FileMood

Download CODE BLUE

CODE BLUE

Name

CODE BLUE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

10.8 GB

Total Files

1202

Last Seen

Hash

9C744198093431BAFA805ED6844D4203DA7A00C0

/

Code Blue logo.jpg

5.6 KB

CODE BLUE thank you.txt

1.1 KB

HEADER.md

0.6 KB

CODE BLUE 2013/

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4

27.5 MB

Fight Against Citadel in Japan by You Nakatsuru.mp4

25.2 MB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4

11.4 MB

Intel Management Engine Secrets by Igor Skochinsky.mp4

25.4 MB

Keynote - CODE BLUE in the ICU by Jeff Moss.mp4

28.7 MB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4

38.2 MB

libinjection - from SQLi to XSS by Nick Galbreath.mp4

12.7 MB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4

27.7 MB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4

28.4 MB

Preventing hard disk firmware manipulation attack and disaster recovery.mp4

21.3 MB

SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4

16.7 MB

The Current State of Automotive Security by Chris Valasek.mp4

37.7 MB

various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4

21.2 MB

/.../CODE BLUE 2013 captions/

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.json

2.1 MB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.lrc

43.8 KB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.srt

48.4 KB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.text

33.5 KB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.tsv

39.6 KB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.txt

44.2 KB

A Security Barrier Device Regardless of OS or Applications by Kenji Toda.eng.vtt

44.2 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.json

1.2 MB

Fight Against Citadel in Japan by You Nakatsuru.eng.lrc

32.6 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.srt

37.2 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.text

22.3 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.tsv

28.4 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.txt

33.0 KB

Fight Against Citadel in Japan by You Nakatsuru.eng.vtt

33.0 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.json

994.5 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.lrc

21.7 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.srt

23.9 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.text

16.6 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.tsv

19.5 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.txt

21.9 KB

HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.eng.vtt

21.9 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.json

2.0 MB

Intel Management Engine Secrets by Igor Skochinsky.eng.lrc

42.9 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.srt

46.9 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.text

33.8 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.tsv

39.2 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.txt

43.2 KB

Intel Management Engine Secrets by Igor Skochinsky.eng.vtt

43.2 KB

Keynote - CODE BLUE in the ICU by Jeff Moss.eng.srt

64.8 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.json

3.2 MB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.lrc

81.7 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.srt

90.1 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.text

61.3 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.tsv

73.1 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.txt

82.5 KB

Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.eng.vtt

82.5 KB

libinjection - from SQLi to XSS by Nick Galbreath.eng.srt

22.6 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.json

2.2 MB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.lrc

44.7 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.srt

49.8 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.text

33.4 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.tsv

40.1 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.txt

45.1 KB

Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.eng.vtt

45.1 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.json

2.2 MB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.lrc

47.9 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.srt

54.6 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.text

33.1 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.tsv

41.8 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.txt

48.4 KB

o-checker - Malicious document file detection tool by Yuuhei Ootsubo.eng.vtt

48.4 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.json

1.9 MB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.lrc

45.5 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.srt

52.5 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.text

30.1 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.tsv

39.2 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.txt

46.1 KB

Preventing hard disk firmware manipulation attack and disaster recovery.eng.vtt

46.1 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.json

1.1 MB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.lrc

29.0 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.srt

32.7 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.text

20.7 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.tsv

25.5 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.txt

29.3 KB

SCADA Software or Swiss Cheese Software by Celil UNUVER.eng.vtt

29.3 KB

The Current State of Automotive Security by Chris Valasek.eng.json

2.4 MB

The Current State of Automotive Security by Chris Valasek.eng.lrc

58.9 KB

The Current State of Automotive Security by Chris Valasek.eng.srt

65.9 KB

The Current State of Automotive Security by Chris Valasek.eng.text

43.7 KB

The Current State of Automotive Security by Chris Valasek.eng.tsv

52.7 KB

The Current State of Automotive Security by Chris Valasek.eng.txt

59.5 KB

The Current State of Automotive Security by Chris Valasek.eng.vtt

59.5 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.json

1.7 MB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.lrc

43.4 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.srt

50.5 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.text

27.9 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.tsv

36.9 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.txt

44.0 KB

various tricks for remote linux exploits by Seokha Lee (wh1ant).eng.vtt

44.1 KB

CODE BLUE 2014/

Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4

34.8 MB

David Jacoby - How I Hacked My Home.mp4

24.2 MB

David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4

20.1 MB

Dongcheol Hong - Drone attack by malware and network hacking.mp4

30.3 MB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4

11.6 MB

Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4

26.1 MB

Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4

34.5 MB

Kuniyasu Suzaki - DeviceDisEnabler.mp4

25.3 MB

Takahiro Matsuki & Dennis Kengo Oka.mp4

29.7 MB

The active use and exploitation of Microsoft s Application Compatibility Framework.mp4

25.7 MB

/.../CODE BLUE 2014 captions/

Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.eng.srt

79.2 KB

David Jacoby - How I Hacked My Home.eng.srt

62.0 KB

David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.eng.srt

64.2 KB

Dongcheol Hong - Drone attack by malware and network hacking.eng.srt

45.9 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.json

998.7 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.lrc

21.6 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.srt

24.6 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.text

15.0 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.tsv

18.7 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.txt

21.9 KB

Hiroshi Shinotsuka - how to avoid the Detection by Malware.eng.vtt

21.9 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.json

1.8 MB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.lrc

44.3 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.srt

49.4 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.text

33.1 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.tsv

39.7 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.txt

44.8 KB

Ilfak Guilfanov - Keynote - The story of IDA Pro.eng.vtt

44.8 KB

Keren Elazari - Keynote - The 5 biggest problems of cyber security.eng.srt

77.8 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.json

1.6 MB

Kuniyasu Suzaki - DeviceDisEnabler.eng.lrc

36.4 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.srt

41.9 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.text

24.1 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.tsv

31.3 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.txt

36.9 KB

Kuniyasu Suzaki - DeviceDisEnabler.eng.vtt

36.9 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.json

1.5 MB

Takahiro Matsuki & Dennis Kengo Oka.eng.lrc

34.9 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.srt

39.4 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.text

24.9 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.tsv

30.8 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.txt

35.3 KB

Takahiro Matsuki & Dennis Kengo Oka.eng.vtt

35.3 KB

The active use and exploitation of Microsoft s Application Compatibility Framework.eng.srt

