|
/
|
|
Code Blue logo.jpg
|
5.6 KB
|
|
|
|
CODE BLUE thank you.txt
|
1.1 KB
|
|
HEADER.md
|
0.6 KB
|
|
CODE BLUE 2013/
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4
|
27.5 MB
|
|
Fight Against Citadel in Japan by You Nakatsuru.mp4
|
25.2 MB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4
|
11.4 MB
|
|
Intel Management Engine Secrets by Igor Skochinsky.mp4
|
25.4 MB
|
|
Keynote - CODE BLUE in the ICU by Jeff Moss.mp4
|
28.7 MB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4
|
38.2 MB
|
|
libinjection - from SQLi to XSS by Nick Galbreath.mp4
|
12.7 MB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4
|
27.7 MB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4
|
28.4 MB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.mp4
|
21.3 MB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4
|
16.7 MB
|
|
The Current State of Automotive Security by Chris Valasek.mp4
|
37.7 MB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4
|
21.2 MB
|
|
/.../CODE BLUE 2013 captions/
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.json
|
2.1 MB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.lrc
|
43.8 KB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.srt
|
48.4 KB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.text
|
33.5 KB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.tsv
|
39.6 KB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.txt
|
44.2 KB
|
|
A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.vtt
|
44.2 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.json
|
1.2 MB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.lrc
|
32.6 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.srt
|
37.2 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.text
|
22.3 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.tsv
|
28.4 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.txt
|
33.0 KB
|
|
Fight Against Citadel in Japan by You Nakatsuru.eng.vtt
|
33.0 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.json
|
994.5 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.lrc
|
21.7 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.srt
|
23.9 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.text
|
16.6 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.tsv
|
19.5 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.txt
|
21.9 KB
|
|
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.vtt
|
21.9 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.json
|
2.0 MB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.lrc
|
42.9 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.srt
|
46.9 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.text
|
33.8 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.tsv
|
39.2 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.txt
|
43.2 KB
|
|
Intel Management Engine Secrets by Igor Skochinsky.eng.vtt
|
43.2 KB
|
|
Keynote - CODE BLUE in the ICU by Jeff Moss.eng.srt
|
64.8 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.json
|
3.2 MB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.lrc
|
81.7 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.srt
|
90.1 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.text
|
61.3 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.tsv
|
73.1 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.txt
|
82.5 KB
|
|
Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.vtt
|
82.5 KB
|
|
libinjection - from SQLi to XSS by Nick Galbreath.eng.srt
|
22.6 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.json
|
2.2 MB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.lrc
|
44.7 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.srt
|
49.8 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.text
|
33.4 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.tsv
|
40.1 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.txt
|
45.1 KB
|
|
Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.vtt
|
45.1 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.json
|
2.2 MB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.lrc
|
47.9 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.srt
|
54.6 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.text
|
33.1 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.tsv
|
41.8 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.txt
|
48.4 KB
|
|
o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.vtt
|
48.4 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.json
|
1.9 MB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.lrc
|
45.5 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.srt
|
52.5 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.text
|
30.1 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.tsv
|
39.2 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.txt
|
46.1 KB
|
|
Preventing hard disk firmware manipulation attack and disaster recovery.eng.vtt
|
46.1 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.json
|
1.1 MB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.lrc
|
29.0 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.srt
|
32.7 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.text
|
20.7 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.tsv
|
25.5 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.txt
|
29.3 KB
|
|
SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.vtt
|
29.3 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.json
|
2.4 MB
|
|
The Current State of Automotive Security by Chris Valasek.eng.lrc
|
58.9 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.srt
|
65.9 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.text
|
43.7 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.tsv
|
52.7 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.txt
|
59.5 KB
|
|
The Current State of Automotive Security by Chris Valasek.eng.vtt
|
59.5 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.json
|
1.7 MB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.lrc
|
43.4 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.srt
|
50.5 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.text
|
27.9 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.tsv
|
36.9 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.txt
|
44.0 KB
|
|
various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.vtt
|
44.1 KB
|
|
CODE BLUE 2014/
|
|
Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4
|
34.8 MB
|
|
David Jacoby - How I Hacked My Home.mp4
|
24.2 MB
|
|
David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4
|
20.1 MB
|
|
Dongcheol Hong - Drone attack by malware and network hacking.mp4
|
30.3 MB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4
|
11.6 MB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4
|
26.1 MB
|
|
Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4
|
34.5 MB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.mp4
|
25.3 MB
|
|
Takahiro Matsuki & Dennis Kengo Oka.mp4
|
29.7 MB
|
|
The active use and exploitation of Microsoft s Application Compatibility Framework.mp4
|
25.7 MB
|
|
/.../CODE BLUE 2014 captions/
|
|
Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.eng.srt
|
79.2 KB
|
|
David Jacoby - How I Hacked My Home.eng.srt
|
62.0 KB
|
|
David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.eng.srt
|
64.2 KB
|
|
Dongcheol Hong - Drone attack by malware and network hacking.eng.srt
|
45.9 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.json
|
998.7 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.lrc
|
21.6 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.srt
|
24.6 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.text
|
15.0 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.tsv
|
18.7 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.txt
|
21.9 KB
|
|
Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.vtt
|
21.9 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.json
|
1.8 MB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.lrc
|
44.3 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.srt
|
49.4 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.text
|
33.1 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.tsv
|
39.7 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.txt
|
44.8 KB
|
|
Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.vtt
|
44.8 KB
|
|
Keren Elazari - Keynote - The 5 biggest problems of cyber security.eng.srt
|
77.8 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.json
|
1.6 MB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.lrc
|
36.4 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.srt
|
41.9 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.text
|
24.1 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.tsv
|
31.3 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.txt
|
36.9 KB
|
|
Kuniyasu Suzaki - DeviceDisEnabler.eng.vtt
|
36.9 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.json
|
1.5 MB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.lrc
|
34.9 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.srt
|
39.4 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.text
|
24.9 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.tsv
|
30.8 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.txt
|
35.3 KB
|
|
Takahiro Matsuki & Dennis Kengo Oka.eng.vtt
|
35.3 KB
|
|
The active use and exploitation of Microsoft s Application Compatibility Framework.eng.srt
|
66.3 KB
|
|
CODE BLUE 2015/
|
|
(In)Security of Medical Devices by Florian Grunow.mp4
|
63.5 MB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4
|
6.8 MB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4
|
12.7 MB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4
|
6.1 MB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.mp4
|
26.7 MB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4
|
39.7 MB
|
|
An Abusive Relationship with AngularJS by Mario Heiderich.mp4
|
56.7 MB
|
|
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4
|
58.8 MB
|
|
Defeating Firefox by Muneaki Nishimura.mp4
