/
|
Blue Hat thank you.txt
|
0.9 KB
|
BlueHat logo.png
|
8.7 KB
|
/BlueHat Israel 2017/
|
BlueHat IL 2017 Benjamin Delpy 'gentilkiwi'.mp4
|
125.0 MB
|
BlueHat IL 2017 Daniel Bohannon, Mandiant.mp4
|
124.4 MB
|
BlueHat IL 2017 John Lambert, Microsoft.mp4
|
80.4 MB
|
BlueHat IL 2017 Marina Simakov & Tal Be'ery, Microsoft.mp4
|
109.4 MB
|
BlueHat IL 2017 Marion Marschalek.mp4
|
98.9 MB
|
BlueHat IL 2017 Mark Russinovich, Microsoft.mp4
|
128.8 MB
|
BlueHat IL 2017 Matt Swann, Microsoft.mp4
|
53.8 MB
|
BlueHat IL 2017 Omer Zohar, Topspin Security.mp4
|
86.2 MB
|
BlueHat IL 2017 Prof. Yehuda Lindell, Dyadic Security.mp4
|
113.3 MB
|
BlueHat IL 2017.mp4
|
7.5 MB
|
/BlueHat Israel 2018/
|
BlueHat IL 2018 - Daniel Gruss, Moritz Lipp & Michael Schwarz - The Case of Spectre and Meltdown.mp4
|
129.3 MB
|
BlueHat IL 2018 - David Weston - Windows Hardening with Hardware.mp4
|
180.7 MB
|
BlueHat IL 2018 - Gunter Ollmann - Extracting Secrets from Silicon A New Generation of Bug Hunting.mp4
|
105.8 MB
|
BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls.mp4
|
87.2 MB
|
BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing.mp4
|
62.3 MB
|
BlueHat IL 2018 - Lee Holmes - How to Design a New Cloud Platform with a Strong Security Posture.mp4
|
118.6 MB
|
BlueHat IL 2018 - Marina Simakov & Itai Grady - Computers Gone Rogue.mp4
|
75.5 MB
|
BlueHat IL 2018 - Marion Marschalek - The Wolf in SGX Clothing.mp4
|
120.1 MB
|
BlueHat IL 2018 - Mathy Vanhoef - KRACKing WPA2 in Practice Using Key Reinstallation Attacks.mp4
|
103.5 MB
|
BlueHat IL 2018 - Matt Graeber - Hi, My Name is CN=Microsoft Windows, O=Microsoft Corporation….mp4
|
82.4 MB
|
BlueHat IL 2018 - Matt Suiche - Ethereum VM, Bytecode & Bugged Smart-Contracts.mp4
|
122.4 MB
|
BlueHat IL 2018 - Matt Tait - Keynote Fake News and Info-Ops Modern Information Warfare….mp4
|
172.1 MB
|
BlueHat IL 2018 - Saar Amar - Linux Vulnerabilities Windows Exploits Escalating Privileges with WSL.mp4
|
116.9 MB
|
BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind.mp4
|
128.2 MB
|
BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or How I Fixed Long-Dead Galaxy S3 Phones.mp4
|
80.8 MB
|
BlueHat Nights Event.mp4
|
6.2 MB
|
/BlueHat Israel 2019/
|
BlueHat IL 2019 - Andrew bunnie Huang - Supply Chain Security If I were a Nation State...”.en.transcribed.srt
|
156.3 KB
|
BlueHat IL 2019 - Andrew bunnie Huang - Supply Chain Security If I were a Nation State...”.mp4
|
59.7 MB
|
BlueHat IL 2019 - Benjamin Delpy (@gentilkiwi) - You (dis)liked mimikatz Wait for kekeo.mp4
|
82.4 MB
|
BlueHat IL 2019 - Bhavna Soman.en.transcribed.srt
|
60.4 KB
|
BlueHat IL 2019 - Bhavna Soman.mp4
|
21.7 MB
|
BlueHat IL 2019 - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time Compiler.en.transcribed.srt
|
140.9 KB
|
BlueHat IL 2019 - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time Compiler.mp4
|
48.6 MB
|
BlueHat IL 2019 - Day 1 Recap.mp4
|
2.3 MB
|
BlueHat IL 2019 - Day 2 Recap.mp4
|
2.7 MB
|
BlueHat IL 2019 - Ido Li On & Uri Farkas - The AMDFlaws Story Technical Deep Dive.en.transcribed.srt
|
95.1 KB
|
BlueHat IL 2019 - Ido Li On & Uri Farkas - The AMDFlaws Story Technical Deep Dive.mp4
|
43.1 MB
|
BlueHat IL 2019 - Luca Todesco (@qwertyoruiop) - Life as an iOS Attacker.en.transcribed.srt
|
103.7 KB
|
BlueHat IL 2019 - Luca Todesco (@qwertyoruiop) - Life as an iOS Attacker.mp4
|
45.6 MB
|
BlueHat IL 2019 - Lucas Leong - Make Static Instrumentation Great Again.en.transcribed.srt
