FileMood

Download CODE BLUE

CODE BLUE

Name

CODE BLUE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

16.4 GB

Total Files

359

Hash

0C9D876C95582317D23CBE6B5896BD010787ED87

/

Code Blue logo.jpg

5.6 KB

CODE BLUE thank you.txt

1.1 KB

/CODE BLUE 2013/

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4

98.3 MB

Fight Against Citadel in Japan by You Nakatsuru.mp4

98.3 MB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4

45.7 MB

Intel Management Engine Secrets by Igor Skochinsky.mp4

99.3 MB

Keynote - CODE BLUE in the ICU by Jeff Moss.mp4

91.0 MB

Keynote - CODE BLUE in the ICU by Jeff Moss.srt

64.8 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4

128.7 MB

libinjection - from SQLi to XSS by Nick Galbreath.mp4

37.9 MB

libinjection - from SQLi to XSS by Nick Galbreath.srt

22.6 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4

110.1 MB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4

107.2 MB

Preventing hard disk firmware manipulation attack and disaster recovery.mp4

77.4 MB

SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4

64.6 MB

The Current State of Automotive Security by Chris Valasek.mp4

103.2 MB

various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4

84.3 MB

/CODE BLUE 2014/

Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4

120.4 MB

Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.srt

79.2 KB

David Jacoby - How I Hacked My Home.mp4

80.7 MB

David Jacoby - How I Hacked My Home.srt

62.0 KB

David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4

75.4 MB

David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.srt

64.2 KB

Dongcheol Hong - Drone attack by malware and network hacking.mp4

100.3 MB

Dongcheol Hong - Drone attack by malware and network hacking.srt

45.9 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4

45.0 MB

Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4

89.2 MB

Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4

112.1 MB

Keren Elazari - Keynote - The 5 biggest problems of cyber security.srt

77.8 KB

Kuniyasu Suzaki - DeviceDisEnabler.mp4

90.9 MB

Takahiro Matsuki & Dennis Kengo Oka.mp4

104.2 MB

The active use and exploitation of Microsoft s Application Compatibility Framework.mp4

93.3 MB

The active use and exploitation of Microsoft s Application Compatibility Framework.srt