66.3 KB

CODE BLUE 2015/

(In)Security of Medical Devices by Florian Grunow.mp4

63.5 MB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4

6.8 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4

12.7 MB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4

6.1 MB

A new exploitation method to bypass stack canaries by Yuki Koike.mp4

26.7 MB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4

39.7 MB

An Abusive Relationship with AngularJS by Mario Heiderich.mp4

56.7 MB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4

58.8 MB

Defeating Firefox by Muneaki Nishimura.mp4

40.9 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4

54.9 MB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4

63.4 MB

Is there an EFI monster inside your apple by Pedro Vilaca.mp4

68.8 MB

Keynote The Singularity is Near by Takuya Matsuda.mp4

47.0 MB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4

55.9 MB

New immune system of information security from CHINA by Xiaodun Fang.mp4

55.4 MB

Ninja Correlation of APT Binaries by Bhavna Soman.mp4

32.2 MB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4

24.9 MB

Practical network defense at scale by Travis Carelock.mp4

74.9 MB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4

58.0 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4

68.7 MB

Wireless security testing with attack by Keiichi Horiai.mp4

62.8 MB

/.../CODE BLUE 2015 captions/

(In)Security of Medical Devices by Florian Grunow.eng.srt

76.1 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.json

1.2 MB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.lrc

23.2 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.srt

26.3 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.text

16.2 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.tsv

20.2 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.txt

23.4 KB

[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.eng.vtt

23.4 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.json

2.1 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.lrc

40.3 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.srt

45.3 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.text

29.1 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.tsv

35.7 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.txt

40.7 KB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.eng.vtt

40.7 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.json

999.6 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.lrc

20.5 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.srt

22.8 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.text

15.2 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.tsv

18.2 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.txt

20.7 KB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.eng.vtt

20.7 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.json

1.0 MB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.lrc

23.0 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.srt

25.7 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.text

17.0 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.tsv

20.4 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.txt

23.3 KB

A new exploitation method to bypass stack canaries by Yuki Koike.eng.vtt

23.3 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.json

1.4 MB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.lrc

35.8 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt

39.2 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.text

28.1 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.tsv

32.5 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.txt

36.1 KB

Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.vtt

36.1 KB

Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.eng.srt

42.1 KB

An Abusive Relationship with AngularJS by Mario Heiderich.eng.srt

55.8 KB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.eng.srt

39.9 KB

Defeating Firefox by Muneaki Nishimura.eng.json

1.9 MB

Defeating Firefox by Muneaki Nishimura.eng.lrc

41.9 KB

Defeating Firefox by Muneaki Nishimura.eng.srt

46.5 KB

Defeating Firefox by Muneaki Nishimura.eng.text

31.6 KB

Defeating Firefox by Muneaki Nishimura.eng.tsv

37.7 KB

Defeating Firefox by Muneaki Nishimura.eng.txt

42.3 KB

Defeating Firefox by Muneaki Nishimura.eng.vtt

42.3 KB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.eng.srt

51.6 KB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.eng.srt

36.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.json

3.4 MB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.lrc

84.8 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.srt

94.5 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.text

60.1 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.tsv

74.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.txt

85.7 KB

Is there an EFI monster inside your apple by Pedro Vilaca.eng.vtt

85.7 KB

Is there an EFI monster inside your apple by Pedro Vilccca.eng.srt

87.9 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.json

2.2 MB

Keynote The Singularity is Near by Takuya Matsuda.eng.lrc

59.6 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.srt

69.5 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.text

37.7 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.tsv

50.6 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.txt

60.4 KB

Keynote The Singularity is Near by Takuya Matsuda.eng.vtt

60.4 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.json

2.7 MB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.lrc

67.1 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt

73.5 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.text

53.1 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.tsv

61.5 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.txt

67.7 KB

Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.vtt

67.7 KB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.eng.srt

78.0 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.json

2.5 MB

New immune system of information security from CHINA by Xiaodun Fang.eng.lrc

56.4 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.srt

64.7 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.text

38.2 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.tsv

49.0 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.txt

57.1 KB

New immune system of information security from CHINA by Xiaodun Fang.eng.vtt

57.1 KB

Ninja Correlation of APT Binaries by Bhavna Soman.eng.srt

40.3 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.json

945.2 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.lrc

21.4 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.srt

23.1 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.text

17.5 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.tsv

19.7 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.txt

21.5 KB

PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.eng.vtt

21.5 KB

Practical network defense at scale by Travis Carelock.eng.srt

74.4 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.json

1.8 MB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.lrc

41.1 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.srt

45.9 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.text

30.5 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.tsv

36.8 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.txt

41.5 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.eng.vtt

41.5 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.json

2.6 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.lrc

65.0 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.srt

70.4 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.text

51.0 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.tsv

59.0 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.txt

65.6 KB

The Only Way to Tell the Truth is in Fiction by Richard Thieme.eng.vtt

65.6 KB

Wireless security testing with attack by Keiichi Horiai.eng.json

2.1 MB

Wireless security testing with attack by Keiichi Horiai.eng.lrc

46.4 KB

Wireless security testing with attack by Keiichi Horiai.eng.srt

52.9 KB

Wireless security testing with attack by Keiichi Horiai.eng.text

32.2 KB

Wireless security testing with attack by Keiichi Horiai.eng.tsv

40.6 KB

Wireless security testing with attack by Keiichi Horiai.eng.txt

47.0 KB

Wireless security testing with attack by Keiichi Horiai.eng.vtt

47.0 KB

CODE BLUE 2016/

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4

43.9 MB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4

48.0 MB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4

81.7 MB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4

39.2 MB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4

46.1 MB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4

42.8 MB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4

39.8 MB

Be a Binary Rockstar by Sophia DAntoine.mp4

33.4 MB

COFI break by Ron Shina & Shlomi Oberman.mp4

34.7 MB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4

38.5 MB

DVB-T Hacking by Amihai Neiderman.mp4

24.5 MB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4

41.9 MB

Esoteric Web Application Vulnerabilities by Andres Riancho.mp4

59.1 MB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4

51.1 MB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4

55.0 MB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4

36.3 MB

Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4

52.7 MB

Keynote - How much security is too much by Karsten Nohl.mp4

49.5 MB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4

57.4 MB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.mp4

66.2 MB

The ARMs race for kernel protection by Jonathan​ ​Levin.mp4

61.3 MB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4

54.3 MB

Who put the backdoor in my modem by Ewerson Guimaraes.mp4

48.5 MB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4

50.8 MB

/.../CODE BLUE 2016 captions/

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.json

1.3 MB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.lrc

32.4 KB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.srt

36.3 KB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.text

23.8 KB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.tsv

28.8 KB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.txt

32.8 KB

(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.eng.vtt

32.8 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.json