|
63.7 KB
|
BlueHat IL 2019 - Lucas Leong - Make Static Instrumentation Great Again.mp4
|
36.5 MB
|
BlueHat IL 2019 - Matt Miller.en.transcribed.srt
|
164.6 KB
|
BlueHat IL 2019 - Matt Miller.mp4
|
51.1 MB
|
BlueHat IL 2019 - Niek Timmers, Albert Spruyt & Cristofaro Mune.en.transcribed.srt
|
122.6 KB
|
BlueHat IL 2019 - Niek Timmers, Albert Spruyt & Cristofaro Mune.mp4
|
52.9 MB
|
BlueHat IL 2019 - Or Pinchasof - Bridging Emulation and the Real World with the Nintendo Game Boy.en.transcribed.srt
|
90.3 KB
|
BlueHat IL 2019 - Or Pinchasof - Bridging Emulation and the Real World with the Nintendo Game Boy.mp4
|
56.4 MB
|
BlueHat IL 2019 - Ulf Frisk - Practical Uses for Hardware-assisted Memory Visualization.en.transcribed.srt
|
108.2 KB
|
BlueHat IL 2019 - Ulf Frisk - Practical Uses for Hardware-assisted Memory Visualization.mp4
|
50.9 MB
|
BlueHat IL 2019 - x0rz - No Code No Crime UPnP as an Off-the-Shelf Attacker's Toolkit.en.transcribed.srt
|
51.3 KB
|
BlueHat IL 2019 - x0rz - No Code No Crime UPnP as an Off-the-Shelf Attacker's Toolkit.mp4
|
23.8 MB
|
/BlueHat Isreal 2020/
|
BlueHat IL 2020 - Amy Burnett - Forget the Sandbox Escape Abusing Browsers from Code Execution.en(transcribed).srt
|
67.9 KB
|
BlueHat IL 2020 - Amy Burnett - Forget the Sandbox Escape Abusing Browsers from Code Execution.mp4
|
76.6 MB
|
BlueHat IL 2020 - Andy Nguyen - Trinity PSP Emulator Escape.en(transcribed).srt
|
48.8 KB
|
BlueHat IL 2020 - Andy Nguyen - Trinity PSP Emulator Escape.mp4
|
61.9 MB
|
BlueHat IL 2020 - Ben Seri & Yuval Sarel - CDPwn Taking Over Millions of Enterprise-Things....en(transcribed).srt
|
65.2 KB
|
BlueHat IL 2020 - Ben Seri & Yuval Sarel - CDPwn Taking Over Millions of Enterprise-Things....mp4
|
65.1 MB
|
BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild.en(transcribed).srt
|
44.5 KB
|
BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild.mp4
|
65.6 MB
|
BlueHat IL 2020 - David Weston - Keeping Windows Secure.en(transcribed).srt
|
95.1 KB
|
BlueHat IL 2020 - David Weston - Keeping Windows Secure.mp4
|
103.7 MB
|
BlueHat IL 2020 - Dmitry Vyukov - syzkaller Adventures in Continuous Coverage-guided Kernel Fuzzing.en(transcribed).srt
|
78.1 KB
|
BlueHat IL 2020 - Dmitry Vyukov - syzkaller Adventures in Continuous Coverage-guided Kernel Fuzzing.mp4
|
81.7 MB
|
BlueHat IL 2020 - Gal De Leon - Exploiting Errors in Windows Error Reporting.en(transcribed).srt
|
76.4 KB
|
BlueHat IL 2020 - Gal De Leon - Exploiting Errors in Windows Error Reporting.mp4
|
65.7 MB
|
BlueHat IL 2020 - Kevin Bock & George Hughey - Geneva An AI Approach to Evading Nation-State....en(transcribed).srt
|
58.7 KB
|
BlueHat IL 2020 - Kevin Bock & George Hughey - Geneva An AI Approach to Evading Nation-State....mp4
|
61.7 MB
|
BlueHat IL 2020 - Luca Todesco - The One Weird Trick SecureROM Hates.en(transcribed).srt
|
62.4 KB
|
BlueHat IL 2020 - Luca Todesco - The One Weird Trick SecureROM Hates.mp4
|
71.6 MB
|
BlueHat IL 2020 - Maddie Stone - Where's Waldo...'s Brothers and Sisters Variant Analysis on....en(transcribed).srt
|
72.1 KB
|
BlueHat IL 2020 - Maddie Stone - Where's Waldo...'s Brothers and Sisters Variant Analysis on....mp4
|
84.1 MB
|
BlueHat IL 2020 - Nate Warfield - We Can't Stop Here! This is Bot Country!.en(transcribed).srt
|
70.3 KB
|
BlueHat IL 2020 - Nate Warfield - We Can't Stop Here! This is Bot Country!.mp4
|
63.4 MB
|