|
40.9 MB
|
|
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4
|
54.9 MB
|
|
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4
|
63.4 MB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.mp4
|
68.8 MB
|
|
Keynote The Singularity is Near by Takuya Matsuda.mp4
|
47.0 MB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4
|
55.9 MB
|
|
New immune system of information security from CHINA by Xiaodun Fang.mp4
|
55.4 MB
|
|
Ninja Correlation of APT Binaries by Bhavna Soman.mp4
|
32.2 MB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4
|
24.9 MB
|
|
Practical network defense at scale by Travis Carelock.mp4
|
74.9 MB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4
|
58.0 MB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4
|
68.7 MB
|
|
Wireless security testing with attack by Keiichi Horiai.mp4
|
62.8 MB
|
|
/.../CODE BLUE 2015 captions/
|
|
(In)Security of Medical Devices by Florian Grunow.eng.srt
|
76.1 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.json
|
1.2 MB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.lrc
|
23.2 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.srt
|
26.3 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.text
|
16.2 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.tsv
|
20.2 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.txt
|
23.4 KB
|
|
[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.vtt
|
23.4 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.json
|
2.1 MB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.lrc
|
40.3 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.srt
|
45.3 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.text
|
29.1 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.tsv
|
35.7 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.txt
|
40.7 KB
|
|
[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.vtt
|
40.7 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.json
|
999.6 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.lrc
|
20.5 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.srt
|
22.8 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.text
|
15.2 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.tsv
|
18.2 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.txt
|
20.7 KB
|
|
[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.vtt
|
20.7 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.json
|
1.0 MB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.lrc
|
23.0 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.srt
|
25.7 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.text
|
17.0 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.tsv
|
20.4 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.txt
|
23.3 KB
|
|
A new exploitation method to bypass stack canaries by Yuki Koike.eng.vtt
|
23.3 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.json
|
1.4 MB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.lrc
|
35.8 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt
|
39.2 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.text
|
28.1 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.tsv
|
32.5 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.txt
|
36.1 KB
|
|
Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.vtt
|
36.1 KB
|
|
Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt
|
42.1 KB
|
|
An Abusive Relationship with AngularJS by Mario Heiderich.eng.srt
|
55.8 KB
|
|
Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.eng.srt
|
39.9 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.json
|
1.9 MB
|
|
Defeating Firefox by Muneaki Nishimura.eng.lrc
|
41.9 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.srt
|
46.5 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.text
|
31.6 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.tsv
|
37.7 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.txt
|
42.3 KB
|
|
Defeating Firefox by Muneaki Nishimura.eng.vtt
|
42.3 KB
|
|
Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.eng.srt
|
51.6 KB
|
|
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.eng.srt
|
36.2 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.json
|
3.4 MB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.lrc
|
84.8 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.srt
|
94.5 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.text
|
60.1 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.tsv
|
74.2 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.txt
|
85.7 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilaca.eng.vtt
|
85.7 KB
|
|
Is there an EFI monster inside your apple by Pedro Vilccca.eng.srt
|
87.9 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.json
|
2.2 MB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.lrc
|
59.6 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.srt
|
69.5 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.text
|
37.7 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.tsv
|
50.6 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.txt
|
60.4 KB
|
|
Keynote The Singularity is Near by Takuya Matsuda.eng.vtt
|
60.4 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.json
|
2.7 MB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.lrc
|
67.1 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt
|
73.5 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.text
|
53.1 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.tsv
|
61.5 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.txt
|
67.7 KB
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.vtt
|
67.7 KB
|
|
Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt
|
78.0 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.json
|
2.5 MB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.lrc
|
56.4 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.srt
|
64.7 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.text
|
38.2 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.tsv
|
49.0 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.txt
|
57.1 KB
|
|
New immune system of information security from CHINA by Xiaodun Fang.eng.vtt
|
57.1 KB
|
|
Ninja Correlation of APT Binaries by Bhavna Soman.eng.srt
|
40.3 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.json
|
945.2 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.lrc
|
21.4 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.srt
|
23.1 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.text
|
17.5 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.tsv
|
19.7 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.txt
|
21.5 KB
|
|
PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.vtt
|
21.5 KB
|
|
Practical network defense at scale by Travis Carelock.eng.srt
|
74.4 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.json
|
1.8 MB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.lrc
|
41.1 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.srt
|
45.9 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.text
|
30.5 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.tsv
|
36.8 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.txt
|
41.5 KB
|
|
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.vtt
|
41.5 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.json
|
2.6 MB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.lrc
|
65.0 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.srt
|
70.4 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.text
|
51.0 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.tsv
|
59.0 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.txt
|
65.6 KB
|
|
The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.vtt
|
65.6 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.json
|
2.1 MB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.lrc
|
46.4 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.srt
|
52.9 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.text
|
32.2 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.tsv
|
40.6 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.txt
|
47.0 KB
|
|
Wireless security testing with attack by Keiichi Horiai.eng.vtt
|
47.0 KB
|
|
CODE BLUE 2016/
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4
|
43.9 MB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4
|
48.0 MB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4
|
81.7 MB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4
|
39.2 MB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4
|
46.1 MB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4
|
42.8 MB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4
|
39.8 MB
|
|
Be a Binary Rockstar by Sophia DAntoine.mp4
|
33.4 MB
|
|
COFI break by Ron Shina & Shlomi Oberman.mp4
|
34.7 MB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4
|
38.5 MB
|
|
DVB-T Hacking by Amihai Neiderman.mp4
|
24.5 MB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4
|
41.9 MB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.mp4
|
59.1 MB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4
|
51.1 MB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4
|
55.0 MB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4
|
36.3 MB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4
|
52.7 MB
|
|
Keynote - How much security is too much by Karsten Nohl.mp4
|
49.5 MB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4
|
57.4 MB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.mp4
|
66.2 MB
|
|
The ARMs race for kernel protection by Jonathan Levin.mp4
|
61.3 MB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4
|
54.3 MB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.mp4
|
48.5 MB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4
|
50.8 MB
|
|
/.../CODE BLUE 2016 captions/
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.json
|
1.3 MB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.lrc
|
32.4 KB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.srt
|