3.0 MB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.lrc

75.9 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.srt

84.6 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.text

56.6 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.tsv

67.9 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.txt

76.6 KB

About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.eng.vtt

76.6 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.json

2.3 MB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.lrc

51.5 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.srt

56.1 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.text

41.3 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.tsv

47.3 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.txt

51.9 KB

Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.eng.vtt

51.9 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.json

2.2 MB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.lrc

41.6 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.srt

46.5 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.text

30.6 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.tsv

37.0 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.txt

42.0 KB

Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.eng.vtt

42.0 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.json

2.2 MB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.lrc

53.1 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.srt

58.3 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.text

41.6 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.tsv

48.3 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.txt

53.6 KB

Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.eng.vtt

53.6 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.json

1.5 MB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.lrc

39.2 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.srt

43.2 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.text

30.2 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.tsv

35.4 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.txt

39.5 KB

ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.eng.vtt

39.5 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.json

1.4 MB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.lrc

32.8 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.srt

36.1 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.text

25.4 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.tsv

29.7 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.txt

33.1 KB

Background Story of - Operation neutralizing banking malware - by Kazuki Takada.eng.vtt

33.1 KB

Be a Binary Rockstar by Sophia DAntoine.eng.json

1.3 MB

Be a Binary Rockstar by Sophia DAntoine.eng.lrc

33.3 KB

Be a Binary Rockstar by Sophia DAntoine.eng.srt

37.1 KB

Be a Binary Rockstar by Sophia DAntoine.eng.text

24.8 KB

Be a Binary Rockstar by Sophia DAntoine.eng.tsv

29.7 KB

Be a Binary Rockstar by Sophia DAntoine.eng.txt

33.6 KB

Be a Binary Rockstar by Sophia DAntoine.eng.vtt

33.6 KB

COFI break by Ron Shina & Shlomi Oberman.eng.json

1.1 MB

COFI break by Ron Shina & Shlomi Oberman.eng.lrc

25.5 KB

COFI break by Ron Shina & Shlomi Oberman.eng.srt

27.8 KB

COFI break by Ron Shina & Shlomi Oberman.eng.text

20.4 KB

COFI break by Ron Shina & Shlomi Oberman.eng.tsv

23.3 KB

COFI break by Ron Shina & Shlomi Oberman.eng.txt

25.7 KB

COFI break by Ron Shina & Shlomi Oberman.eng.vtt

25.7 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.json

2.8 MB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.lrc

46.3 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.srt

51.6 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.text

34.6 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.tsv

41.4 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.txt

46.7 KB

DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.eng.vtt

46.7 KB

DVB-T Hacking by Amihai Neiderman.eng.json

1.3 MB

DVB-T Hacking by Amihai Neiderman.eng.lrc

33.0 KB

DVB-T Hacking by Amihai Neiderman.eng.srt

37.2 KB

DVB-T Hacking by Amihai Neiderman.eng.text

23.6 KB

DVB-T Hacking by Amihai Neiderman.eng.tsv

29.0 KB

DVB-T Hacking by Amihai Neiderman.eng.txt

33.3 KB

DVB-T Hacking by Amihai Neiderman.eng.vtt

33.3 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.json

1.7 MB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.lrc

35.3 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.srt

39.4 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.text

26.4 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.tsv

31.6 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.txt

35.7 KB

Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.eng.vtt

35.7 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.json

1.6 MB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.lrc

38.6 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.srt

42.9 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.text

28.9 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.tsv

34.6 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.txt

39.0 KB

Esoteric Web Application Vulnerabilities by Andres Riancho.eng.vtt

39.0 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.json

1.4 MB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.lrc

32.3 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.srt

36.9 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.text

22.0 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.tsv

27.9 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.txt

32.7 KB

EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.eng.vtt

32.7 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.json

1.8 MB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.lrc

42.5 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.srt

46.3 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.text

33.9 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.tsv

38.9 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.txt

42.8 KB

Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.eng.vtt

42.8 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.json

1.2 MB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.lrc

23.9 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.srt

26.7 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.text

17.6 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.tsv

21.2 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.txt

24.2 KB

House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.eng.vtt

24.2 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.json

2.2 MB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.lrc

51.9 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.srt

56.9 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.text

40.8 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.tsv

47.3 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.txt

52.4 KB

Keynote - Digital Society - e-Estonia - by Anna Piperal.eng.vtt

52.4 KB

Keynote - How much security is too much by Karsten Nohl.eng.json

1.9 MB

Keynote - How much security is too much by Karsten Nohl.eng.lrc

45.3 KB

Keynote - How much security is too much by Karsten Nohl.eng.srt

49.9 KB

Keynote - How much security is too much by Karsten Nohl.eng.text

35.1 KB

Keynote - How much security is too much by Karsten Nohl.eng.tsv

41.0 KB

Keynote - How much security is too much by Karsten Nohl.eng.txt

45.7 KB

Keynote - How much security is too much by Karsten Nohl.eng.vtt

45.7 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.json

1.8 MB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.lrc

39.6 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.srt

44.2 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.text

29.4 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.tsv

35.4 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.txt

40.0 KB

Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.eng.vtt

40.0 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.json

2.2 MB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.lrc

55.4 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.srt

61.6 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.text

41.8 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.tsv

49.8 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.txt

55.9 KB

PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.eng.vtt

55.9 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.json

2.7 MB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.lrc

61.2 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.srt

66.6 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.text

49.3 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.tsv

56.3 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.txt

61.7 KB

The ARMs race for kernel protection by Jonathan​ ​Levin.eng.vtt

61.7 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.json

1.3 MB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.lrc

34.9 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.srt

38.9 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.text

26.0 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.tsv

31.2 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.txt

35.3 KB

Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.eng.vtt

35.3 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.json

1.4 MB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.lrc

36.0 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.srt

41.3 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.text

24.3 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.tsv

31.1 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.txt

36.4 KB

Who put the backdoor in my modem by Ewerson Guimaraes.eng.vtt

36.4 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.json

2.1 MB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.lrc

51.8 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.srt

57.4 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.text

39.5 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.tsv

46.7 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.txt

52.3 KB

WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.eng.vtt

52.3 KB

CODE BLUE 2017/

(In)Security of Japanese IT Asset Management Software.mp4

53.8 MB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4

43.7 MB

Androsia - A step ahead in securing in-memory Android application data.mp4

50.1 MB

Detection index learning based on cyber threat intelligence and its application.mp4

