-3</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-a-pirates-guide-to-snake-oil-and-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-a-tabletop-as-big-as-the-world</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-doors-open-and-registration-thursdayjeudi</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-doors-open-and-registration-fridayvendredi</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-opening-2nd-day--ouverture-2e-jour</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-malware-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-red-team-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-ml-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-appsec-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-thursday-party--party-du-jeudi</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-stolen-laptops-a-brief-overview-of-modern-physical-access-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-living-off-the-pipeline-from-supply-chain-0-days-to-predicting-the-next-xz-like-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-when-the-threat-actor-lives-under-your-roof-fighting-technological-violence-in-domestic-abuse-cases</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-weaponizing-xss-cyberespionage-tactics-in-webmail-exploitation</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-lightning-talks</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-uno-reverse-card-exposing-c2-operators-through-their-own-logs</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-persona-theory-infiltration-and-deception-of-emerging-threat-groups</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-enregistrement-de-podcast-polysecure</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-uplevel-your-security-program-with-ai</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-executing-shellcode-without-changing-memory-permission-in-net</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-noise-pollution-is-damaging-your-soc-prevent-iocs-from-turning-into-indication-of-cacophony</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-red-team-road-rage-weaponizing-vulnerable-drivers-to-blind-edr</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-exploring-azure-logic-apps-and-turning-misconfigurations-into-attack-opportunities</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-exploiting-the-not-so-misuse-resistant-aes-gcm-api-of-openssl</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-enhancing-identity-credential-privacy-with-zero-knowledge-proofs</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-the-evolution-of-malware-distribution-through-ghost-networks</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-exploring-msix-threat-landscape</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-social-engineering-for-physical-pentesting-assignments</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-salesforce-snafus-unveiling-and-exploiting-security-misconfigurations-using-commonly-used-widgets</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-opening-ceremony</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-why-preventing-phishing-is-so-difficult-and-what-we-can-do-about-it</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-from-security-to-safety-navigating-the-ethics-of-ai-as-red-teamers-and-penetration-testers</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-linux-and-iot-malware-analysis-with-r2ai</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-nice-to-meet-you-that-will-be-20-million-please</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-vulnerability-haruspicy-using-woo-to-confirm-your-biases</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-one-certificate-to-rule-them-all-the-story-of-a-chinese-nexus-botnet</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-how-not-to-do-ml-showing-the-negative-impact-of-improper-cve-feature-selection-in-a-live-exploit-prediction-model</loc>
</url>
<url>
<loc>https://nsec.io/session/2025-oops-i-hacked-it-again-tales-and-disclosures</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-begin</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-end</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-offensive-development</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hacking-securing-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-practical-burp-advanced-tactics</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-examen-radioamateur-competence-de-base--amateur-radio-basic-competency-exam</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-prevent-first-detect-second-an-open-source-approach</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-mastering-exegol</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-toolbox-for-reverse-engineering-and-binary-exploitation</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-how-crypto-gets-broken-by-you</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-machine-learning-for-security-professionals-building-and-hacking-ml-systems</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-reversing-rust-binaries-one-step-beyond-strings</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-exploiter-ansible-worx-et-tout-le-reste</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-gaming-on-the-video-wall</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-registration-thursdayjeudi</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ouverture-du-ctf-de-la-commune--ctf-opening</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-salle-de-bal-registration--enregistrement</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-day-2--competition-jour-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-post-jeopardy-pizza</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-the-ctf-begins--ouverture-du-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-day-2-cont--competition-jour-2-suite</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-closing-ceremony--ceremonie