BlueHat IL 2020 - Netanel Ben-Simon & Yoav Alon - Bugs on the Windshield Fuzzing the Windows Kernel.en(transcribed).srt
|
64.9 KB
|
BlueHat IL 2020 - Netanel Ben-Simon & Yoav Alon - Bugs on the Windshield Fuzzing the Windows Kernel.mp4
|
68.3 MB
|
BlueHat IL 2020 - Recap.mp4
|
4.5 MB
|
BlueHat IL 2020 - Robert Lipovsky - Tactics, Techniques, and Procedures of the World's Most....en(transcribed).srt
|
54.5 KB
|
BlueHat IL 2020 - Robert Lipovsky - Tactics, Techniques, and Procedures of the World's Most....mp4
|
66.0 MB
|
BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to.NET.en(transcribed).srt
|
70.1 KB
|
BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to.NET.mp4
|
65.2 MB
|
BlueHat IL 2020 - Zuzana Hromcova - ATTOR Spy Platform with Curious GSM Fingerprinting.en(transcribed).srt
|
41.2 KB
|
BlueHat IL 2020 - Zuzana Hromcova - ATTOR Spy Platform with Curious GSM Fingerprinting.mp4
|
51.4 MB
|
/BlueHat Seattle 2019/
|
BlueHat Seattle 2019 Are We There Yet Why Does Application Security Take So Long.eng.srt
|
50.9 KB
|
BlueHat Seattle 2019 Are We There Yet Why Does Application Security Take So Long.mp4
|
57.8 MB
|
BlueHat Seattle 2019 Autopsies of Recent DFIR Investigations.eng.srt
|
56.4 KB
|
BlueHat Seattle 2019 Autopsies of Recent DFIR Investigations.mp4
|
54.4 MB
|
BlueHat Seattle 2019 Building Secure Machine Learning Pipelines Security Patterns and Challenges.eng.srt
|
46.8 KB
|
BlueHat Seattle 2019 Building Secure Machine Learning Pipelines Security Patterns and Challenges.mp4
|
71.8 MB
|
BlueHat Seattle 2019 Closing Remarks, Kymberlee Price.eng.srt
|
6.7 KB
|
BlueHat Seattle 2019 Closing Remarks, Kymberlee Price.mp4
|
18.0 MB
|
BlueHat Seattle 2019 Day 1 Opening Remarks, Eric Doerr & Bharat Shah.eng.srt
|
31.1 KB
|
BlueHat Seattle 2019 Day 1 Opening Remarks, Eric Doerr & Bharat Shah.mp4
|
50.3 MB
|
BlueHat Seattle 2019 Day 2 Opening Remarks, David Weston.mp4
|
30.6 MB
|
BlueHat Seattle 2019 Dont forget to SUBSCRIBE..eng.srt
|
74.7 KB
|
BlueHat Seattle 2019 Dont forget to SUBSCRIBE..mp4
|
79.5 MB
|
BlueHat Seattle 2019 Guarding Against Physical Attacks The Xbox One Story.eng.srt
|
81.7 KB
|
BlueHat Seattle 2019 Guarding Against Physical Attacks The Xbox One Story.mp4
|
91.5 MB
|
BlueHat Seattle 2019 Im in your cloud A year of hacking Azure AD.mp4
|
88.7 MB
|
BlueHat Seattle 2019 Keynote, Alex Stamos.eng.srt
|
106.4 KB
|
BlueHat Seattle 2019 Keynote, Alex Stamos.mp4
|
157.0 MB
|
BlueHat Seattle 2019 Kubernetes Practical Attack and Defense.eng.srt
|
88.5 KB
|
BlueHat Seattle 2019 Kubernetes Practical Attack and Defense.mp4
|
110.3 MB
|
BlueHat Seattle 2019 Modern Binary Analysis with ILs.eng.srt
|
84.8 KB
|
BlueHat Seattle 2019 Modern Binary Analysis with ILs.mp4
|
105.2 MB
|
BlueHat Seattle 2019 Open Source Security, vulnerabilities never come alone.eng.srt
|
77.2 KB
|
BlueHat Seattle 2019 Open Source Security, vulnerabilities never come alone.mp4
|
112.4 MB
|
BlueHat Seattle 2019 The cake is a lie Secret world of malware cheats in video games.eng.srt
|
33.1 KB
|
BlueHat Seattle 2019 The cake is a lie Secret world of malware cheats in video games.mp4
|
47.8 MB
|
BlueHat Seattle 2019 The good, the bad & the ugly of ML based approaches for ransomware detection.eng.srt
|
61.6 KB
|
BlueHat Seattle 2019 The good, the bad & the ugly of ML based approaches for ransomware detection.mp4
|
73.1 MB
|
GRAPH FOR SECURITY WORKSHOP Finding your blast radius your peers, Sridhar Periyasamy.eng.srt
|
35.1 KB
|