66.3 KB

/CODE BLUE 2015/

(In)Security of Medical Devices by Florian Grunow.mp4

107.2 MB

(In)Security of Medical Devices by Florian Grunow.srt

76.1 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4

32.5 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4

57.7 MB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4

28.7 MB

A new exploitation method to bypass stack canaries by Yuki Koike.mp4

46.4 MB

Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.srt

42.1 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4

71.6 MB

An Abusive Relationship with AngularJS by Mario Heiderich.mp4

140.3 MB

An Abusive Relationship with AngularJS by Mario Heiderich.srt

55.8 KB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4

111.5 MB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.srt

39.9 KB

Defeating Firefox by Muneaki Nishimura.mp4

78.0 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4

103.0 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.srt

51.6 KB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4

120.4 MB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.srt

36.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca.mp4

127.5 MB

Is there an EFI monster inside your apple by Pedro Vilccca.srt

87.9 KB

Keynote The Singularity is Near by Takuya Matsuda.mp4

89.1 MB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4

102.7 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.srt

78.0 KB

New immune system of information security from CHINA by Xiaodun Fang.mp4

97.0 MB

Ninja Correlation of APT Binaries by Bhavna Soman.mp4

65.9 MB

Ninja Correlation of APT Binaries by Bhavna Soman.srt

40.3 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4

48.6 MB

Practical network defense at scale by Travis Carelock.mp4

140.4 MB

Practical network defense at scale by Travis Carelock.srt

74.4 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4

114.6 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4

152.3 MB

Wireless security testing with attack by Keiichi Horiai.mp4

119.5 MB

/CODE BLUE 2016/

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4

76.7 MB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4

68.4 MB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4

119.2 MB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4

65.7 MB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4

72.9 MB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4

70.9 MB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4

68.3 MB

Be a Binary Rockstar by Sophia DAntoine.mp4

44.2 MB

COFI break by Ron Shina & Shlomi Oberman.mp4

66.3 MB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4

52.2 MB

DVB-T Hacking by Amihai Neiderman.mp4

42.6 MB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4

80.1 MB

Esoteric Web Application Vulnerabilities by Andres Riancho.mp4

103.1 MB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4

104.8 MB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4

87.7 MB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4

54.0 MB

Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4

106.5 MB

Keynote - How much security is too much by Karsten Nohl.mp4

79.5 MB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4

94.9 MB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.mp4

98.3 MB

The ARMs race for kernel protection by Jonathan​ ​Levin.mp4

95.5 MB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4

96.4 MB

Who put the backdoor in my modem by Ewerson Guimaraes.mp4

81.4 MB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4

101.3 MB

/CODE BLUE 2017/

(In)Security of Japanese IT Asset Management Software.mp4

113.6 MB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4

71.5 MB

Androsia - A step ahead in securing in-memory Android application data.mp4

86.9 MB

Detection index learning based on cyber threat intelligence and its application.mp4

74.9 MB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4

87.1 MB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4

2.8 MB

George Hotz - Keynote - Make your car self-driving using open-source software.mp4