36.3 KB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.text
|
23.8 KB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.tsv
|
28.8 KB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.txt
|
32.8 KB
|
|
(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.vtt
|
32.8 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.json
|
3.0 MB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.lrc
|
75.9 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.srt
|
84.6 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.text
|
56.6 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.tsv
|
67.9 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.txt
|
76.6 KB
|
|
About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.vtt
|
76.6 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.json
|
2.3 MB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.lrc
|
51.5 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.srt
|
56.1 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.text
|
41.3 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.tsv
|
47.3 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.txt
|
51.9 KB
|
|
Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.vtt
|
51.9 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.json
|
2.2 MB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.lrc
|
41.6 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.srt
|
46.5 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.text
|
30.6 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.tsv
|
37.0 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.txt
|
42.0 KB
|
|
Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.vtt
|
42.0 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.json
|
2.2 MB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.lrc
|
53.1 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.srt
|
58.3 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.text
|
41.6 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.tsv
|
48.3 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.txt
|
53.6 KB
|
|
Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.vtt
|
53.6 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.json
|
1.5 MB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.lrc
|
39.2 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.srt
|
43.2 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.text
|
30.2 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.tsv
|
35.4 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.txt
|
39.5 KB
|
|
ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.vtt
|
39.5 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.json
|
1.4 MB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.lrc
|
32.8 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.srt
|
36.1 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.text
|
25.4 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.tsv
|
29.7 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.txt
|
33.1 KB
|
|
Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.vtt
|
33.1 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.json
|
1.3 MB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.lrc
|
33.3 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.srt
|
37.1 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.text
|
24.8 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.tsv
|
29.7 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.txt
|
33.6 KB
|
|
Be a Binary Rockstar by Sophia DAntoine.eng.vtt
|
33.6 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.json
|
1.1 MB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.lrc
|
25.5 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.srt
|
27.8 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.text
|
20.4 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.tsv
|
23.3 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.txt
|
25.7 KB
|
|
COFI break by Ron Shina & Shlomi Oberman.eng.vtt
|
25.7 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.json
|
2.8 MB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.lrc
|
46.3 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.srt
|
51.6 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.text
|
34.6 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.tsv
|
41.4 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.txt
|
46.7 KB
|
|
DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.vtt
|
46.7 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.json
|
1.3 MB
|
|
DVB-T Hacking by Amihai Neiderman.eng.lrc
|
33.0 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.srt
|
37.2 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.text
|
23.6 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.tsv
|
29.0 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.txt
|
33.3 KB
|
|
DVB-T Hacking by Amihai Neiderman.eng.vtt
|
33.3 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.json
|
1.7 MB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.lrc
|
35.3 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.srt
|
39.4 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.text
|
26.4 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.tsv
|
31.6 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.txt
|
35.7 KB
|
|
Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.vtt
|
35.7 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.json
|
1.6 MB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.lrc
|
38.6 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.srt
|
42.9 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.text
|
28.9 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.tsv
|
34.6 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.txt
|
39.0 KB
|
|
Esoteric Web Application Vulnerabilities by Andres Riancho.eng.vtt
|
39.0 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.json
|
1.4 MB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.lrc
|
32.3 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.srt
|
36.9 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.text
|
22.0 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.tsv
|
27.9 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.txt
|
32.7 KB
|
|
EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.vtt
|
32.7 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.json
|
1.8 MB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.lrc
|
42.5 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.srt
|
46.3 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.text
|
33.9 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.tsv
|
38.9 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.txt
|
42.8 KB
|
|
Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.vtt
|
42.8 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.json
|
1.2 MB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.lrc
|
23.9 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.srt
|
26.7 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.text
|
17.6 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.tsv
|
21.2 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.txt
|
24.2 KB
|
|
House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.vtt
|
24.2 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.json
|
2.2 MB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.lrc
|
51.9 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.srt
|
56.9 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.text
|
40.8 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.tsv
|
47.3 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.txt
|
52.4 KB
|
|
Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.vtt
|
52.4 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.json
|
1.9 MB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.lrc
|
45.3 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.srt
|
49.9 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.text
|
35.1 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.tsv
|
41.0 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.txt
|
45.7 KB
|
|
Keynote - How much security is too much by Karsten Nohl.eng.vtt
|
45.7 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.json
|
1.8 MB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.lrc
|
39.6 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.srt
|
44.2 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.text
|
29.4 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.tsv
|
35.4 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.txt
|
40.0 KB
|
|
Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.vtt
|
40.0 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.json
|
2.2 MB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.lrc
|
55.4 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.srt
|
61.6 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.text
|
41.8 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.tsv
|
49.8 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.txt
|
55.9 KB
|
|
PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.eng.vtt
|
55.9 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.json
|
2.7 MB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.lrc
|
61.2 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.srt
|
66.6 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.text
|
49.3 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.tsv
|
56.3 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.txt
|
61.7 KB
|
|
The ARMs race for kernel protection by Jonathan Levin.eng.vtt
|
61.7 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.json
|
1.3 MB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.lrc
|
34.9 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.srt
|
38.9 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.text
|
26.0 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.tsv
|
31.2 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.txt
|
35.3 KB
|
|
Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.vtt
