FileMood

Download CODE BLUE

CODE BLUE

Name

CODE BLUE

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

6.6 GB

Total Files

97

Hash

A0ED08FE81BA2CD6885B822C3A4DDA154DF32368

/CODE BLUE 2013/

CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4

93.7 MB

CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4

94.1 MB

CodeBlue01 HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4

43.8 MB

CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4

75.1 MB

CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4

104.1 MB

CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4

121.3 MB

CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4

104.5 MB

CodeBlue01 Preventing hard disk firmware manipulation attack and disaster recovery.mp4

65.2 MB

CodeBlue01 SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4

49.6 MB

CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4

97.8 MB

CodeBlue01 libinjection from SQLi to XSS by Nick Galbreath.mp4

43.9 MB

CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4

103.2 MB

CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4

80.7 MB

/CODE BLUE 2014 (2014 12 18-19)/

CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4

90.8 MB

CODE BLUE 2014 David Jacoby - How I Hacked My Home.mp4

63.1 MB

CODE BLUE 2014 David Seidman - Microsoft Vulnerability Research How to be a Finder as a Vendor.mp4

57.5 MB

CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4

96.3 MB

CODE BLUE 2014 Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4

35.2 MB

CODE BLUE 2014 Ilfak Guilfanov - Keynote The story of IDA Pro.mp4

55.2 MB

CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4

106.3 MB

CODE BLUE 2014 Kuniyasu Suzaki - DeviceDisEnabler.mp4

69.8 MB

CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4

98.7 MB

CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4

72.9 MB

/CODE BLUE 2015 (2015 10 28-29)/

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4

93.2 MB

(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.srt

76.1 KB

A new exploitation method to bypass stack canaries by Yuki Koike - CODE BLUE 2015.mp4

39.0 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.mp4

58.3 MB

Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.srt

42.1 KB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4

102.5 MB

An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.srt

55.8 KB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4

80.8 MB

Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.srt

39.9 KB

Defeating Firefox by Muneaki Nishimura - CODE BLUE 2015.mp4

59.8 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4

79.9 MB

Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.srt

51.6 KB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4

84.1 MB

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.srt

36.2 KB

Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4

102.8 MB

Is there an EFI monster inside your apple by Pedro Vilccca - CODE BLUE 2015.srt

87.9 KB

Keynote The Singularity is Near by Takuya Matsuda - CODE BLUE 2015.mp4

68.4 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4

80.7 MB

Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.srt

78.0 KB

New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4

80.9 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.mp4

47.8 MB

Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.srt

40.3 KB

PANDEMONIUM Automated Identification of Cryptographic Algorithms by Yuma Kurogome - CODE BLUE 2015.mp4

36.8 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4

103.3 MB

Practical network defense at scale by Travis Carelock - CODE BLUE 2015.srt

74.4 KB

Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4

82.6 MB

The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4

93.2 MB

Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4

87.6 MB

[audio] Backdoor master key for MS Office by Shigeo Mitsunari and Yoshinori Takesako - CODE BLUE 2015.mp4

44.7 MB

[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri - CODE BLUE 2015.mp4

23.0 MB

[audio]Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa - CODE BLUE 2015.mp4

26.3 MB

/CODE BLUE 2016 (10 18-21 2016)/

[CB16] (P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4

56.1 MB

[CB16] ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4

57.7 MB

[CB16] About CGC the world’s first all-machine hacking tournament by Tyler Nighswander.mp4

67.0 MB

[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4

136.7 MB

[CB16] Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4

52.5 MB

[CB16] Around the Web in 80 Hours Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4

60.9 MB

[CB16] Background Story of Operation neutralizing banking malware by Kazuki Takada.mp4

53.5 MB

[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4

193.8 MB

[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4

67.1 MB

[CB16] DVB-T Hacking by Amihai Neiderman.mp4

33.3 MB

[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4

139.2 MB

[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4

96.3 MB

[CB16] Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4

52.2 MB

[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4

75.1 MB

[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4

347.3 MB

[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4

226.1 MB

[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4

105.3 MB

[CB16] Keynote How much security is too much by Karsten Nohl.mp4

97.5 MB

[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4

114.9 MB

[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4

68.0 MB

[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4

93.2 MB

[CB16] WireGuard Next Generation Abuse-Resistant Kernel Network Tunnelby Jason Donenfeld.mp4

64.7 MB

/CODE BLUE 2017 (11 8-10, 2017)/

[CB17 ](In)Security of Japanese IT Asset Management Software.mp4

53.9 MB

[CB17] A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!.mp4

43.4 MB

[CB17] Androsia A step ahead in securing in-memory Android application data.mp4

49.8 MB

[CB17] Detection index learning based on cyber threat intelligence and its application.mp4

37.5 MB

[CB17] For the Greater Good Leveraging VMware's RPC Interface for fun and profit.mp4

63.1 MB

[CB17] Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4

1.9 MB

[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4

71.6 MB

[CB17] Industroyer biggest threat to industrial control systems since Stuxnet.mp4

31.4 MB

[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4

74.4 MB

[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4

65.6 MB

[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4

81.7 MB

[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4

70.6 MB

[CB17] Possibility of arbitrary code execution by Step-Oriented Programming.mp4

44.9 MB

[CB17] PowerShell Inside Out Applied .NET Hacking for Enhanced Visibility.mp4

63.3 MB

[CB17] Pursue the Attackers – Identify and Investigate Lateral Movement Based on Behavior Pattern –.mp4

46.1 MB

[CB17] Take a Jailbreak -Stunning Guards for iOS Jailbreak-.mp4

54.4 MB

[CB17] The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel - YouTube.mp4

41.5 MB

[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing Effective Dataflow Analysis over Dalvik Opcodes.mp4

70.2 MB

[CB17][確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4

45.1 MB

/

CODE BLUE thank you.txt

1.0 KB

Code Blue logo.jpg

5.6 KB

 

Total files 97


Copyright © 2025 FileMood.com