-de-cloture-du-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-day-1--competition-jour-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ouverture-de-la-competition-jour-2--ctf-opening-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-salle-de-la-commune-registration--enregistrement</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-day-3--competition-jour-3</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hacker-jeopardy</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-i-will-look-for-you-and-i-will-find-you-osint-extras</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-soldering-workshop-day-2--atelier-de-soudure-jour-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-friday-community-booths--kiosques-communautaires-du-vendredi</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-examen-radioamateur-competence-de-base--amateur-radio-basic-competency-exam</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-soldering-workshop--atelier-de-soudure</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-thursday-community-booths--kiosques-communautaires-du-jeudi</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-soldering-village--village-de-la-soudure</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ctf-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-pickpocketing-workshop-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-pickpocketing-workshop-3</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-guys-games-and-beer-podcast-recording-cybersecurity-in-the-video-game-industry</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-enregistrement-du-podcast-polysecure</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-pickpocketing-workshop-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-technical-analysis-past-present-and-future-insights-from-a-reverse-engineering-perspective</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-doors-open-and-registration-fridayvendredi</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-doors-open-and-registration-thursdayjeudi</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-fermeture-conference-closing</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-conference-introduction</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hardware-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-lightning-talks</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-malware-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-red-team-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-appsec-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-machine-learning-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-human-in-the-middle-qa</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-electroencephalogram-eeg-duel</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-pickpocket-show</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-thursday-party</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-reverse-engineering-nim-malware-or-a-brief-tale-of-analyzing-the-compiler-for-a-language-i-had-never-used</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-finding-signals-in-the-noise-why-write-exploits-when-attackers-share-them-for-free</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-whats-new-is-old-parallels-of-owasps-top-10-for-llms-and-web-applications</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-insert-coin-hacking-arcades-for-fun</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-hardware-hacking-curiosity</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-crowdsourced-ddos-attacks-amid-geopolitical-events</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-will-the-real-attribution-please-stand-up</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-ebury-10-years-in-the-evolution-of-a-sophisticated-linux-server-threat</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-browser-is-the-new-lsass</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-scrutiny-debugger-debug-test-and-configure-embedded-softwares-through-instrumentation</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-beware-of-infosec-influencers</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-i-will-look-for-you-and-i-will-find-you-osint-on-publicly-shared-pictures</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-under-the-radar-how-we-found-0-days-in-the-build-pipeline-of-oss-packages</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-redefining-digital-security-a-new-approach-for-ipv-victims</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-unregister-me-advanced-techniques-for-hunting-and-securing-user-registration-vulnerabilities</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-with-great-gain-comes-greater-security-issues-when-ml-frameworks-scale-for-growth-incorporates-security-risks-to-users-cloud-accounts</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-graphrunner-and-defending-your-microsoft-tenant</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-cyber-incident-command-system-a-firefighters-approach-to-managing-cyber-incidents</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-heartbleed-ten-years-later</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-jupyter-jetpack-automating-cloud-threat-hunting</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-simplified-malware-evasion-entropy-and-other-techniques</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-real-or-fake-tools-to-fight-online-disinformation</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-api-alternate-pathway-to-injection</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-unveiling-the-ot-threat-landscape</loc>
</url>
<url>