|
35.3 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.json
|
1.4 MB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.lrc
|
36.0 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.srt
|
41.3 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.text
|
24.3 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.tsv
|
31.1 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.txt
|
36.4 KB
|
|
Who put the backdoor in my modem by Ewerson Guimaraes.eng.vtt
|
36.4 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.json
|
2.1 MB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.lrc
|
51.8 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.srt
|
57.4 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.text
|
39.5 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.tsv
|
46.7 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.txt
|
52.3 KB
|
|
WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.vtt
|
52.3 KB
|
|
CODE BLUE 2017/
|
|
(In)Security of Japanese IT Asset Management Software.mp4
|
53.8 MB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4
|
43.7 MB
|
|
Androsia - A step ahead in securing in-memory Android application data.mp4
|
50.1 MB
|
|
Detection index learning based on cyber threat intelligence and its application.mp4
|
40.9 MB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4
|
46.7 MB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4
|
1.7 MB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.mp4
|
66.8 MB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.mp4
|
33.3 MB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4
|
50.4 MB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4
|
58.1 MB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4
|
66.2 MB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4
|
52.4 MB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.mp4
|
48.2 MB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4
|
65.1 MB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4
|
49.7 MB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4
|
56.2 MB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4
|
41.5 MB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4
|
39.1 MB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4
|
49.0 MB
|
|
/.../CODE BLUE 2017 captions/
|
|
(In)Security of Japanese IT Asset Management Software.eng.json
|
1.9 MB
|
|
(In)Security of Japanese IT Asset Management Software.eng.lrc
|
42.1 KB
|
|
(In)Security of Japanese IT Asset Management Software.eng.srt
|
46.8 KB
|
|
(In)Security of Japanese IT Asset Management Software.eng.text
|
31.6 KB
|
|
(In)Security of Japanese IT Asset Management Software.eng.tsv
|
37.8 KB
|
|
(In)Security of Japanese IT Asset Management Software.eng.txt
|
42.5 KB
|
|
(In)Security of Japanese IT Asset Management Software.eng.vtt
|
42.5 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.json
|
1.4 MB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.lrc
|
37.0 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.srt
|
42.1 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.text
|
25.8 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.tsv
|
32.4 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.txt
|
37.5 KB
|
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.vtt
|
37.5 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.json
|
1.8 MB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.lrc
|
45.2 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.srt
|
49.9 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.text
|
34.8 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.tsv
|
40.9 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.txt
|
45.6 KB
|
|
Androsia - A step ahead in securing in-memory Android application data.eng.vtt
|
45.6 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.json
|
1.5 MB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.lrc
|
30.5 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.srt
|
34.6 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.text
|
21.3 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.tsv
|
26.6 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.txt
|
30.8 KB
|
|
Detection index learning based on cyber threat intelligence and its application.eng.vtt
|
30.8 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.json
|
2.2 MB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.lrc
|
48.9 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.srt
|
53.1 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.text
|
39.6 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.tsv
|
45.1 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.txt
|
49.2 KB
|
|
For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.vtt
|
49.3 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.json
|
25.7 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.lrc
|
0.8 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.srt
|
0.9 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.text
|
0.5 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.tsv
|
0.6 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.txt
|
0.8 KB
|
|
Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.vtt
|
0.8 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.json
|
2.1 MB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.lrc
|
53.9 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.srt
|
62.2 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.text
|
35.7 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.tsv
|
46.3 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.txt
|
54.6 KB
|
|
George Hotz - Keynote - Make your car self-driving using open-source software.eng.vtt
|
54.6 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.json
|
1.5 MB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.lrc
|
28.0 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.srt
|
30.7 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.text
|
21.8 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.tsv
|
25.3 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.txt
|
28.2 KB
|
|
Industroyer - biggest threat to industrial control systems since Stuxnet.eng.vtt
|
28.2 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.json
|
1.4 MB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.lrc
|
30.8 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.srt
|
34.8 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.text
|
22.0 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.tsv
|
27.1 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.txt
|
31.2 KB
|
|
Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.vtt
|
31.2 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.json
|
1.5 MB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.lrc
|
38.7 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.srt
|
43.2 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.text
|
28.9 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.tsv
|
34.7 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.txt
|
39.1 KB
|
|
LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.vtt
|
39.1 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.json
|
2.0 MB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.lrc
|
49.3 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.srt
|
53.1 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.text
|
40.9 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.tsv
|
45.9 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.txt
|
49.6 KB
|
|
National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.vtt
|
49.6 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.json
|
1.8 MB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.lrc
|
48.9 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.srt
|
55.5 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.text
|
34.5 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.tsv
|
42.9 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.txt
|
49.5 KB
|
|
Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.vtt
|
49.5 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.json
|
1.9 MB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.lrc
|
39.6 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.srt
|
43.5 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.text
|
31.0 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.tsv
|
36.1 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.txt
|
39.9 KB
|
|
Possibility of arbitrary code execution by Step-Oriented Programming.eng.vtt
|
39.9 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.json
|
1.7 MB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.lrc
|
40.2 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.srt
|
44.3 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.text
|
31.1 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.tsv
|
36.5 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.txt
|
40.6 KB
|
|
PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.vtt
|
40.6 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.json
|
1.9 MB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.lrc
|
40.7 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.srt
|
45.5 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.text
|
30.3 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.tsv
|
36.4 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.txt
|
41.1 KB
|
|
Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.vtt
|
41.2 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.json
|
1.5 MB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.lrc
|
28.3 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.srt
|
30.8 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.text
|
22.7 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.tsv
|
26.0 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.txt
|
28.5 KB
|
|
Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.vtt
|
28.5 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.json
