FileMood

Download CODE BLUE

CODE BLUE

Name

CODE BLUE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

7.7 GB

Total Files

130

Hash

5BEA02D408B384A32E8820B7E39C8B57D4A9987C

/CODE BLUE 2013/

CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4

93.7 MB

CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4

94.1 MB

CodeBlue01 HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4

43.8 MB

CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4

75.1 MB

CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4

104.1 MB

CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4

121.3 MB

CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4

104.5 MB

CodeBlue01 Preventing hard disk firmware manipulation attack and disaster recovery.mp4

65.2 MB

CodeBlue01 SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4

49.6 MB

CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4

97.8 MB

CodeBlue01 libinjection from SQLi to XSS by Nick Galbreath.mp4

43.9 MB

CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4

103.2 MB

CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4

80.7 MB

/CODE BLUE 2014 (2014 12 18-19)/

CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4

90.8 MB

CODE BLUE 2014 David Jacoby - How I Hacked My Home.mp4

63.1 MB

CODE BLUE 2014 David Seidman - Microsoft Vulnerability Research How to be a Finder as a Vendor.mp4

57.5 MB

CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4

96.3 MB

CODE BLUE 2014 Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4

35.2 MB

CODE BLUE 2014 Ilfak Guilfanov - Keynote The story of IDA Pro.mp4

55.2 MB

CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4

106.3 MB

CODE BLUE 2014 Kuniyasu Suzaki - DeviceDisEnabler.mp4

69.8 MB

CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4

98.7 MB

CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4

72.9 MB

/CODE BLUE 2015 (2015 10 28-29)/

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4

93.2 MB

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.srt

76.1 KB

A new exploitation method to bypass stack canaries by Yuki Koike - CODE BLUE 2015.mp4

39.0 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.mp4

58.3 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.srt

42.1 KB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4

102.5 MB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.srt

55.8 KB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4

80.8 MB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.srt

39.9 KB

Defeating Firefox by Muneaki Nishimura - CODE BLUE 2015.mp4

59.8 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4

79.9 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.srt

51.6 KB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4

84.1 MB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.srt

36.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4

102.8 MB

Is there an EFI monster inside your apple by Pedro Vilccca - CODE BLUE 2015.srt

87.9 KB

Keynote The Singularity is Near by Takuya Matsuda - CODE BLUE 2015.mp4

68.4 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4

80.7 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.srt

78.0 KB

New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4

80.9 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.mp4

47.8 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.srt

40.3 KB

PANDEMONIUM Automated Identification of Cryptographic Algorithms by Yuma Kurogome - CODE BLUE 2015.mp4

36.8 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4

103.3 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.srt

74.4 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4

82.6 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4

93.2 MB

Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4

87.6 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari and Yoshinori Takesako - CODE BLUE 2015.mp4

44.7 MB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri - CODE BLUE 2015.mp4

23.0 MB

[audio]Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa - CODE BLUE 2015.mp4

26.3 MB

/CODE BLUE 2016 (10 18-21 2016)/

[CB16] (P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4

56.1 MB

[CB16] ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4

57.7 MB

[CB16] About CGC the world’s first all-machine hacking tournament by Tyler Nighswander.mp4

67.0 MB

[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4

136.7 MB

[CB16] Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4

52.5 MB

[CB16] Around the Web in 80 Hours Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4

60.9 MB

[CB16] Background Story of Operation neutralizing banking malware by Kazuki Takada.mp4

53.5 MB

[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4

193.8 MB

[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4

67.1 MB

[CB16] DVB-T Hacking by Amihai Neiderman.mp4

33.3 MB

[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4

139.2 MB

[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4

96.3 MB

[CB16] Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4

52.2 MB

[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4

75.1 MB

[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4

347.3 MB

[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4

226.1 MB

[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4

105.3 MB

[CB16] Keynote How much security is too much by Karsten Nohl.mp4

97.5 MB

[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4

114.9 MB

[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4

68.0 MB

[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4

93.2 MB

[CB16] WireGuard Next Generation Abuse-Resistant Kernel Network Tunnelby Jason Donenfeld.mp4

64.7 MB

/CODE BLUE 2017 (11 8-10, 2017)/

[CB17 ](In)Security of Japanese IT Asset Management Software.mp4

53.9 MB

[CB17] A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!.mp4

43.4 MB

[CB17] Androsia A step ahead in securing in-memory Android application data.mp4

49.8 MB

[CB17] Detection index learning based on cyber threat intelligence and its application.mp4

37.5 MB

[CB17] For the Greater Good Leveraging VMware's RPC Interface for fun and profit.mp4

63.1 MB

[CB17] Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4

1.9 MB

[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4

71.6 MB

[CB17] Industroyer biggest threat to industrial control systems since Stuxnet.mp4

31.4 MB

[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4

74.4 MB

[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4

65.6 MB

[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4

81.7 MB

[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4

70.6 MB

[CB17] Possibility of arbitrary code execution by Step-Oriented Programming.mp4

44.9 MB

[CB17] PowerShell Inside Out Applied .NET Hacking for Enhanced Visibility.mp4

63.3 MB

[CB17] Pursue the Attackers – Identify and Investigate Lateral Movement Based on Behavior Pattern –.mp4

46.1 MB

[CB17] Take a Jailbreak -Stunning Guards for iOS Jailbreak-.mp4

54.4 MB

[CB17] The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel - YouTube.mp4

41.5 MB

[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing Effective Dataflow Analysis over Dalvik Opcodes.mp4

70.2 MB

[CB17][確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4

45.1 MB

/

CODE BLUE thank you.txt

1.1 KB

Code Blue logo.jpg

5.6 KB

/Code Blue 2019/

[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.en(transcribed).srt

59.0 KB

[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4

50.8 MB

[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.en(transcribed).srt

44.5 KB

[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4

41.8 MB

[CB19] Coinbase and the Firefox 0-day by Philip Martin.en(transcribed).srt

55.4 KB

[CB19] Coinbase and the Firefox 0-day by Philip Martin.mp4

47.1 MB

[CB19] Hardware Wallet Security by Sergei Volokitin.en(transcribed).srt

62.5 KB

[CB19] Hardware Wallet Security by Sergei Volokitin.mp4

47.3 MB

[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.en(transcribed).srt

80.5 KB

[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4

72.9 MB

[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.en(transcribed).srt

54.6 KB

[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4

54.3 MB

[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.en(transcribed).srt

85.1 KB

[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4

76.7 MB

[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.en(transcribed).srt

35.8 KB

[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.mp4

50.5 MB

[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.en(transcribed).srt

43.9 KB

[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4

36.2 MB

[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.en(transcribed).srt

49.9 KB

[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4

46.7 MB

[CB19] Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4

66.2 MB

[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.en(transcribed).srt

59.4 KB

[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4

58.6 MB

[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.en(transcribed).srt

24.4 KB

[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4

26.6 MB

[CB19] [BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4

33.7 MB

[CB19][BB] Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4

28.4 MB

[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.en(transcribed).srt

17.4 KB

[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4

16.0 MB

[CB19][BB] Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4

84.5 MB

[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.en(transcribed).srt

67.7 KB

[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.mp4

67.7 MB

[CB19][BB] tknk_scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4

196.5 MB

 

Total files 130


Copyright © 2025 FileMood.com