GRAPH FOR SECURITY WORKSHOP Finding your blast radius your peers, Sridhar Periyasamy.mp4
|
31.4 MB
|
GRAPH FOR SECURITY WORKSHOP Graphical Analysis for Security, Gabe Bassett.eng.srt
|
78.9 KB
|
GRAPH FOR SECURITY WORKSHOP Graphical Analysis for Security, Gabe Bassett.mp4
|
84.4 MB
|
GRAPH FOR SECURITY WORKSHOP Graphs in Security, Ian Hellen.mp4
|
63.5 MB
|
GRAPH FOR SECURITY WORKSHOP Grapl - a Graph platform for detection response, Colin OBrien.eng.srt
|
65.8 KB
|
GRAPH FOR SECURITY WORKSHOP Grapl - a Graph platform for detection response, Colin OBrien.mp4
|
42.4 MB
|
GRAPH FOR SECURITY WORKSHOP Intrusion Detection with Graphs, Matt Swann.eng.srt
|
41.1 KB
|
GRAPH FOR SECURITY WORKSHOP Intrusion Detection with Graphs, Matt Swann.mp4
|
46.1 MB
|
GRAPH FOR SECURITY WORKSHOP Opening Remarks & Keynote, Ram Shankar Siva Kumar & Sarah Fender.eng.srt
|
48.9 KB
|
GRAPH FOR SECURITY WORKSHOP Opening Remarks & Keynote, Ram Shankar Siva Kumar & Sarah Fender.mp4
|
76.6 MB
|
GRAPH FOR SECURITY WORKSHOP Opinions were shared Mistakes were made, Jon Hawes.eng.srt
|
88.2 KB
|
GRAPH FOR SECURITY WORKSHOP Opinions were shared Mistakes were made, Jon Hawes.mp4
|
67.1 MB
|
GRAPH FOR SECURITY WORKSHOP Scaling Graphical Analysis, Leo Meyerovich.eng.srt
|
96.0 KB
|
GRAPH FOR SECURITY WORKSHOP Scaling Graphical Analysis, Leo Meyerovich.mp4
|
80.1 MB
|
GRAPH FOR SECURITY WORKSHOP Statistics Graphs Finding Bad Guys, Joshua Neil.eng.srt
|
74.4 KB
|
GRAPH FOR SECURITY WORKSHOP Statistics Graphs Finding Bad Guys, Joshua Neil.mp4
|
128.5 MB
|
/BlueHat v10/
|
BlueHat v10 Behind the Curtain of Second Tuesdays Challenges in Software Security Response.mp4
|
29.8 MB
|
BlueHat v10 Browser Hacks, Design Flaws, & Opt-In Security.mp4
|
42.2 MB
|
BlueHat v10 Cyber [Crime War] -- Connecting the Dots.mp4
|
54.8 MB
|
BlueHat v10 Enhanced Mitigation Experience Toolkit 2.0.mp4
|
52.1 MB
|
BlueHat v10 Everybody Be Cool This Is a ROPpery.mp4
|
62.1 MB
|
BlueHat v10 Nine Trends Affecting the Future of Exploitation.mp4
|
26.3 MB
|
BlueHat v10.m3u
|
0.4 KB
|
/BlueHat v17/
|
BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).en.transcribed.srt
|
221.3 KB
|
BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).mp4
|
148.9 MB
|
BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt
|
112.3 KB
|
BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.mp4
|
75.4 MB
|
BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.en.transcribed.srt
|
109.3 KB
|
BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.mp4
|
163.7 MB
|
BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.en.transcribed.srt
|
150.5 KB
|
BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.mp4
|
107.1 MB
|
BlueHat v17 Dangerous Contents - Securing .Net Deserialization.en.transcribed.srt
|
76.2 KB
|
BlueHat v17 Dangerous Contents - Securing .Net Deserialization.mp4
|
29.9 MB
|
BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.en.transcribed.srt
|
82.8 KB
|
BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.mp4
|
32.5 MB
|
BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.en.transcribed.srt
|
188.3 KB
|
BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.mp4
|
199.4 MB
|
BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.en.transcribed.srt
|
157.3 KB
|
BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.mp4
|
154.6 MB
|
BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.en.transcribed.srt
|
141.6 KB
|
BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.mp4
|