40.9 MB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4

46.7 MB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4

1.7 MB

George Hotz - Keynote - Make your car self-driving using open-source software.mp4

66.8 MB

Industroyer - biggest threat to industrial control systems since Stuxnet.mp4

33.3 MB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4

50.4 MB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4

58.1 MB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4

66.2 MB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4

52.4 MB

Possibility of arbitrary code execution by Step-Oriented Programming.mp4

48.2 MB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4

65.1 MB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4

49.7 MB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4

56.2 MB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4

41.5 MB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4

39.1 MB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4

49.0 MB

/.../CODE BLUE 2017 captions/

(In)Security of Japanese IT Asset Management Software.eng.json

1.9 MB

(In)Security of Japanese IT Asset Management Software.eng.lrc

42.1 KB

(In)Security of Japanese IT Asset Management Software.eng.srt

46.8 KB

(In)Security of Japanese IT Asset Management Software.eng.text

31.6 KB

(In)Security of Japanese IT Asset Management Software.eng.tsv

37.8 KB

(In)Security of Japanese IT Asset Management Software.eng.txt

42.5 KB

(In)Security of Japanese IT Asset Management Software.eng.vtt

42.5 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.json

1.4 MB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.lrc

37.0 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.srt

42.1 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.text

25.8 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.tsv

32.4 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.txt

37.5 KB

A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.eng.vtt

37.5 KB

Androsia - A step ahead in securing in-memory Android application data.eng.json

1.8 MB

Androsia - A step ahead in securing in-memory Android application data.eng.lrc

45.2 KB

Androsia - A step ahead in securing in-memory Android application data.eng.srt

49.9 KB

Androsia - A step ahead in securing in-memory Android application data.eng.text

34.8 KB

Androsia - A step ahead in securing in-memory Android application data.eng.tsv

40.9 KB

Androsia - A step ahead in securing in-memory Android application data.eng.txt

45.6 KB

Androsia - A step ahead in securing in-memory Android application data.eng.vtt

45.6 KB

Detection index learning based on cyber threat intelligence and its application.eng.json

1.5 MB

Detection index learning based on cyber threat intelligence and its application.eng.lrc

30.5 KB

Detection index learning based on cyber threat intelligence and its application.eng.srt

34.6 KB

Detection index learning based on cyber threat intelligence and its application.eng.text

21.3 KB

Detection index learning based on cyber threat intelligence and its application.eng.tsv

26.6 KB

Detection index learning based on cyber threat intelligence and its application.eng.txt

30.8 KB

Detection index learning based on cyber threat intelligence and its application.eng.vtt

30.8 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.json

2.2 MB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.lrc

48.9 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.srt

53.1 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.text

39.6 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.tsv

45.1 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.txt

49.2 KB

For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.eng.vtt

49.3 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.json

25.7 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.lrc

0.8 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.srt

0.9 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.text

0.5 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.tsv

0.6 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.txt

0.8 KB

Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.eng.vtt

0.8 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.json

2.1 MB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.lrc

53.9 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.srt

62.2 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.text

35.7 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.tsv

46.3 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.txt

54.6 KB

George Hotz - Keynote - Make your car self-driving using open-source software.eng.vtt