<loc>https://nsec.io/session/2024-double-trouble-unmasking-twin-phishing-campaigns-targeting-e-commerce-and-travel-sites</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-ctf-begin</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-ctf-end</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-kubernetes</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-aws-azure</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-tim-deobfuscation</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-beau-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-onapsis-sap</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-nicolas-burp</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-specterops-rto</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-android</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-tokens-everywhere</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-analyse-dynamique-de-pilotes-windows</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-an-introduction-to-continuous-security-testing</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-capture-the-flag-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-introduction-to-cryptographic-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-malware-reverse-engineering-workshop</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-malware-morphology-for-detection-engineers</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-go-reverse-engineering-workshop</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-desinformation-101-pour-les-experts-en-cybersecurite</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-badgelife--the-dark-art-of-badge-necromancy</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-prestation-musicale--live-coding-avec-rnbwtrsh</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-keeping-ukraine-connected</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-shambles-the-next-generation-iot-reverse-engineering-tool-for-uncovering-0-day-vulnerabilities-by-olivier-boschko-laflamme</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-one-more-time-the-story-behind-the-helmets</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-podcast-polysecure-enregistrement--chill-corner</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-empowering-security-with-generative-ai-fundamentals-and-applications-of-gpt-models</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-scams-a-generative-ai-use-case</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-10-years-of-northsec-if-you-count-from-0</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-ctf-closing-ceremony</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-welcome-to-northsec-2023</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-qa-criminology</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-qa-malware</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-qa-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-qa-vulnerability-research</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-qa-detection</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-10-years-anniversary-party-with-one-more-time-daft-punk-tribute</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-hacker-jeopardy</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-10-years-anniversary-cocktail-sponsored-by-gosecure--checkpoint</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-tracking-bumblebees-development</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-abusing-github-for-fun-and-profit-actions-and-codespaces-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-windows-hello-from-the-other-side</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-broken-links-behind-the-scenes-of-supply-chain-breaches</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-evasion-as-a-red-teamer</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-the-quantum-clock-is-ticking-get-ready</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-grpc-security-with-less-effort</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-human-versus-machine-the-level-of-human-interaction-in-automated-attacks-targeting-the-remote-desktop-protocol</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-roll-for-stealth-evading-avedr-entropy-checks</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-willy-wonka-and-the-detection-factory-detection-engineering-without-alert-fatigue</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-from-on-premises-to-cloud-a-comprehensive-analysis-of-sap-security-issues</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-behind-the-scenes-in-github-bug-bounty</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-infrastructure-as-code-automation-and-testing-the-key-to-unlocking-the-power-of-detection-engineering</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-privacy-through-the-lens-of-code</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-checkmate-using-game-theory-to-study-the-evolution-of-ransomware</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-burp-suite-pro-tips-and-tricks-the-sequel</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-thwarting-malware-analysis-integrating-established-and-novel-techniques</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-asylum-ambuscade-crimeware-or-cyberespionage</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-to-the-moon-and-back-how-we-found-and-exploited-a-series-of-critical-vulns-in-an-rpc-server</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-vulnerabilites-des-reseaux-overlays-vxlan-dans-les-datacenters</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-roses-are-red-violets-are-blue-s4u-bamboozles-me-u2u-too</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-password-delauditdel-cracking-in-ad-the-fun-part-of-compliance</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-deception-for-pentesters</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-too-anonymous-to-prosecute-survey-and-interviews-on-shadow-phones</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-profiling-risky-code-using-machine-learning</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-democratizing-cyber-warfare-and-the-battle-for-ukraine-tactics-techniques-and-methods-for-effective-offensive-cyber-operations</loc>
</url>
<url>