122.2 MB

Industroyer - biggest threat to industrial control systems since Stuxnet.mp4

59.6 MB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4

89.1 MB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4

130.3 MB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4

134.0 MB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4

89.4 MB

Possibility of arbitrary code execution by Step-Oriented Programming.mp4

92.8 MB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4

143.4 MB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4

103.3 MB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4

123.4 MB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4

77.9 MB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4

79.3 MB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4

95.9 MB

/CODE BLUE 2018/

A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt

77.5 KB

A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4

129.1 MB

Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt

60.2 KB

Are You Trading Stocks Securely by Alejandro Hernandez.mp4

114.1 MB

BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt

56.0 KB

BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4

50.9 MB

CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt

59.3 KB

CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4

80.8 MB

Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt

93.0 KB

Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4

93.3 MB

Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt

60.0 KB

Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4

85.7 MB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4

113.3 MB

Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt

40.1 KB

Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4

85.9 MB

From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt

48.9 KB

From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4

85.0 MB

Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt

47.7 KB

Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4

87.7 MB

GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt

68.3 KB

GLitch hammering your phone through WebGL by Pietro Frigo.mp4

96.5 MB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4

120.4 MB

INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt

47.8 KB

INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4

75.6 MB

Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt

77.3 KB

Keynote Cyber Arms Race by Mikko Hyppönen.mp4

144.6 MB

Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt

55.9 KB

Keynote Power, Patience, and Persistence by Kenneth Geers.mp4

106.3 MB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4

112.1 MB

Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt

51.2 KB

Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4

96.8 MB

Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt

53.7 KB

Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4

122.0 MB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4

109.9 MB

Privacy by Design Methodology by Vanessa Henri.eng.srt

58.2 KB

Privacy by Design Methodology by Vanessa Henri.mp4

84.9 MB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4

39.4 MB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4

90.8 MB

Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt

64.2 KB

Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4

94.5 MB

Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt

51.9 KB

Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4

72.4 MB

Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt

46.9 KB

Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4

93.9 MB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4

83.5 MB

The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt

79.9 KB

The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4

143.3 MB

The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4

111.8 MB

uclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt

61.0 KB

uclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4

101.6 MB

Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt

50.8 KB

Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4

93.2 MB

WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt

69.7 KB

WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4

105.3 MB

Who's guarding the gateway - by Nicole Beckwith.eng.srt

39.1 KB

Who's guarding the gateway - by Nicole Beckwith.mp4

70.4 MB

Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt

39.1 KB

Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4

77.8 MB

/CODE BLUE 2019/

[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt

24.4 KB

[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4

52.4 MB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4

49.0 MB

Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt

59.0 KB

Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4

105.2 MB

Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt

44.5 KB

Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4

66.6 MB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4

38.6 MB

Coinbase and the Firefox 0-day by Philip Martin.eng.srt

55.4 KB

Coinbase and the Firefox 0-day by Philip Martin.mp4

71.6 MB

Hardware Wallet Security by Sergei Volokitin.eng.srt

62.5 KB

Hardware Wallet Security by Sergei Volokitin.mp4

78.6 MB

Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt

80.5 KB

Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4

110.6 MB

KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt

54.6 KB

KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4

80.9 MB

KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt

85.1 KB

KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4

107.7 MB

Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt

35.8 KB

Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4

78.1 MB

Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt

43.9 KB

Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4

55.5 MB

MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt

17.4 KB

MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4

34.6 MB

Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt

49.9 KB

Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4

84.7 MB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4

67.6 MB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4

98.9 MB

Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt

59.4 KB

Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4

89.4 MB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4

91.2 MB

Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt

67.7 KB

Wifi sniffing with the WifiKraken by Mike Spicer.mp4

119.9 MB

/CODE BLUE 2020/

Keynote1 - Ms. Audrey Guinchard.eng.srt

40.5 KB

Keynote1 - Ms. Audrey Guinchard.mp4

38.3 MB

Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt

47.5 KB

Keynote2 - Practical and Intelligent Incident Response Planning.mp4

54.2 MB

Alliance power for Cyber Security.eng.srt

23.3 KB

Alliance power for Cyber Security.mp4

27.8 MB

Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt

15.1 KB

Apk-medit memory search and patch tool for APK without root & android NDK.mp4

17.7 MB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4

33.1 MB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4

23.9 MB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4

24.0 MB

Defending Computer CriminalsPresented - Andrea Monti.eng.srt

38.3 KB

Defending Computer CriminalsPresented - Andrea Monti.mp4

28.2 MB

Dissecting China’s Information Operations with Threat Intelligence.eng.srt

36.2 KB

Dissecting China’s Information Operations with Threat Intelligence.mp4

46.2 MB

Don't Be Silly - It's Only a Lightbulb.eng.srt

49.2 KB

Don't Be Silly - It's Only a Lightbulb.mp4

85.1 MB

Drones' Cryptanalysis - Detecting Spying Drones.eng.srt

48.6 KB

Drones' Cryptanalysis - Detecting Spying Drones.mp4

43.8 MB

Ethereum 2.0のセキュリティ.mp4

28.6 MB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4

36.7 MB

Hunting kernel exploits with filesystem fuzzer.eng.srt

31.6 KB

Hunting kernel exploits with filesystem fuzzer.mp4

35.4 MB

Illicit QQ Communities What's Being Shared.eng.srt

39.8 KB

Illicit QQ Communities What's Being Shared.mp4

28.1 MB

It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt

43.4 KB

It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4