54.6 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.json

1.5 MB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.lrc

28.0 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.srt

30.7 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.text

21.8 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.tsv

25.3 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.txt

28.2 KB

Industroyer - biggest threat to industrial control systems since Stuxnet.eng.vtt

28.2 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.json

1.4 MB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.lrc

30.8 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.srt

34.8 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.text

22.0 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.tsv

27.1 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.txt

31.2 KB

Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.eng.vtt

31.2 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.json

1.5 MB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.lrc

38.7 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.srt

43.2 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.text

28.9 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.tsv

34.7 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.txt

39.1 KB

LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.eng.vtt

39.1 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.json

2.0 MB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.lrc

49.3 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.srt

53.1 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.text

40.9 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.tsv

45.9 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.txt

49.6 KB

National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.eng.vtt

49.6 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.json

1.8 MB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.lrc

48.9 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.srt

55.5 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.text

34.5 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.tsv

42.9 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.txt

49.5 KB

Ory Segal - Passive Fingerprinting of HTTP 2 Clients.eng.vtt

49.5 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.json

1.9 MB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.lrc

39.6 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.srt

43.5 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.text

31.0 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.tsv

36.1 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.txt

39.9 KB

Possibility of arbitrary code execution by Step-Oriented Programming.eng.vtt

39.9 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.json

1.7 MB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.lrc

40.2 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.srt

44.3 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.text

31.1 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.tsv

36.5 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.txt

40.6 KB

PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.eng.vtt

40.6 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.json

1.9 MB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.lrc

40.7 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.srt

45.5 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.text

30.3 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.tsv

36.4 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.txt

41.1 KB

Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.eng.vtt

41.2 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.json

1.5 MB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.lrc

28.3 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.srt

30.8 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.text

22.7 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.tsv

26.0 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.txt

28.5 KB

Take a Jailbreak -Stunning Guards for iOS Jailbreak.eng.vtt

28.5 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.json

1.5 MB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.lrc

38.9 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.srt

43.0 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.text

29.8 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.tsv

35.1 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.txt

39.2 KB

The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.eng.vtt

39.3 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.json

1.7 MB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.lrc

36.1 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.srt

40.8 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.text

25.7 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.tsv

31.7 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.txt

36.5 KB

吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.eng.vtt

36.5 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.json

1.6 MB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.lrc

36.9 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.srt

41.8 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.text

26.1 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.tsv

32.4 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.txt

37.3 KB

確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.eng.vtt

37.3 KB

CODE BLUE 2018/

A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4

82.9 MB

Are You Trading Stocks Securely by Alejandro Hernandez.mp4

66.3 MB

BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4

13.8 MB

CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4

39.6 MB

Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4

50.3 MB

Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4

38.9 MB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4

63.2 MB

Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4

45.7 MB

From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4

39.8 MB

Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4

49.9 MB

GLitch hammering your phone through WebGL by Pietro Frigo.mp4

52.3 MB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4

67.5 MB

INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4

33.4 MB

Keynote Cyber Arms Race by Mikko Hyppönen.mp4

89.9 MB

Keynote Power, Patience, and Persistence by Kenneth Geers.mp4

57.6 MB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4

58.3 MB

Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4

46.8 MB

Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4

46.1 MB

Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4

59.8 MB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4

60.8 MB

Privacy by Design Methodology by Vanessa Henri.mp4

39.5 MB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4

22.0 MB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4

40.5 MB

Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4

52.7 MB

Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4

35.5 MB

Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4

49.1 MB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4

41.5 MB

The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4

86.2 MB

The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4

60.8 MB

Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4

49.0 MB

WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4

60.4 MB

Who's guarding the gateway - by Nicole Beckwith.mp4

30.3 MB

Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4

43.6 MB

/.../CODE BLUE 2018 captions/

A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt

77.5 KB

Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt

60.2 KB

BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt

56.0 KB

CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt

59.3 KB

Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt

93.0 KB

Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt

60.0 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.json

2.2 MB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.lrc

45.4 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.srt

50.5 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.text

34.1 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.tsv

40.8 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.txt

45.9 KB

Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.eng.vtt

45.9 KB

Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt

40.1 KB

From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt

48.9 KB

Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt

47.7 KB

GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt

68.3 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.json

1.6 MB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.lrc

37.0 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.srt

40.6 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.text

29.0 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.tsv

33.7 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.txt

37.3 KB

How to hack SD-WAN and keep your sanity by Sergey Goreychik.eng.vtt

37.3 KB

INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt

47.8 KB

Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt

77.3 KB

Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt

55.9 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.json

1.6 MB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.lrc

37.3 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.srt

42.0 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.text

27.1 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.tsv

33.1 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.txt

37.7 KB

LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.eng.vtt

37.7 KB

Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt

51.2 KB

Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt

61.0 KB

Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt

53.7 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.json

1.7 MB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.lrc

43.6 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.srt

49.0 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.text

31.9 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.tsv

38.8 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.txt

44.1 KB

Practical method and practice of OSINT for cyber defense by Ataru Ishii.eng.vtt

44.1 KB

Privacy by Design Methodology by Vanessa Henri.eng.srt

58.2 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.json

535.9 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.lrc

14.7 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.srt

16.6 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.text

10.4 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.tsv

12.7 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.txt

14.9 KB

RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.eng.vtt

14.9 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.json

1.2 MB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.lrc

27.9 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.srt

31.3 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.text

20.1 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.tsv

24.6 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.txt

28.2 KB

Reading the norms of cyberspace - by Koichiro Sparky Komiyama.eng.vtt

28.2 KB

Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt

64.2 KB

Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt

51.9 KB

Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt

46.9 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.json

1.3 MB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.lrc

29.4 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.srt

32.9 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.text

21.5 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.tsv

26.1 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.txt

29.7 KB

The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.eng.vtt

29.7 KB

The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt

79.9 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.json

1.8 MB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.lrc

38.4 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.srt

43.1 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.text

28.0 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.tsv

34.0 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.txt

38.8 KB

The Mystery of WannaCry Mutants - by Makoto Iwamura.eng.vtt

38.8 KB

Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt

50.8 KB

WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt

69.7 KB

Who's guarding the gateway - by Nicole Beckwith.eng.srt

39.1 KB

Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt

39.1 KB

CODE BLUE 2019/

[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4

25.6 MB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4

22.7 MB

Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4

47.2 MB

Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4

37.6 MB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4

17.7 MB

Coinbase and the Firefox 0-day by Philip Martin.mp4

41.9 MB

Hardware Wallet Security by Sergei Volokitin.mp4

40.9 MB

Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4

70.1 MB

KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4

48.0 MB

KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4

68.8 MB

Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4

46.4 MB

Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4

32.7 MB

MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4

15.7 MB

Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4

42.5 MB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4

38.2 MB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4

49.8 MB

Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4

56.6 MB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4

55.7 MB

Wifi sniffing with the WifiKraken by Mike Spicer.mp4

62.3 MB

/.../CODE BLUE 2019 captions/

[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt

24.4 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.json

1.0 MB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.lrc

22.9 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.srt

25.4 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.text

17.4 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.tsv

20.5 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.txt

23.2 KB

[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.eng.vtt

23.2 KB

Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt

59.0 KB

Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt

44.5 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.json

739.4 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.lrc

15.7 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.srt

17.7 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.text

11.2 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.tsv

13.7 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.txt

15.9 KB

Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.eng.vtt

15.9 KB

Coinbase and the Firefox 0-day by Philip Martin.eng.srt

55.4 KB

Hardware Wallet Security by Sergei Volokitin.eng.srt

62.5 KB

Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt

80.5 KB

KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt

54.6 KB

KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt

85.1 KB

Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt

35.8 KB

Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt

43.9 KB

MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt

17.4 KB

Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt

49.9 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.json

1.2 MB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.lrc

29.5 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.srt

32.6 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.text

22.4 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.tsv

26.5 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.txt

29.8 KB

Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.eng.vtt

29.8 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.json

1.4 MB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.lrc

33.5 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.srt

39.1 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.text

20.9 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.tsv

28.2 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.txt

33.9 KB

Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.eng.vtt

34.0 KB

Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt

59.4 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.json

941.1 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.lrc

21.6 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.srt

24.3 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.text

15.4 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.tsv

18.9 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.txt

21.8 KB

tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.eng.vtt

21.8 KB

Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt

67.7 KB

CODE BLUE 2020/

Alliance power for Cyber Security.mp4

14.8 MB

Apk-medit memory search and patch tool for APK without root & android NDK.mp4

9.8 MB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4

17.9 MB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4

15.8 MB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4

15.4 MB

Defending Computer CriminalsPresented - Andrea Monti.mp4

16.0 MB

Dissecting China’s Information Operations with Threat Intelligence.mp4

23.5 MB

Don't Be Silly - It's Only a Lightbulb.mp4

130.1 MB

Drones' Cryptanalysis - Detecting Spying Drones.mp4

24.4 MB

Ethereum 2.0のセキュリティ.mp4

17.4 MB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4

21.5 MB

Hunting kernel exploits with filesystem fuzzer.mp4

19.7 MB

Illicit QQ Communities What's Being Shared.mp4

16.5 MB

It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4

29.2 MB

Keynote1 - Ms. Audrey Guinchard.mp4

21.9 MB

Keynote2 - Practical and Intelligent Incident Response Planning.mp4

29.1 MB

Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4

31.6 MB

Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4

23.0 MB

Law Enforcement Access to Transborder.mp4

34.3 MB

Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4

25.5 MB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4

26.6 MB

Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4

27.3 MB

Operation I am Tom How APT actors move laterally in corporate networks.mp4

27.3 MB

Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4

24.8 MB

Reflex you give me a parser, I give you a token generator.mp4

22.8 MB

Reverse Engineering archeology.mp4

32.4 MB

SOARによるセキュリティ監視業務の効率化とSecOps.mp4

20.4 MB

Speccial Session - Digital Social Innovation.mp4

56.6 MB

Vulnerabilities of Machine Learning Infrastructure.mp4

24.1 MB

Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4

30.2 MB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4

23.2 MB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4

21.8 MB

説明可能な悪性ドメイン診断.mp4

27.8 MB

/.../CODE BLUE 2020 captions/

Alliance power for Cyber Security.eng.srt

23.3 KB

Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt

15.1 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.json

995.9 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.lrc

25.5 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.srt

27.9 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.text

20.0 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.tsv

23.1 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.txt

25.7 KB

Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.eng.vtt

25.7 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.json

578.5 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.lrc

15.0 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.srt

16.7 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.text

11.2 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.tsv

13.3 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.txt

15.2 KB

Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.eng.vtt

15.2 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.json

739.4 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.lrc

17.8 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.srt

19.8 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.text

13.1 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.tsv

15.6 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.txt

17.9 KB

DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.eng.vtt

18.0 KB

Defending Computer CriminalsPresented - Andrea Monti.eng.srt

38.3 KB

Dissecting China’s Information Operations with Threat Intelligence.eng.srt

36.2 KB

Don't Be Silly - It's Only a Lightbulb.eng.srt

49.2 KB

Drones' Cryptanalysis - Detecting Spying Drones.eng.srt

48.6 KB

Ethereum 2.0のセキュリティ.eng.json

841.0 KB

Ethereum 2.0のセキュリティ.eng.lrc

21.1 KB

Ethereum 2.0のセキュリティ.eng.srt

23.5 KB

Ethereum 2.0のセキュリティ.eng.text

15.7 KB

Ethereum 2.0のセキュリティ.eng.tsv

18.7 KB

Ethereum 2.0のセキュリティ.eng.txt

21.3 KB

Ethereum 2.0のセキュリティ.eng.vtt

21.3 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.json

1.3 MB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.lrc

27.7 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.srt

30.4 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.text

21.6 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.tsv

25.0 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.txt

27.9 KB

Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.eng.vtt

27.9 KB

Hunting kernel exploits with filesystem fuzzer.eng.srt

31.6 KB

Illicit QQ Communities What's Being Shared.eng.srt

39.8 KB

It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt

43.4 KB

Keynote1 - Ms. Audrey Guinchard.eng.srt

40.5 KB

Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt

47.5 KB

Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt

52.9 KB

Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt

47.7 KB

Law Enforcement Access to Transborder.eng.srt

49.1 KB

Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt

41.4 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.json

967.3 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.lrc

22.3 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.srt

24.7 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.text

16.7 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.tsv

19.8 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.txt

22.5 KB

LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.eng.vtt

22.5 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.json

1.1 MB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.lrc

28.0 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.srt

31.2 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.text

21.1 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.tsv

25.1 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.txt

28.3 KB

Operation Chimera - APT Operation Targets Semiconductor Vendors.eng.vtt

28.3 KB

Operation I am Tom How APT actors move laterally in corporate networks.eng.srt

43.1 KB

Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt

38.6 KB

Reflex you give me a parser, I give you a token generator.eng.srt

44.1 KB

Reverse Engineering archeology.eng.json

1.2 MB

Reverse Engineering archeology.eng.lrc

30.3 KB

Reverse Engineering archeology.eng.srt

33.2 KB

Reverse Engineering archeology.eng.text

23.7 KB

Reverse Engineering archeology.eng.tsv

27.4 KB

Reverse Engineering archeology.eng.txt

30.5 KB

Reverse Engineering archeology.eng.vtt

30.5 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.json

1.0 MB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.lrc

22.5 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.srt

24.8 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.text

17.3 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.tsv

20.2 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.txt

22.7 KB

SOARによるセキュリティ監視業務の効率化とSecOps.eng.vtt

22.7 KB

Speccial Session - Digital Social Innovation.eng.srt