95.0 MB
|
BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.en.transcribed.srt
|
165.4 KB
|
BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.mp4
|
76.1 MB
|
BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.en.transcribed.srt
|
116.0 KB
|
BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.mp4
|
139.2 MB
|
BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.en.transcribed.srt
|
68.5 KB
|
BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.mp4
|
42.1 MB
|
BlueHat v17 Securing Windows Defender Application Guard.en.transcribed.srt
|
152.4 KB
|
BlueHat v17 Securing Windows Defender Application Guard.mp4
|
91.9 MB
|
Microsoft BlueHat v17 Security Conference.mp4
|
6.1 MB
|
/BlueHat v18/
|
BlueHat v18 If we win, we lose.en.transcribed.srt
|
196.7 KB
|
BlueHat v18 If we win, we lose.mp4
|
165.4 MB
|
BlueHat v18 A mitigation for kernel toctou vulnerabilities.en.transcribed.srt
|
62.2 KB
|
BlueHat v18 A mitigation for kernel toctou vulnerabilities.mp4
|
36.1 MB
|
BlueHat v18 A turla gift - popping calc.exe by sending an email.mp4
|
56.0 MB
|
BlueHat v18 An Ice Cold boot to break bitlocker.en.transcribed.srt
|
125.6 KB
|
BlueHat v18 An Ice Cold boot to break bitlocker.mp4
|
95.7 MB
|
BlueHat v18 Cybersecurity for the defense of democracy.en.transcribed.srt
|
165.8 KB
|
BlueHat v18 Cybersecurity for the defense of democracy.mp4
|
128.1 MB
|
BlueHat v18 DEP for the app layer - Time for app sec to grow up.en.transcribed.srt
|
107.5 KB
|
BlueHat v18 DEP for the app layer - Time for app sec to grow up.mp4
|
77.1 MB
|
BlueHat v18 Evolving chromes secuirty indicators.mp4
|
33.4 MB
|
BlueHat v18 False Flag Foibles.en.transcribed.srt
|
139.7 KB
|
BlueHat v18 False Flag Foibles.mp4
|
65.4 MB
|
BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.en.transcribed.srt
|
146.9 KB
|
BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.mp4
|
99.4 MB
|
BlueHat v18 Go Build A Tool.en.transcribed.srt
|
104.6 KB
|
BlueHat v18 Go Build A Tool.mp4
|
81.0 MB
|
BlueHat v18 Hardening hyper-v through offensive security research.en.transcribed.srt
|
179.3 KB
|
BlueHat v18 Hardening hyper-v through offensive security research.mp4
|
76.2 MB
|
BlueHat v18 Killsuit the equation group's swiss army knife for persistence.en.transcribed.srt
|
123.9 KB
|
BlueHat v18 Killsuit the equation group's swiss army knife for persistence.mp4
|
49.6 MB
|
BlueHat v18 MSRC Listens.en.transcribed.srt
|
116.0 KB
|
BlueHat v18 MSRC Listens.mp4
|
136.4 MB
|
BlueHat v18 May I see your credentials, please.en.transcribed.srt
|
69.8 KB
|
BlueHat v18 May I see your credentials, please.mp4
|
101.8 MB
|
BlueHat v18 Memory Resident Implants Code injection is alive and well.en.transcribed.srt
|
165.0 KB
|
BlueHat v18 Memory Resident Implants Code injection is alive and well.mp4
|
113.7 MB
|
BlueHat v18 Mitigation Bypass The Past, Present, and Future.en.transcribed.srt
|
44.6 KB
|
BlueHat v18 Mitigation Bypass The Past, Present, and Future.mp4
|
22.8 MB
|
BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.en.transcribed.srt
|
188.0 KB
|
BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.mp4
|
107.9 MB
|
BlueHat v18 Mstic threat intelligence year in review.en.transcribed.srt
|
100.1 KB
|
BlueHat v18 Mstic threat intelligence year in review.mp4
|
48.0 MB
|
BlueHat v18 Overt Command & Control The Art of Blending In.en.transcribed.srt
|
124.3 KB
|
BlueHat v18 Overt Command & Control The Art of Blending In.mp4
|
56.0 MB
|
BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.en.transcribed.srt
|
167.3 KB
|
BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.mp4
|
136.0 MB
|
BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.en.transcribed.srt
|
117.9 KB
|
BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.mp4
|
94.1 MB
|
BlueHat v18 Scaling Security Scanning.en.transcribed.srt
|
66.7 KB
|
BlueHat v18 Scaling Security Scanning.mp4
|
66.2 MB
|
BlueHat v18 Securely handling data in marginalized communities.en.transcribed.srt
|
124.9 KB
|
BlueHat v18 Securely handling data in marginalized communities.mp4
|
97.6 MB
|
BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.en.transcribed.srt
|
119.8 KB
|
BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.mp4
|
162.2 MB
|
BlueHat v18 Straight outta VMware.mp4
|
49.7 MB
|
BlueHat v18 Tales from the SOC.en.transcribed.srt
|
138.7 KB
|
BlueHat v18 Tales from the SOC.mp4
|
52.2 MB
|
BlueHat v18 The hitchhiker's guide to north korean malware.en.transcribed.srt
|
129.9 KB
|
BlueHat v18 The hitchhiker's guide to north korean malware.mp4
|
123.4 MB
|
BlueHat v18 The law of unintended consequences.en.transcribed.srt
|
133.9 KB
|
BlueHat v18 The law of unintended consequences.mp4
|
149.3 MB
|
BlueHat v18 The matrix has you protecting linux using deception.en.transcribed.srt
|
132.1 KB
|
BlueHat v18 The matrix has you protecting linux using deception.mp4
|
77.6 MB
|
BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.en.transcribed.srt
|
153.5 KB
|
BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.mp4
|
158.6 MB
|
BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.en.transcribed.srt
|
105.1 KB
|
BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.mp4
|
95.8 MB
|
BlueHat v18 Malicious User profiling using deep neural networks.en.transcribed.srt
|
53.8 KB
|
BlueHat v18 Malicious User profiling using deep neural networks.mp4
|
39.3 MB
|
/BlueHat v9/
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 1 6.mp4
|
21.1 MB
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 2 6.mp4
|
21.1 MB
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 3 6.mp4
|
18.3 MB
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 4 6.mp4
|
21.1 MB
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 5 6.mp4
|
18.3 MB
|
BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 6 6.mp4
|
18.1 MB
|
BlueHat v9 Office Security Engineering 1 5.mp4
|
23.0 MB
|
BlueHat v9 Office Security Engineering 2 5.mp4
|
17.6 MB
|
BlueHat v9 Office Security Engineering 3 5.mp4
|
23.1 MB
|
BlueHat v9 Office Security Engineering 4 5.mp4
|
20.3 MB
|
BlueHat v9 Office Security Engineering 5 5.mp4
|
13.9 MB
|
BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 1 5.mp4
|
17.5 MB
|
BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 2 5.mp4
|
20.2 MB
|
BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 3 5.mp4
|
20.2 MB
|
BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 4 5.mp4
|
20.2 MB
|
BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 5 5.mp4
|
15.1 MB
|
BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 1 5.mp4
|
20.3 MB
|
BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 2 5.mp4
|
20.3 MB
|
BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 3 5.mp4
|
20.3 MB
|
BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 4 5.mp4
|
17.5 MB
|
BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 5 5.mp4
|
19.4 MB
|
BlueHat v9.m3u
|
1.7 KB
|
Total files 246
|