55.8 MB

Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt

52.9 KB

Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4

51.8 MB

Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt

47.7 KB

Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4

42.2 MB

Law Enforcement Access to Transborder.eng.srt

49.1 KB

Law Enforcement Access to Transborder.mp4

53.1 MB

Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt

41.4 KB

Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4

43.5 MB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4

40.8 MB

Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4

57.2 MB

Operation I am Tom How APT actors move laterally in corporate networks.eng.srt

43.1 KB

Operation I am Tom How APT actors move laterally in corporate networks.mp4

51.6 MB

Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt

38.6 KB

Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4

42.7 MB

Reflex you give me a parser, I give you a token generator.eng.srt

44.1 KB

Reflex you give me a parser, I give you a token generator.mp4

35.8 MB

Reverse Engineering archeology.mp4

67.6 MB

SOARによるセキュリティ監視業務の効率化とSecOps.mp4

33.2 MB

Speccial Session - Digital Social Innovation.eng.srt

44.5 KB

Speccial Session - Digital Social Innovation.mp4

82.8 MB

Vulnerabilities of Machine Learning Infrastructure.mp4

45.0 MB

Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt

46.5 KB

Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4

51.9 MB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4

38.4 MB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4

36.6 MB

説明可能な悪性ドメイン診断.mp4

49.4 MB

/CODE BLUE 2021/

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4

48.2 MB

Day1 Closing.mp4

4.5 MB

Day1 Opening.mp4

6.7 MB

Day2 Event Closing.mp4

27.2 MB

Day2 Online Closing.mp4

9.6 MB

Day2 Opening.mp4

14.1 MB

Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt

41.5 KB

Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4

35.8 MB

Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt

51.8 KB

Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4

40.8 MB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4

31.2 MB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4

34.8 MB

NAS as Not As Secure.eng.srt

51.6 KB

NAS as Not As Secure.mp4

28.2 MB

Non-Private Chat Police investigation legislation in the flat world.eng.srt

49.4 KB

Non-Private Chat Police investigation legislation in the flat world.mp4

40.6 MB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4

30.4 MB

ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt

58.5 KB

ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4

42.4 MB

The Lazarus Group's Attack Operations Targeting Japan.mp4

50.2 MB

The security thing - Knowledge, skills, and two more things.mp4

95.8 MB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4

48.4 MB

/CODE BLUE 2022/

[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded ..mp4

19.7 MB

[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt

29.3 KB

[U25]Under the hood of Wslink’s multilayered virtual machine.eng.srt

43.9 KB

[U25]Under the hood of Wslink’s multilayered virtual machine.mp4

33.4 MB

Closing adddress.eng.srt

34.4 KB

Closing adddress.mp4

48.3 MB

CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt

41.8 KB

CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4

35.9 MB

Fight Against Malware Development Life Cycle.eng.srt

56.6 KB

Fight Against Malware Development Life Cycle.mp4

44.7 MB

From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt

54.1 KB

From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4

46.4 MB

Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt

40.9 KB

Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4

40.2 MB

Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt

23.9 KB

Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4

21.8 MB

KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt

81.6 KB

KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4

52.5 MB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4

42.1 MB

Opening.eng.srt

14.1 KB

Opening.mp4

22.6 MB

Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt

40.3 KB

Red light in the factory - From 0 to 100 OT adversary emulation.mp4

33.5 MB

Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt

74.5 KB

Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4

44.1 MB

Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt

77.0 KB

Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4

42.9 MB

SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt

50.5 KB

SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4

36.3 MB

Tales of 5G hacking.eng.srt

67.9 KB

Tales of 5G hacking.mp4

55.6 MB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss..mp4

91.3 MB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt

85.5 KB

Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt

48.0 KB

Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4

42.2 MB

What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt

66.0 KB

What I learned from the direct confrontation with the adversaries who hid C&C server.mp4

44.5 MB

Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt

61.4 KB

Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4

36.3 MB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4

34.0 MB

「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt

86.2 KB

「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4

91.4 MB

/CODE BLUE 2023/

A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt

55.2 KB

A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4

52.2 MB

BSides Tokyo 2024.eng.srt

42.2 KB

BSides Tokyo 2024.mp4

55.3 MB

Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt

69.3 KB

Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4

47.7 MB

Closing Keynote Cyber and Security in Times of War.eng.srt

57.0 KB

Closing Keynote Cyber and Security in Times of War.mp4

37.5 MB

Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt

52.3 KB

Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4

29.9 MB

Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt

61.8 KB

Digital sovereignty - shaping regulatory responses to technological dominance.mp4

46.1 MB

Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt

42.7 KB

Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4

29.8 MB

filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt

50.0 KB

filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4

38.9 MB

Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt

61.7 KB

Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4

44.7 MB

International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt

62.7 KB

International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4

73.0 MB

KeynoteIf It's Smart, It's Vulnerable.eng.srt

66.5 KB

KeynoteIf It's Smart, It's Vulnerable.mp4

63.0 MB

Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt

56.5 KB

Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4

45.4 MB

Open Sesame The full story behind opening a smart lock.eng.srt

47.9 KB

Open Sesame The full story behind opening a smart lock.mp4

43.2 MB

OSBT OpenID Connect Scenario-Based Tester.eng.srt

55.0 KB

OSBT OpenID Connect Scenario-Based Tester.mp4

50.6 MB

Pennywise - Invisible privacy risk in the new AI era.eng.srt

53.9 KB

Pennywise - Invisible privacy risk in the new AI era.mp4

44.8 MB

Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt

68.1 KB

Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4

44.5 MB

Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt

34.1 KB

Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4

21.6 MB

stelftools cross-architecture static library detector for IoT malware.eng.srt

64.6 KB

stelftools cross-architecture static library detector for IoT malware.mp4

61.7 MB

The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt

55.8 KB

The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4

31.7 MB

The Renaissance of Cyber Physical Offensive Capabilities.eng.srt

75.0 KB

The Renaissance of Cyber Physical Offensive Capabilities.mp4

41.4 MB

Unlocking the Drive Exploiting Tesla Model 3.eng.srt

47.9 KB

Unlocking the Drive Exploiting Tesla Model 3.mp4

47.4 MB

Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt

60.5 KB

Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4

61.2 MB

 

Total files 359


Copyright © 2025 FileMood.com