<loc>https://nsec.io/session/2023-practical-exploitation-of-cryptographic-flaws-in-windows</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-mac-tradecraft</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-initial-access</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-physical-sec</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-tradecraft-analysis</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-purple-aws</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-hacking-modern-web-apps</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-web-application-firewall-workshop</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-advanced-process-injection-techniques</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-capture-the-flag-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-reverse-and-bypass-of-modern-android-runtime-protections-fr</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-fleet-and-osquery-open-source-device-visibility</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-announcements</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-announcements--raffle</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-blackhoodie-at-northsec-2022-getting-cosy-with-malware-static-analysis-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-blackhoodie-at-northsec-2022-getting-cosy-with-malware-static-analysis</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-lab2038-cryptoparty--nsec</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-techniques-brassicoles-a-travers-le-monde</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-thieves-den-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-electronic-music-workshop-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-infosec-et-medias</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-electronic-music-workshop-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-thieves-den--introduction-to-pickpocketing-day-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-reparothon-en-collaboration-avec-insertech-kiosques</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-flipperzero-meetup</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-techniques-brassicoles-a-travers-le-monde</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-open-mic-community-talks</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-what-lies-behind-canadas-internet-regulation-reversal</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-opening-remarks</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-red-team-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-appsec-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-detection--response-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-privacy-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-cryptography-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-malware-block</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-obfuscation-classification-via-machine-learning</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-public-verifiable-and-unbiasable-randomness-wassat</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-muddywater-from-canaries-to-turkeys</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-formalizing-the-right-to-be-forgotten-law-meets-crypto</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-10-things-i-wish-i-knew-before-my-first-incident</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-i-thought-writing-a-technical-book-was-supposed-to-be-fun</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-the-risks-of-rdp-and-how-to-mitigate-them</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-a-snapshot-of-doplik-unwanted-software-using-serialized-javascript-bytecode-as-an-anti-analysis-technique</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-jumping-the-air-gap-15-years-of-nation-state-efforts</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-the-road-to-beyondcorp-is-paved-with-good-intentions</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-passive-recon--intelligence-collection-using-cyber-squatted-domains</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-hook-line-and-sinker-pillaging-api-webhooks</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-from-the-cluster-to-the-cloud-and-back-to-the-cluster-lateral-movements-in-kubernetes</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-privacy-friendly-qr-codes-for-identity</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-tell-me-where-you-live-and-i-will-tell-your-pssw0rd-understanding-the-macrosocial-factors-influencing-passwords-strength</loc>
</url>
<url>
<loc>https://nsec.io/session/2022-i-am-become-loadbalancer-owner-of-your-network</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/filler</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-cloud-ncc</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-malware-traffic</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intrusion-operations</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-detection-engineering</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-red-team</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-modern-webapp</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-specterops</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-reverse-engineering-practical-overview</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-security-teams</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-hardware</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-cloud-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-detection-engineering-panel</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-hardware</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-vulnerability-research</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-platforms--privacy</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-security-teams</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-malware</