|
1.5 MB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.lrc
|
38.9 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.srt
|
43.0 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.text
|
29.8 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.tsv
|
35.1 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.txt
|
39.2 KB
|
|
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.vtt
|
39.3 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.json
|
1.7 MB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.lrc
|
36.1 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.srt
|
40.8 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.text
|
25.7 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.tsv
|
31.7 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.txt
|
36.5 KB
|
|
吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.vtt
|
36.5 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.json
|
1.6 MB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.lrc
|
36.9 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.srt
|
41.8 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.text
|
26.1 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.tsv
|
32.4 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.txt
|
37.3 KB
|
|
確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.vtt
|
37.3 KB
|
|
CODE BLUE 2018/
|
|
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4
|
82.9 MB
|
|
Are You Trading Stocks Securely by Alejandro Hernandez.mp4
|
66.3 MB
|
|
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4
|
13.8 MB
|
|
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4
|
39.6 MB
|
|
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4
|
50.3 MB
|
|
Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4
|
38.9 MB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4
|
63.2 MB
|
|
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4
|
45.7 MB
|
|
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4
|
39.8 MB
|
|
Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4
|
49.9 MB
|
|
GLitch hammering your phone through WebGL by Pietro Frigo.mp4
|
52.3 MB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4
|
67.5 MB
|
|
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4
|
33.4 MB
|
|
Keynote Cyber Arms Race by Mikko Hyppönen.mp4
|
89.9 MB
|
|
Keynote Power, Patience, and Persistence by Kenneth Geers.mp4
|
57.6 MB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4
|
58.3 MB
|
|
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4
|
46.8 MB
|
|
Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4
|
46.1 MB
|
|
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4
|
59.8 MB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4
|
60.8 MB
|
|
Privacy by Design Methodology by Vanessa Henri.mp4
|
39.5 MB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4
|
22.0 MB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4
|
40.5 MB
|
|
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4
|
52.7 MB
|
|
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4
|
35.5 MB
|
|
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4
|
49.1 MB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4
|
41.5 MB
|
|
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4
|
86.2 MB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4
|
60.8 MB
|
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4
|
49.0 MB
|
|
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4
|
60.4 MB
|
|
Who's guarding the gateway - by Nicole Beckwith.mp4
|
30.3 MB
|
|
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4
|
43.6 MB
|
|
/.../CODE BLUE 2018 captions/
|
|
A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt
|
77.5 KB
|
|
Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt
|
60.2 KB
|
|
BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt
|
56.0 KB
|
|
CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt
|
59.3 KB
|
|
Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt
|
93.0 KB
|
|
Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt
|
60.0 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.json
|
2.2 MB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.lrc
|
45.4 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.srt
|
50.5 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.text
|
34.1 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.tsv
|
40.8 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.txt
|
45.9 KB
|
|
Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.vtt
|
45.9 KB
|
|
Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt
|
40.1 KB
|
|
From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt
|
48.9 KB
|
|
Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt
|
47.7 KB
|
|
GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt
|
68.3 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.json
|
1.6 MB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.lrc
|
37.0 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.srt
|
40.6 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.text
|
29.0 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.tsv
|
33.7 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.txt
|
37.3 KB
|
|
How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.vtt
|
37.3 KB
|
|
INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt
|
47.8 KB
|
|
Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt
|
77.3 KB
|
|
Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt
|
55.9 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.json
|
1.6 MB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.lrc
|
37.3 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.srt
|
42.0 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.text
|
27.1 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.tsv
|
33.1 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.txt
|
37.7 KB
|
|
LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.vtt
|
37.7 KB
|
|
Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt
|
51.2 KB
|
|
Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt
|
61.0 KB
|
|
Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt
|
53.7 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.json
|
1.7 MB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.lrc
|
43.6 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.srt
|
49.0 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.text
|
31.9 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.tsv
|
38.8 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.txt
|
44.1 KB
|
|
Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.vtt
|
44.1 KB
|
|
Privacy by Design Methodology by Vanessa Henri.eng.srt
|
58.2 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.json
|
535.9 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.lrc
|
14.7 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.srt
|
16.6 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.text
|
10.4 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.tsv
|
12.7 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.txt
|
14.9 KB
|
|
RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.vtt
|
14.9 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.json
|
1.2 MB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.lrc
|
27.9 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.srt
|
31.3 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.text
|
20.1 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.tsv
|
24.6 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.txt
|
28.2 KB
|
|
Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.vtt
|
28.2 KB
|
|
Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt
|
64.2 KB
|
|
Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt
|
51.9 KB
|
|
Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt
|
46.9 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.json
|
1.3 MB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.lrc
|
29.4 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.srt
|
32.9 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.text
|
21.5 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.tsv
|
26.1 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.txt
|
29.7 KB
|
|
The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.vtt
|
29.7 KB
|
|
The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt
|
79.9 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.json
|
1.8 MB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.lrc
|
38.4 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.srt
|
43.1 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.text
|
28.0 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.tsv
|
34.0 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.txt
|
38.8 KB
|
|
The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.vtt
|
38.8 KB
|
|
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt
|
50.8 KB
|
|
WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt
|
69.7 KB
|
|
Who's guarding the gateway - by Nicole Beckwith.eng.srt
|
39.1 KB
|
|
Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt
|
39.1 KB
|
|
CODE BLUE 2019/
|
|
[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4
|
25.6 MB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4
|
22.7 MB
|
|
Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4
|
47.2 MB
|
|
Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4
|
37.6 MB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4
|
17.7 MB
|
|
Coinbase and the Firefox 0-day by Philip Martin.mp4
|
41.9 MB
|
|
Hardware Wallet Security by Sergei Volokitin.mp4
|
40.9 MB
|
|
Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4
|
70.1 MB
|
|
KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4
|
48.0 MB
|
|
KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4
|
68.8 MB
|
|
Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4
|
46.4 MB
|
|
Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4
|
32.7 MB
|
|
MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4
|
15.7 MB
|
|
Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4
|
42.5 MB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4
|
38.2 MB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4
|
49.8 MB
|
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4
|
56.6 MB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4
|
55.7 MB
|
|
Wifi sniffing with the WifiKraken by Mike Spicer.mp4
|
62.3 MB
|
|
/.../CODE BLUE 2019 captions/
|
|
[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt
|
24.4 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.json
|
1.0 MB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.lrc
|
22.9 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.srt
|
25.4 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.text
|
17.4 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.tsv
|
20.5 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.txt
|
23.2 KB
|
|
[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.vtt
|
23.2 KB
|
|
Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt
|
59.0 KB
|
|
Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt
|
44.5 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.json
|
739.4 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.lrc
|
15.7 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.srt
|
17.7 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.text
|
11.2 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.tsv
|
13.7 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.txt
|
15.9 KB
|
|
Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.vtt
|
15.9 KB
|
|
Coinbase and the Firefox 0-day by Philip Martin.eng.srt
|
55.4 KB
|
|
Hardware Wallet Security by Sergei Volokitin.eng.srt
|
62.5 KB
|
|
Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt
|
80.5 KB
|
|
KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt
|
54.6 KB
|
|
KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt
|
85.1 KB
|
|
Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt
|
35.8 KB
|
|
Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt
|
43.9 KB
|
|
MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt
|
17.4 KB
|
|
Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt
|
49.9 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.json
|
1.2 MB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.lrc
|
29.5 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.srt
|
32.6 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.text
|
22.4 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.tsv
|
26.5 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.txt
|
29.8 KB
|
|
Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.vtt
|
29.8 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.json
|
1.4 MB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.lrc
|
33.5 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.srt
|
39.1 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.text
|
20.9 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.tsv
|
28.2 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.txt
|
33.9 KB
|
|
Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.vtt
|
34.0 KB
|
|
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt
|
59.4 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.json
|
941.1 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.lrc
|
21.6 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.srt
|
24.3 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.text
|
15.4 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.tsv
|
18.9 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.txt
|
21.8 KB
|
|
tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.vtt
|
21.8 KB
|
|
Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt
|
67.7 KB
|
|
CODE BLUE 2020/
|
|
Alliance power for Cyber Security.mp4
|
14.8 MB
|
|
Apk-medit memory search and patch tool for APK without root & android NDK.mp4
|
9.8 MB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4
|
17.9 MB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4
|
15.8 MB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4
|
15.4 MB
|
|
Defending Computer CriminalsPresented - Andrea Monti.mp4
|
16.0 MB
|
|
Dissecting China’s Information Operations with Threat Intelligence.mp4
|
23.5 MB
|
|
Don't Be Silly - It's Only a Lightbulb.mp4
|
130.1 MB
|
|
Drones' Cryptanalysis - Detecting Spying Drones.mp4
|
24.4 MB
|
|
Ethereum 2.0のセキュリティ.mp4
|
17.4 MB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4
|
21.5 MB
|
|
Hunting kernel exploits with filesystem fuzzer.mp4
|
19.7 MB
|
|
Illicit QQ Communities What's Being Shared.mp4
|
16.5 MB
|
|
It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4
|
29.2 MB
|
|
Keynote1 - Ms. Audrey Guinchard.mp4
|
21.9 MB
|
|
Keynote2 - Practical and Intelligent Incident Response Planning.mp4
|
29.1 MB
|
|
Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4
|
31.6 MB
|
|
Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4
|
23.0 MB
|
|
Law Enforcement Access to Transborder.mp4
|
34.3 MB
|
|
Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4
|
25.5 MB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4
|
26.6 MB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4
|
27.3 MB
|
|
Operation I am Tom How APT actors move laterally in corporate networks.mp4
|
27.3 MB
|
|
Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4
|
24.8 MB
|
|
Reflex you give me a parser, I give you a token generator.mp4
|
22.8 MB
|
|
Reverse Engineering archeology.mp4
|
32.4 MB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.mp4
|
20.4 MB
|
|
Speccial Session - Digital Social Innovation.mp4
|
56.6 MB
|
|
Vulnerabilities of Machine Learning Infrastructure.mp4
|
24.1 MB
|
|
Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4
|
30.2 MB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4
|
23.2 MB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4
|
21.8 MB
|
|
説明可能な悪性ドメイン診断.mp4
|
27.8 MB
|
|
/.../CODE BLUE 2020 captions/
|
|
Alliance power for Cyber Security.eng.srt
|
23.3 KB
|
|
Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt
|
15.1 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.json
|
995.9 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.lrc
|
25.5 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.srt
|
27.9 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.text
|
20.0 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.tsv
|
23.1 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.txt
|
25.7 KB
|
|
Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.vtt
|
25.7 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.json
|
578.5 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.lrc
|
15.0 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.srt
|
16.7 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.text
|
11.2 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.tsv
|
13.3 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.txt
|
15.2 KB
|
|
Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.vtt
|
15.2 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.json
|
739.4 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.lrc
|
17.8 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.srt
|
19.8 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.text
|
13.1 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.tsv
|
15.6 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.txt
|
17.9 KB
|
|
DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.vtt
|
18.0 KB
|
|
Defending Computer CriminalsPresented - Andrea Monti.eng.srt
|
38.3 KB
|
|
Dissecting China’s Information Operations with Threat Intelligence.eng.srt
|
36.2 KB
|
|
Don't Be Silly - It's Only a Lightbulb.eng.srt
|
49.2 KB
|
|
Drones' Cryptanalysis - Detecting Spying Drones.eng.srt
|
48.6 KB
|
|
Ethereum 2.0のセキュリティ.eng.json
|
841.0 KB
|
|
Ethereum 2.0のセキュリティ.eng.lrc
|
21.1 KB
|
|
Ethereum 2.0のセキュリティ.eng.srt
|
23.5 KB
|
|
Ethereum 2.0のセキュリティ.eng.text
|
15.7 KB
|
|
Ethereum 2.0のセキュリティ.eng.tsv
|
18.7 KB
|
|
Ethereum 2.0のセキュリティ.eng.txt
|
21.3 KB
|
|
Ethereum 2.0のセキュリティ.eng.vtt
|
21.3 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.json
|
1.3 MB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.lrc
|
27.7 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.srt
|
30.4 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.text
|
21.6 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.tsv
|
25.0 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.txt
|
27.9 KB
|
|
Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.vtt
|
27.9 KB
|
|
Hunting kernel exploits with filesystem fuzzer.eng.srt
|
31.6 KB
|
|
Illicit QQ Communities What's Being Shared.eng.srt
|
39.8 KB
|
|
It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt
|
43.4 KB
|
|
Keynote1 - Ms. Audrey Guinchard.eng.srt
|
40.5 KB
|
|
Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt
|
47.5 KB
|
|
Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt
|
52.9 KB
|
|
Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt
|
47.7 KB
|
|
Law Enforcement Access to Transborder.eng.srt
|
49.1 KB
|
|
Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt
|
41.4 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.json
|
967.3 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.lrc
|
22.3 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.srt
|
24.7 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.text
|
16.7 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.tsv
|
19.8 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.txt
|
22.5 KB
|
|
LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.vtt
|
22.5 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.json
|
1.1 MB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.lrc
|
28.0 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.srt
|
31.2 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.text
|
21.1 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.tsv
|
25.1 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.txt