44.5 KB

Vulnerabilities of Machine Learning Infrastructure.eng.json

931.2 KB

Vulnerabilities of Machine Learning Infrastructure.eng.lrc

24.1 KB

Vulnerabilities of Machine Learning Infrastructure.eng.srt

26.6 KB

Vulnerabilities of Machine Learning Infrastructure.eng.text

18.4 KB

Vulnerabilities of Machine Learning Infrastructure.eng.tsv

21.6 KB

Vulnerabilities of Machine Learning Infrastructure.eng.txt

24.3 KB

Vulnerabilities of Machine Learning Infrastructure.eng.vtt

24.3 KB

Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt

46.5 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.json

1.0 MB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.lrc

22.1 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.srt

24.3 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.text

17.0 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.tsv

19.8 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.txt

22.3 KB

サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.eng.vtt

22.3 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.json

1.0 MB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.lrc

23.6 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.srt

25.8 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.text

18.4 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.tsv

21.3 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.txt

23.7 KB

虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.eng.vtt

23.8 KB

説明可能な悪性ドメイン診断.eng.json

1.3 MB

説明可能な悪性ドメイン診断.eng.lrc

28.1 KB

説明可能な悪性ドメイン診断.eng.srt

30.8 KB

説明可能な悪性ドメイン診断.eng.text

22.1 KB

説明可能な悪性ドメイン診断.eng.tsv

25.5 KB

説明可能な悪性ドメイン診断.eng.txt

28.4 KB

説明可能な悪性ドメイン診断.eng.vtt

28.4 KB

CODE BLUE 2021/

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4

47.6 MB

Day1 Closing.mp4

5.9 MB

Day1 Opening.mp4

7.7 MB

Day2 Event Closing.mp4

42.4 MB

Day2 Online Closing.mp4

7.9 MB

Day2 Opening.mp4

23.7 MB

Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4

35.9 MB

Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4

40.0 MB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4

31.5 MB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4

37.9 MB

NAS as Not As Secure.mp4

23.1 MB

Non-Private Chat Police investigation legislation in the flat world.mp4

36.5 MB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4

25.0 MB

ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4

42.2 MB

The Lazarus Group's Attack Operations Targeting Japan.mp4

46.7 MB

The security thing - Knowledge, skills, and two more things.mp4

92.6 MB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4

43.9 MB

/.../CODE BLUE 2021 captions/

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.json

1.7 MB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.lrc

39.8 KB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.srt

43.5 KB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.text

31.4 KB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.tsv

36.3 KB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.txt

40.1 KB

Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.eng.vtt

40.1 KB

Day1 Closing.eng.json

76.8 KB

Day1 Closing.eng.lrc

2.1 KB

Day1 Closing.eng.srt

2.5 KB

Day1 Closing.eng.text

1.3 KB

Day1 Closing.eng.tsv

1.7 KB

Day1 Closing.eng.txt

2.2 KB

Day1 Closing.eng.vtt

2.2 KB

Day1 Opening.eng.json

290.4 KB

Day1 Opening.eng.lrc

7.9 KB

Day1 Opening.eng.srt

9.2 KB

Day1 Opening.eng.text

5.1 KB

Day1 Opening.eng.tsv

6.6 KB

Day1 Opening.eng.txt

8.0 KB

Day1 Opening.eng.vtt

8.1 KB

Day2 Event Closing.eng.json

410.4 KB

Day2 Event Closing.eng.lrc

9.9 KB

Day2 Event Closing.eng.srt

11.2 KB

Day2 Event Closing.eng.text

6.8 KB

Day2 Event Closing.eng.tsv

8.4 KB

Day2 Event Closing.eng.txt

10.0 KB

Day2 Event Closing.eng.vtt

10.0 KB

Day2 Online Closing.eng.json

202.2 KB

Day2 Online Closing.eng.lrc

5.0 KB

Day2 Online Closing.eng.srt

5.5 KB

Day2 Online Closing.eng.text

3.7 KB

Day2 Online Closing.eng.tsv

4.4 KB

Day2 Online Closing.eng.txt

5.0 KB

Day2 Online Closing.eng.vtt

5.0 KB

Day2 Opening.eng.json

241.7 KB

Day2 Opening.eng.lrc

5.9 KB

Day2 Opening.eng.srt

6.9 KB

Day2 Opening.eng.text

3.8 KB

Day2 Opening.eng.tsv

4.9 KB

Day2 Opening.eng.txt

6.0 KB

Day2 Opening.eng.vtt

6.0 KB

Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt

41.5 KB

Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt

51.8 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.json

1.1 MB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.lrc

25.0 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.srt

28.3 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.text

17.8 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.tsv

21.9 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.txt

25.3 KB

Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.eng.vtt

25.3 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.json

1.2 MB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.lrc

23.8 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.srt

26.6 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.text

17.7 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.tsv

21.1 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.txt

24.1 KB

MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.eng.vtt

24.1 KB

NAS as Not As Secure.eng.srt

51.6 KB

Non-Private Chat Police investigation legislation in the flat world.eng.srt

49.4 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.json

1.1 MB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.lrc

25.7 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.srt

28.2 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.text

20.1 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.tsv

23.4 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.txt

26.0 KB

Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.eng.vtt

26.0 KB

ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt

58.5 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.json

1.5 MB

The Lazarus Group's Attack Operations Targeting Japan.eng.lrc

35.4 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.srt

38.9 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.text

27.5 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.tsv

32.0 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.txt

35.7 KB

The Lazarus Group's Attack Operations Targeting Japan.eng.vtt

35.7 KB

The security thing - Knowledge, skills, and two more things.eng.json

2.8 MB

The security thing - Knowledge, skills, and two more things.eng.lrc

62.2 KB

The security thing - Knowledge, skills, and two more things.eng.srt

70.9 KB

The security thing - Knowledge, skills, and two more things.eng.text

42.6 KB

The security thing - Knowledge, skills, and two more things.eng.tsv

54.0 KB

The security thing - Knowledge, skills, and two more things.eng.txt

62.9 KB

The security thing - Knowledge, skills, and two more things.eng.vtt

62.9 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.json

1.9 MB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.lrc

41.4 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.srt

45.4 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.text

32.6 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.tsv

37.7 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.txt

41.8 KB

Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.eng.vtt

41.8 KB

CODE BLUE 2022/

「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4

124.6 MB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.mp4

19.6 MB

Closing adddress.mp4

103.0 MB

CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4

42.0 MB

Fight Against Malware Development Life Cycle.mp4

47.6 MB

From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4

49.7 MB

Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4

44.8 MB

Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4

18.2 MB

KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4

53.6 MB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4

53.1 MB

Opening.mp4

30.7 MB

Red light in the factory - From 0 to 100 OT adversary emulation.mp4

35.8 MB

Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4

60.9 MB

Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4

49.6 MB

SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4

40.2 MB

Tales of 5G hacking.mp4

77.8 MB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.mp4

124.5 MB

Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4

44.2 MB

Under the hood of Wslink’s multilayered virtual machine.mp4

31.7 MB

What I learned from the direct confrontation with the adversaries who hid C&C server.mp4

44.7 MB

Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4

30.2 MB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4

42.3 MB

/.../CODE BLUE 2022 captions/

「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt

86.2 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.json

706.9 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.lrc

16.2 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.srt

17.7 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.text

12.5 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.tsv

14.5 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.txt

16.3 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded.eng.vtt

16.3 KB

Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt

29.3 KB

Closing adddress.eng.srt

34.4 KB

CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt

41.8 KB

Fight Against Malware Development Life Cycle.eng.srt

56.6 KB

From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt

54.1 KB

Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt

40.9 KB

Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt

23.9 KB

KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt

81.6 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.json

1.1 MB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.lrc

29.4 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.srt

32.7 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.text

21.9 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.tsv

26.2 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.txt

29.6 KB

Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.eng.vtt

29.7 KB

Opening.eng.srt

14.1 KB

Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt

40.3 KB

Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt

74.5 KB

Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt

77.0 KB

SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt

50.5 KB

Tales of 5G hacking.eng.srt

67.9 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.json

2.0 MB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.lrc

50.6 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.srt

56.1 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.text

38.5 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.tsv

45.7 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.txt

51.1 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss.eng.vtt

51.1 KB

The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt

85.5 KB

Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt

48.0 KB

Under the hood of Wslink’s multilayered virtual machine.eng.srt

43.9 KB

What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt

66.0 KB

Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt

61.4 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.json

1.1 MB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.lrc

28.6 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.srt

32.0 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.text

21.1 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.tsv

25.4 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.txt

28.9 KB

Your Printer is not your Printer - Hacking Printers at Pwn2Own.eng.vtt

28.9 KB

CODE BLUE 2023/

A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4

55.0 MB

BSides Tokyo 2024.mp4

56.4 MB

Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4

42.9 MB

Closing Keynote Cyber and Security in Times of War.mp4

36.2 MB

Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4

27.4 MB

Digital sovereignty - shaping regulatory responses to technological dominance.mp4