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-appsec</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-intro-detection-engineering</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-youre-not-an-idiot</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-privacy-without-monopoly-beyond-feudal-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-application-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-malware--geopolitics</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-vulnerability-research</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-privacy-online-platforms--misinformation</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-security-metrics-that-matter</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-full-circle-detection-from-hunting-to-actionable-detection</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-unmasking-the-cameleons-of-the-criminal-underground-an-analysis-from-bot-to-illicit-market-level</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-repo-jacking-how-github-usernames-expose-70000-open-source-projects-to-remote-code-injection</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-data-science-way-to-deal-with-advanced-threats</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-damn-graphql-attacking-and-defending-apis</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-building-cantact-pro-an-open-source-can-bus-tool</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-burnout-destabilizing-retention-goals-and-threatening-organizational-security</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-blurred-lines-the-mixing-of-apts-with-crimeware-groups</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-forensicating-endpoint-artifacts-in-the-world-of-cloud-storage-services</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-see-something-say-something-the-state-of-coordinated-vulnerability-disclosure-in-canadas-federal-government</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-bypassing-advanced-device-profiling-with-dhcp-packet-manipulation</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-just-add-more-leds-nsec-2018-and-2019-badge-mods</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-hacking-k-12-school-software-in-a-time-of-remote-learning</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-request-smuggling-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-crimeops-of-the-kashmirblack-botnet</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-druby-security-internals</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-amitt-countermeasures-a-defensive-framework-to-counter-disinformation</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-critical-vulnerabilities-in-network-equipment-past-present-and-future</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-authentication-challenges-in-saas-integration-and-cloud-transformation</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-social-bots-malicious-use-of-social-media</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-cryptography-dos-and-dont-in-2021</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-how-to-harden-your-electron-app</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-the-2021-badge-and-other-surprises</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-introduction-to-fuzzing</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-diy-static-code-analyzer-building-your-own-security-tools-with-joern</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-atomic-red-team-hands-on-getting-started-guide</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-capture-the-flag-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-reversing-android-malware-for-the-smart-and-lazy</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-automated-contact-tracing-experiment-on-esp-vroom32</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-how-crypto-gets-broken-by-you</loc>
</url>
<url>
<loc>https://nsec.io/session/2021-kubernetes-security-101-best-practices-to-secure-your-cluster</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-registration</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-thursday-lunch</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-friday-lunch</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-intro-day-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-intro-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-code-of-conduct-logistics-and-more</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-hak-mtl-screening</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-conference-party</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/hacker-jeopardy</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf-close</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-opening-speeches</loc>
</url>
<url>
<loc>https://nsec.io/session/202001</loc>
</url>
<url>
<loc>https://nsec.io/session/202002</loc>
</url>
<url>
<loc>https://nsec.io/session/202003</loc>
</url>
<url>
<loc>https://nsec.io/session/202004</loc>
</url>
<url>
<loc>https://nsec.io/session/202005</loc>
</url>
<url>
<loc>https://nsec.io/session/202006</loc>
</url>
<url>
<loc>https://nsec.io/session/202007</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-practical-security-in-the-brave-new-kubernetes-world</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-finding-the-needle-in-the-needlestack-an-introduction-to-digital-forensics</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-amitt-adversarial-misinformation-playbooks</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-unicode-vulnerabilities-that-could-byite-you</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-capture-the-flag-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-iommu-and-dma-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-designing-customer-account-recovery-in-a-2fa-world</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-defending-human-rights-in-the-age-of-targeted-attacks</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-high-speed-fingerprint-cloning-myth-or-reality</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-regions-are-types-types-are-policy-and-other-ramblings</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-look-theres-a-threat-model-in-my-devsecops</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-the-path-to-software-defined-cryptography-via-multi-party-computation</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-stay-quantum-safe-future-proofing-encrypted-secrets</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-dynamic-data-resolver-ida-plugin---extending-ida-with-dynamic-data</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-offensive-cloud-security-workshop</loc>