|
28.3 KB
|
|
Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.vtt
|
28.3 KB
|
|
Operation I am Tom How APT actors move laterally in corporate networks.eng.srt
|
43.1 KB
|
|
Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt
|
38.6 KB
|
|
Reflex you give me a parser, I give you a token generator.eng.srt
|
44.1 KB
|
|
Reverse Engineering archeology.eng.json
|
1.2 MB
|
|
Reverse Engineering archeology.eng.lrc
|
30.3 KB
|
|
Reverse Engineering archeology.eng.srt
|
33.2 KB
|
|
Reverse Engineering archeology.eng.text
|
23.7 KB
|
|
Reverse Engineering archeology.eng.tsv
|
27.4 KB
|
|
Reverse Engineering archeology.eng.txt
|
30.5 KB
|
|
Reverse Engineering archeology.eng.vtt
|
30.5 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.json
|
1.0 MB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.lrc
|
22.5 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.srt
|
24.8 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.text
|
17.3 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.tsv
|
20.2 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.txt
|
22.7 KB
|
|
SOARによるセキュリティ監視業務の効率化とSecOps.eng.vtt
|
22.7 KB
|
|
Speccial Session - Digital Social Innovation.eng.srt
|
44.5 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.json
|
931.2 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.lrc
|
24.1 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.srt
|
26.6 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.text
|
18.4 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.tsv
|
21.6 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.txt
|
24.3 KB
|
|
Vulnerabilities of Machine Learning Infrastructure.eng.vtt
|
24.3 KB
|
|
Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt
|
46.5 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.json
|
1.0 MB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.lrc
|
22.1 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.srt
|
24.3 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.text
|
17.0 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.tsv
|
19.8 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.txt
|
22.3 KB
|
|
サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.vtt
|
22.3 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.json
|
1.0 MB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.lrc
|
23.6 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.srt
|
25.8 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.text
|
18.4 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.tsv
|
21.3 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.txt
|
23.7 KB
|
|
虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.vtt
|
23.8 KB
|
|
説明可能な悪性ドメイン診断.eng.json
|
1.3 MB
|
|
説明可能な悪性ドメイン診断.eng.lrc
|
28.1 KB
|
|
説明可能な悪性ドメイン診断.eng.srt
|
30.8 KB
|
|
説明可能な悪性ドメイン診断.eng.text
|
22.1 KB
|
|
説明可能な悪性ドメイン診断.eng.tsv
|
25.5 KB
|
|
説明可能な悪性ドメイン診断.eng.txt
|
28.4 KB
|
|
説明可能な悪性ドメイン診断.eng.vtt
|
28.4 KB
|
|
CODE BLUE 2021/
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4
|
47.6 MB
|
|
Day1 Closing.mp4
|
5.9 MB
|
|
Day1 Opening.mp4
|
7.7 MB
|
|
Day2 Event Closing.mp4
|
42.4 MB
|
|
Day2 Online Closing.mp4
|
7.9 MB
|
|
Day2 Opening.mp4
|
23.7 MB
|
|
Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4
|
35.9 MB
|
|
Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4
|
40.0 MB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4
|
31.5 MB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4
|
37.9 MB
|
|
NAS as Not As Secure.mp4
|
23.1 MB
|
|
Non-Private Chat Police investigation legislation in the flat world.mp4
|
36.5 MB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4
|
25.0 MB
|
|
ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4
|
42.2 MB
|
|
The Lazarus Group's Attack Operations Targeting Japan.mp4
|
46.7 MB
|
|
The security thing - Knowledge, skills, and two more things.mp4
|
92.6 MB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4
|
43.9 MB
|
|
/.../CODE BLUE 2021 captions/
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.json
|
1.7 MB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.lrc
|
39.8 KB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.srt
|
43.5 KB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.text
|
31.4 KB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.tsv
|
36.3 KB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.txt
|
40.1 KB
|
|
Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.vtt
|
40.1 KB
|
|
Day1 Closing.eng.json
|
76.8 KB
|
|
Day1 Closing.eng.lrc
|
2.1 KB
|
|
Day1 Closing.eng.srt
|
2.5 KB
|
|
Day1 Closing.eng.text
|
1.3 KB
|
|
Day1 Closing.eng.tsv
|
1.7 KB
|
|
Day1 Closing.eng.txt
|
2.2 KB
|
|
Day1 Closing.eng.vtt
|
2.2 KB
|
|
Day1 Opening.eng.json
|
290.4 KB
|
|
Day1 Opening.eng.lrc
|
7.9 KB
|
|
Day1 Opening.eng.srt
|
9.2 KB
|
|
Day1 Opening.eng.text
|
5.1 KB
|
|
Day1 Opening.eng.tsv
|
6.6 KB
|
|
Day1 Opening.eng.txt
|
8.0 KB
|
|
Day1 Opening.eng.vtt
|
8.1 KB
|
|
Day2 Event Closing.eng.json
|
410.4 KB
|
|
Day2 Event Closing.eng.lrc
|
9.9 KB
|
|
Day2 Event Closing.eng.srt
|
11.2 KB
|
|
Day2 Event Closing.eng.text
|
6.8 KB
|
|
Day2 Event Closing.eng.tsv
|
8.4 KB
|
|
Day2 Event Closing.eng.txt
|
10.0 KB
|
|
Day2 Event Closing.eng.vtt
|
10.0 KB
|
|
Day2 Online Closing.eng.json
|
202.2 KB
|
|
Day2 Online Closing.eng.lrc
|
5.0 KB
|
|
Day2 Online Closing.eng.srt
|
5.5 KB
|
|
Day2 Online Closing.eng.text
|
3.7 KB
|
|
Day2 Online Closing.eng.tsv
|
4.4 KB
|
|
Day2 Online Closing.eng.txt
|
5.0 KB
|
|
Day2 Online Closing.eng.vtt
|
5.0 KB
|
|
Day2 Opening.eng.json
|
241.7 KB
|
|
Day2 Opening.eng.lrc
|
5.9 KB
|
|
Day2 Opening.eng.srt
|
6.9 KB
|
|
Day2 Opening.eng.text
|
3.8 KB
|
|
Day2 Opening.eng.tsv
|
4.9 KB
|
|
Day2 Opening.eng.txt
|
6.0 KB
|
|
Day2 Opening.eng.vtt
|
6.0 KB
|
|
Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt
|
41.5 KB
|
|
Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt
|
51.8 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.json
|
1.1 MB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.lrc
|
25.0 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.srt
|
28.3 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.text
|
17.8 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.tsv
|
21.9 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.txt
|
25.3 KB
|
|
Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.vtt
|
25.3 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.json
|
1.2 MB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.lrc
|
23.8 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.srt
|
26.6 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.text
|
17.7 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.tsv
|
21.1 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.txt
|
24.1 KB
|
|
MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.vtt
|
24.1 KB
|
|
NAS as Not As Secure.eng.srt
|
51.6 KB
|
|
Non-Private Chat Police investigation legislation in the flat world.eng.srt
|
49.4 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.json
|
1.1 MB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.lrc
|
25.7 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.srt
|
28.2 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.text
|
20.1 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.tsv
|
23.4 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.txt
|
26.0 KB
|
|
Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.vtt
|
26.0 KB
|
|
ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt
|
58.5 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.json
|
1.5 MB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.lrc
|
35.4 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.srt
|
38.9 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.text
|
27.5 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.tsv
|
32.0 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.txt
|
35.7 KB
|
|
The Lazarus Group's Attack Operations Targeting Japan.eng.vtt
|
35.7 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.json
|
2.8 MB
|
|
The security thing - Knowledge, skills, and two more things.eng.lrc
|
62.2 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.srt
|
70.9 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.text
|
42.6 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.tsv
|
54.0 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.txt
|
62.9 KB
|
|
The security thing - Knowledge, skills, and two more things.eng.vtt
|
62.9 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.json
|
1.9 MB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.lrc
|
41.4 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.srt
|
45.4 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.text
|
32.6 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.tsv
|
37.7 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.txt
|
41.8 KB
|
|
Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.vtt
|
41.8 KB
|
|
CODE BLUE 2022/
|
|
「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4
|
124.6 MB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.mp4
|
19.6 MB
|
|
Closing adddress.mp4
|
103.0 MB
|
|
CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4
|
42.0 MB
|
|
Fight Against Malware Development Life Cycle.mp4
|
47.6 MB
|
|
From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4
|
49.7 MB
|
|
Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4
|
44.8 MB
|
|
Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4
|
18.2 MB
|
|
KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4
|
53.6 MB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4
|
53.1 MB
|
|
Opening.mp4
|
30.7 MB
|
|
Red light in the factory - From 0 to 100 OT adversary emulation.mp4
|
35.8 MB
|
|
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4
|
60.9 MB
|
|
Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4
|
49.6 MB
|
|
SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4
|
40.2 MB
|
|
Tales of 5G hacking.mp4
|
77.8 MB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.mp4