41.9 MB

Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4

24.9 MB

filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4

35.0 MB

Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4

47.1 MB

International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4

66.9 MB

KeynoteIf It's Smart, It's Vulnerable.mp4

75.5 MB

Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4

41.0 MB

Open Sesame The full story behind opening a smart lock.mp4

40.4 MB

OSBT OpenID Connect Scenario-Based Tester.mp4

47.8 MB

Pennywise - Invisible privacy risk in the new AI era.mp4

39.8 MB

Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4

45.4 MB

Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4

22.5 MB

stelftools cross-architecture static library detector for IoT malware.mp4

58.8 MB

The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4

31.0 MB

The Renaissance of Cyber Physical Offensive Capabilities.mp4

40.6 MB

Unlocking the Drive Exploiting Tesla Model 3.mp4

41.4 MB

Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4

54.0 MB

/.../CODE BLUE 20123 captions/

A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt

55.2 KB

BSides Tokyo 2024.eng.srt

42.2 KB

Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt

69.3 KB

Closing Keynote Cyber and Security in Times of War.eng.srt

57.0 KB

Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt

52.3 KB

Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt

61.8 KB

Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt

42.7 KB

filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt

50.0 KB

Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt

61.7 KB

International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt

62.7 KB

KeynoteIf It's Smart, It's Vulnerable.eng.srt

66.5 KB

Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt

56.5 KB

Open Sesame The full story behind opening a smart lock.eng.srt

47.9 KB

OSBT OpenID Connect Scenario-Based Tester.eng.srt

55.0 KB

Pennywise - Invisible privacy risk in the new AI era.eng.srt

53.9 KB

Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt

68.1 KB

Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt

34.1 KB

stelftools cross-architecture static library detector for IoT malware.eng.srt

64.6 KB

The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt

55.8 KB

The Renaissance of Cyber Physical Offensive Capabilities.eng.srt

75.0 KB

Unlocking the Drive Exploiting Tesla Model 3.eng.srt

47.9 KB

Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt

60.5 KB

CODE BLUE 2024/

1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.mp4

31.3 MB

Abusing legacy railroad signaling systems.mp4

33.6 MB

Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.mp4

50.0 MB

Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.mp4

29.6 MB

BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.mp4

61.5 MB

Defeating PlayStation 5 network encryption.mp4

31.7 MB

Did Subdomain Abuse by BlackTech Evolve.mp4

39.4 MB

EchidnaTermApp: ペネトレーションテスト支援・学習ツール.mp4

37.0 MB

Event Tracing for Windows Internals.mp4

60.8 MB

From Snowflake to SnowstormNavigating Breaches and Detections.mp4

32.1 MB

Hacking Google - Lessons learned running and growing an internal red team.mp4

33.4 MB

IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.mp4

42.1 MB

Keynote AI for formal verification - formal verification for AI.mp4

60.7 MB

Modern SOCLess Than One and More Than Infinity.mp4

44.7 MB

NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.mp4

24.9 MB

NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.mp4

46.7 MB

Piloting Edge Copilot.mp4

27.9 MB

PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.mp4

38.9 MB

Proxying to KernelStreaming vulnerabilities from Windows Kernel.mp4

31.9 MB

SBOM and Security Transparency - How it all fits together.mp4

24.1 MB

V for VendettaDissecting a Global Phishing Platform After Being Phished.mp4

34.2 MB

WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.mp4

41.3 MB

/.../CODE BLUE 2024 captions/

1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.eng.srt

45.6 KB

Abusing legacy railroad signaling systems.eng.srt

39.1 KB

Attention Is All You Need for Semantics DetectionA Novel Transformer on Neural.eng.srt

60.7 KB

Behind Enemy LinesEngaging and Disrupting Ransomware Web Panels.eng.srt

50.5 KB

BullyRAGA Multi-Perspective RAG Robustness Evaluation Framework.eng.srt

72.5 KB

Defeating PlayStation 5 network encryption.eng.srt

57.3 KB

Did Subdomain Abuse by BlackTech Evolve.eng.srt

50.4 KB

EchidnaTermApp: ペネトレーションテスト支援・学習ツール.eng.srt

42.6 KB

Event Tracing for Windows Internals.eng.srt

58.2 KB

From Snowflake to SnowstormNavigating Breaches and Detections.eng.srt

71.3 KB

Hacking Google - Lessons learned running and growing an internal red team.eng.srt

60.7 KB

IDA - Ghidraによるアンチデバッグの自動検出とサポート機能によるデバッグプロセスの効率化.eng.srt

49.4 KB

Keynote AI for formal verification - formal verification for AI.eng.srt

85.5 KB

Modern SOCLess Than One and More Than Infinity.eng.srt

33.8 KB

NGateNovel Android malware for unauthorized ATM withdrawals via NFC relay.eng.srt

35.7 KB

NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool.eng.srt

47.3 KB

Piloting Edge Copilot.eng.srt

46.6 KB

PkgFuzzプロジェクト オープンソースソフトウェアのための新たな継続的ファジング.eng.srt

60.2 KB

Proxying to KernelStreaming vulnerabilities from Windows Kernel.eng.srt

54.8 KB

SBOM and Security Transparency - How it all fits together.eng.srt

36.9 KB

V for VendettaDissecting a Global Phishing Platform After Being Phished.eng.srt

49.3 KB

WebAssembly Is All You NeedExploiting Chrome and the V8 Sandbox 10 times with WASM.eng.srt

74.1 KB

 

Total files 1202


Copyright © 2026 FileMood.com