</url>
<url>
<loc>https://nsec.io/session/2020-advanced-binary-analysis</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-registration</loc>
</url>
<url>
<loc>https://nsec.io/session/break</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-thursday-lunch</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-friday-lunch</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-intro-day-1</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-intro-day-2</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-code-of-conduct-logistics-and-more</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-hak-mtl-screening</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-conference-party</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf-reg</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf</loc>
</url>
<url>
<loc>https://nsec.io/session/hacker-jeopardy</loc>
</url>
<url>
<loc>https://nsec.io/session/ctf-close</loc>
</url>
<url>
<loc>https://nsec.io/session/201901</loc>
</url>
<url>
<loc>https://nsec.io/session/201902</loc>
</url>
<url>
<loc>https://nsec.io/session/201903</loc>
</url>
<url>
<loc>https://nsec.io/session/201905</loc>
</url>
<url>
<loc>https://nsec.io/session/201906</loc>
</url>
<url>
<loc>https://nsec.io/session/201907</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-deserialization-rce-for-modern-web-applications</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-red-teaming-workshop</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-wajam-from-a-start-up-to-massive-spread-adware</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-introduction-to-appliance-reverse-engineering</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-container-security-deep-dive</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-a-good-list-of-bad-ideas</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-the-long-journey-to-a-multi-architecture-disassembler</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-reversing-webassembly-module-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-fixing-the-internets-auto-immune-problem-bilateral-safe-harbor-for-good-faith-hackers</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-cache-me-if-you-can-messing-with-web-caching</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-safer-online-sex-harm-reduction-and-queer-dating-apps</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-threat-modeling</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-making-it-easier-for-everyone-to-get-lets-encrypt-certificates-with-certbot</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-hacking-heuristics-exploiting-the-narrative</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-introduction-to-return-oriented-programming</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-what-is-our-ethical-obligation-to-ship-secure-code</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-m33tfinder-disclosing-corporate-secrets-via-videoconferences</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-leveraging-uart-spi-and-jtag-for-firmware-extraction</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-t1-secure-programming-for-embedded-systems</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-post-quantum-manifesto</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-trick-or-treat-unveil-the-stratum-of-the-mining-pools</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-where-do-we-go-from-here-stalkerware-spouseware-and-what-we-should-do-about-it</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-xrat-monitoring-chinese-interests-abroad-with-mobile-surveillance-ware</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-hunting-linux-malware-for-fun-and-flags</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-dns-on-fire</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-one-key-to-rule-them-all-ecc-math-tricks</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-threat-hunting-in-the-cloud</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-using-angr-to-augment-binary-analysis-workflow</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-using-geopolitical-conflicts-for-threat-hunting-how-global-awareness-can-enable-new-surveillanceware-discoveries</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-capture-the-flag-101</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-cybersecurity-vs-the-world</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-welcome-to-the-jumble-improving-rdp-tooling-for-malware-analysis-and-pentesting</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-intro-to-badge-soldering</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-post-quantum-cryptography-todays-defense-against-tomorrows-quantum-hackers</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-64-bit-shellcoding-and-introduction-to-buffer-overflow-exploitation-on-linux</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-breaking-smart-contracts</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-sponsor-event</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-from-bitcoins-amateurs-to-experts-fundamentals-grouping-tracing-and-extracting-bulk-information-with-open-source-tools</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-call-center-authentication</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-mainframe-hacking-in-2019</loc>