|
124.5 MB
|
|
Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4
|
44.2 MB
|
|
Under the hood of Wslink’s multilayered virtual machine.mp4
|
31.7 MB
|
|
What I learned from the direct confrontation with the adversaries who hid C&C server.mp4
|
44.7 MB
|
|
Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4
|
30.2 MB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4
|
42.3 MB
|
|
/.../CODE BLUE 2022 captions/
|
|
「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt
|
86.2 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.json
|
706.9 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.lrc
|
16.2 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.srt
|
17.7 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.text
|
12.5 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.tsv
|
14.5 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.txt
|
16.3 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.vtt
|
16.3 KB
|
|
Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt
|
29.3 KB
|
|
Closing adddress.eng.srt
|
34.4 KB
|
|
CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt
|
41.8 KB
|
|
Fight Against Malware Development Life Cycle.eng.srt
|
56.6 KB
|
|
From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt
|
54.1 KB
|
|
Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt
|
40.9 KB
|
|
Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt
|
23.9 KB
|
|
KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt
|
81.6 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.json
|
1.1 MB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.lrc
|
29.4 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.srt
|
32.7 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.text
|
21.9 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.tsv
|
26.2 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.txt
|
29.6 KB
|
|
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.vtt
|
29.7 KB
|
|
Opening.eng.srt
|
14.1 KB
|
|
Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt
|
40.3 KB
|
|
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt
|
74.5 KB
|
|
Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt
|
77.0 KB
|
|
SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt
|
50.5 KB
|
|
Tales of 5G hacking.eng.srt
|
67.9 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.json
|
2.0 MB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.lrc
|
50.6 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.srt
|
56.1 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.text
|
38.5 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.tsv
|
45.7 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.txt
|
51.1 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.vtt
|
51.1 KB
|
|
The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt
|
85.5 KB
|
|
Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt
|
48.0 KB
|
|
Under the hood of Wslink’s multilayered virtual machine.eng.srt
|
43.9 KB
|
|
What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt
|
66.0 KB
|
|
Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt
|
61.4 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.json
|
1.1 MB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.lrc
|
28.6 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.srt
|
32.0 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.text
|
21.1 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.tsv
|
25.4 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.txt
|
28.9 KB
|
|
Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.vtt
|
28.9 KB
|
|
CODE BLUE 2023/
|
|
A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4
|
55.0 MB
|
|
BSides Tokyo 2024.mp4
|
56.4 MB
|
|
Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4
|
42.9 MB
|
|
Closing Keynote Cyber and Security in Times of War.mp4
|
36.2 MB
|
|
Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4
|
27.4 MB
|
|
Digital sovereignty - shaping regulatory responses to technological dominance.mp4
|
41.9 MB
|
|
Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4
|
24.9 MB
|
|
filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4
|
35.0 MB
|
|
Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4
|
47.1 MB
|
|
International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4
|
66.9 MB
|
|
KeynoteIf It's Smart, It's Vulnerable.mp4
|
75.5 MB
|
|
Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4
|
41.0 MB
|
|
Open Sesame The full story behind opening a smart lock.mp4
|
40.4 MB
|
|
OSBT OpenID Connect Scenario-Based Tester.mp4
|
47.8 MB
|
|
Pennywise - Invisible privacy risk in the new AI era.mp4
|
39.8 MB
|
|
Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4
|
45.4 MB
|
|
Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4
|
22.5 MB
|
|
stelftools cross-architecture static library detector for IoT malware.mp4
|
58.8 MB
|
|
The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4
|
31.0 MB
|
|
The Renaissance of Cyber Physical Offensive Capabilities.mp4
|
40.6 MB
|
|
Unlocking the Drive Exploiting Tesla Model 3.mp4
|
41.4 MB
|
|
Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4
|
54.0 MB
|
|
/.../CODE BLUE 20123 captions/
|
|
A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt
|
55.2 KB
|
|
BSides Tokyo 2024.eng.srt
|
42.2 KB
|
|
Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt
|
69.3 KB
|
|
Closing Keynote Cyber and Security in Times of War.eng.srt
|
57.0 KB
|
|
Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt
|
52.3 KB
|
|
Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt
|
61.8 KB
|
|
Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt
|
42.7 KB
|
|
filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt
|
50.0 KB
|
|
Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt
|
61.7 KB
|
|
International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt
|
62.7 KB
|
|
KeynoteIf It's Smart, It's Vulnerable.eng.srt
|
66.5 KB
|
|
Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt
|
56.5 KB
|
|
Open Sesame The full story behind opening a smart lock.eng.srt
|
47.9 KB
|
|
OSBT OpenID Connect Scenario-Based Tester.eng.srt
|
55.0 KB
|
|
Pennywise - Invisible privacy risk in the new AI era.eng.srt
|
53.9 KB
|
|
Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt
|
68.1 KB
|
|
Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt
|
34.1 KB
|
|
stelftools cross-architecture static library detector for IoT malware.eng.srt
|
64.6 KB
|
|
The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt
|
55.8 KB
|
|
The Renaissance of Cyber Physical Offensive Capabilities.eng.srt
|
75.0 KB
|
|
Unlocking the Drive Exploiting Tesla Model 3.eng.srt
|
47.9 KB
|
|
Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt
|
60.5 KB
|
|
CODE BLUE 2024/
|
|
1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.mp4
|
31.3 MB
|
|
Abusing legacy railroad signaling systems.mp4
|
33.6 MB
|
|
Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.mp4
|
50.0 MB
|
|
Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.mp4
|
29.6 MB
|
|
BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.mp4
|
61.5 MB
|
|
Defeating PlayStation 5 network encryption.mp4
|
31.7 MB
|
|
Did Subdomain Abuse by BlackTech Evolve.mp4
|
39.4 MB
|
|
EchidnaTermApp: ペネトレーションテスト支援・学習ツール.mp4
|
37.0 MB
|
|
Event Tracing for Windows Internals.mp4
|
60.8 MB
|
|
From Snowflake to SnowstormNavigating Breaches and Detections.mp4
|
32.1 MB
|
|
Hacking Google - Lessons learned running and growing an internal red team.mp4
|
33.4 MB
|
|
IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.mp4
|
42.1 MB
|
|
Keynote AI for formal verification - formal verification for AI.mp4
|
60.7 MB
|
|
Modern SOCLess Than One and More Than Infinity.mp4
|
44.7 MB
|
|
NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.mp4
|
24.9 MB
|
|
NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.mp4
|
46.7 MB
|
|
Piloting Edge Copilot.mp4
|
27.9 MB
|
|
PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.mp4
|
38.9 MB
|
|
Proxying to KernelStreaming vulnerabilities from Windows Kernel.mp4
|
31.9 MB
|
|
SBOM and Security Transparency - How it all fits together.mp4
|
24.1 MB
|
|
V for VendettaDissecting a Global Phishing Platform After Being Phished.mp4
|
34.2 MB
|
|
WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.mp4
|
41.3 MB
|
|
/.../CODE BLUE 2024 captions/
|
|
1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.eng.srt
|
45.6 KB
|
|
Abusing legacy railroad signaling systems.eng.srt
|
39.1 KB
|
|
Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.eng.srt
|
60.7 KB
|
|
Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.eng.srt
|
50.5 KB
|
|
BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.eng.srt
|
72.5 KB
|
|
Defeating PlayStation 5 network encryption.eng.srt
|
57.3 KB
|
|
Did Subdomain Abuse by BlackTech Evolve.eng.srt
|
50.4 KB
|
|
EchidnaTermApp: ペネトレーションテスト支援・学習ツール.eng.srt
|
42.6 KB
|
|
Event Tracing for Windows Internals.eng.srt
|
58.2 KB
|
|
From Snowflake to SnowstormNavigating Breaches and Detections.eng.srt
|
71.3 KB
|
|
Hacking Google - Lessons learned running and growing an internal red team.eng.srt
|
60.7 KB
|
|
IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.eng.srt
|
49.4 KB
|
|
Keynote AI for formal verification - formal verification for AI.eng.srt
|
85.5 KB
|
|
Modern SOCLess Than One and More Than Infinity.eng.srt
|
33.8 KB
|
|
NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.eng.srt
|
35.7 KB
|
|
NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.eng.srt
|
47.3 KB
|
|
Piloting Edge Copilot.eng.srt
|
46.6 KB
|
|
PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.eng.srt
|
60.2 KB
|
|
Proxying to KernelStreaming vulnerabilities from Windows Kernel.eng.srt
|
54.8 KB
|
|
SBOM and Security Transparency - How it all fits together.eng.srt
|
36.9 KB
|
|
V for VendettaDissecting a Global Phishing Platform After Being Phished.eng.srt
|
49.3 KB
|
|
WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.eng.srt
|
74.1 KB
|
|
Total files 1202
|