</url>
<url>
<loc>https://nsec.io/session/2019-the-soc-counter-attck</loc>
</url>
<url>
<loc>https://nsec.io/session/1</loc>
</url>
<url>
<loc>https://nsec.io/session/2</loc>
</url>
<url>
<loc>https://nsec.io/session/3</loc>
</url>
<url>
<loc>https://nsec.io/session/4</loc>
</url>
<url>
<loc>https://nsec.io/session/5</loc>
</url>
<url>
<loc>https://nsec.io/session/6</loc>
</url>
<url>
<loc>https://nsec.io/session/7</loc>
</url>
<url>
<loc>https://nsec.io/session/008</loc>
</url>
<url>
<loc>https://nsec.io/session/009</loc>
</url>
<url>
<loc>https://nsec.io/session/8</loc>
</url>
<url>
<loc>https://nsec.io/session/9</loc>
</url>
<url>
<loc>https://nsec.io/session/10</loc>
</url>
<url>
<loc>https://nsec.io/session/201870</loc>
</url>
<url>
<loc>https://nsec.io/session/201841</loc>
</url>
<url>
<loc>https://nsec.io/session/2018142</loc>
</url>
<url>
<loc>https://nsec.io/session/201843</loc>
</url>
<url>
<loc>https://nsec.io/session/201844</loc>
</url>
<url>
<loc>https://nsec.io/session/201845</loc>
</url>
<url>
<loc>https://nsec.io/session/201846</loc>
</url>
<url>
<loc>https://nsec.io/session/2018147</loc>
</url>
<url>
<loc>https://nsec.io/session/201848</loc>
</url>
<url>
<loc>https://nsec.io/session/201849</loc>
</url>
<url>
<loc>https://nsec.io/session/201850</loc>
</url>
<url>
<loc>https://nsec.io/session/201851</loc>
</url>
<url>
<loc>https://nsec.io/session/201840</loc>
</url>
<url>
<loc>https://nsec.io/session/20180</loc>
</url>
<url>
<loc>https://nsec.io/session/20181</loc>
</url>
<url>
<loc>https://nsec.io/session/20182</loc>
</url>
<url>
<loc>https://nsec.io/session/20183</loc>
</url>
<url>
<loc>https://nsec.io/session/20184</loc>
</url>
<url>
<loc>https://nsec.io/session/201810</loc>
</url>
<url>
<loc>https://nsec.io/session/201811</loc>
</url>
<url>
<loc>https://nsec.io/session/20185</loc>
</url>
<url>
<loc>https://nsec.io/session/20186</loc>
</url>
<url>
<loc>https://nsec.io/session/20187</loc>
</url>
<url>
<loc>https://nsec.io/session/201860</loc>
</url>
<url>
<loc>https://nsec.io/session/201861</loc>
</url>
<url>
<loc>https://nsec.io/session/201862</loc>
</url>
<url>
<loc>https://nsec.io/session/201863</loc>
</url>
<url>
<loc>https://nsec.io/session/201864</loc>
</url>
<url>
<loc>https://nsec.io/session/201865</loc>
</url>
<url>
<loc>https://nsec.io/session/201866</loc>
</url>
<url>
<loc>https://nsec.io/session/201867</loc>
</url>
<url>
<loc>https://nsec.io/session/201812</loc>
</url>
<url>
<loc>https://nsec.io/session/201813</loc>
</url>
<url>
<loc>https://nsec.io/session/201814</loc>
</url>
<url>
<loc>https://nsec.io/session/2018101</loc>
</url>
<url>
<loc>https://nsec.io/session/2018102</loc>
</url>
<url>
<loc>https://nsec.io/session/201901</loc>
</url>
<url>
<loc>https://nsec.io/session/201902</loc>
</url>
<url>
<loc>https://nsec.io/session/201903</loc>
</url>
<url>
<loc>https://nsec.io/session/201904</loc>
</url>
<url>
<loc>https://nsec.io/session/201905</loc>
</url>
<url>
<loc>https://nsec.io/session/201906</loc>
</url>
<url>
<loc>https://nsec.io/session/201907</loc>
</url>
<url>
<loc>https://nsec.io/session/201820</loc>
</url>
<url>
<loc>https://nsec.io/session/1</loc>
</url>
<url>
<loc>https://nsec.io/session/2</loc>
</url>
<url>
<loc>https://nsec.io/session/3</loc>
</url>
<url>
<loc>https://nsec.io/session/4</loc>
</url>
<url>
<loc>https://nsec.io/session/5</loc>
</url>
<url>
<loc>https://nsec.io/session/6</loc>
</url>
<url>
<loc>https://nsec.io/session/7</loc>
</url>
<url>
<loc>https://nsec.io/session/101</loc>
</url>
<url>
<loc>https://nsec.io/session/102</loc>
</url>
<url>
<loc>https://nsec.io/session/103</loc>
</url>
<url>
<loc>https://nsec.io/session/104</loc>
</url>
<url>
<loc>https://nsec.io/session/105</loc>
</url>
<url>
<loc>https://nsec.io/session/106</loc>
</url>
<url>
<loc>https://nsec.io/session/107</loc>
</url>
<url>
<loc>https://nsec.io/session/108</loc>
</url>
<url>
<loc>https://nsec.io/session/109</loc>
</url>
<url>
<loc>https://nsec.io/session/110</loc>
</url>
<url>
<loc>https://nsec.io/session/111</loc>
</url>
<url>
<loc>https://nsec.io/session/112</loc>
</url>
<url>
<loc>https://nsec.io/session/113</loc>
</url>
<url>
<loc>https://nsec.io/session/114</loc>
</url>
<url>
<loc>https://nsec.io/session/115</loc>
</url>
<url>
<loc>https://nsec.io/session/116</loc>
</url>
<url>
<loc>https://nsec.io/session/201</loc>
</url>
<url>
<loc>https://nsec.io/session/202</loc>
</url>
<url>
<loc>https://nsec.io/session/203</loc>
</url>
<url>
<loc>https://nsec.io/session/204</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-red-team-training/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-beyond-whiteboard-hacking-master-ai-enhanced-threat-modeling/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-offensive-active-directory-operations-certification-oadoc/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-reverse-bypass-exploit-mobile-hacking-workshop/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-attacking--securing-cicd-pipeline-certification-ascpc/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-advanced-detection-engineering-in-the-enterprise/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-practical-ai-security-go-beyond-theory-build-break-and-defend/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-hacking-the-invisible-sdr-for-red-team-operations/</loc>
</url>
<url>
<loc>https://nsec.io/training/2026-adversary-perspectives-azure/</loc>
</url>
<url>
<loc>https://nsec.io/googlec64b969ca30a2e6a.html</loc>
<lastmod>2026-04-03T13:43:26+00:00</lastmod>
</url>
<url>
<loc>https://nsec.io/googled4f6a0fc06ab8c3b.html</loc>
<lastmod>2026-04-03T13:43:26+00:00</lastmod>
</url>
<url>
<loc>https://nsec.io/resistance.htm</loc>
<lastmod>2026-04-03T13:43:26+00:00</lastmod>
</url>
<url>
<loc>https://nsec.io/training-infos/</loc>
<lastmod>2026-04-03T13:43:26+00:00</lastmod>
</url>
<url>
<loc>https://nsec.io/training-infos/mainevent.html</loc>
<lastmod>2026-04-03T13:43:26+00:00</lastmod>
</url>
</urlset>
