zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
CODE BLUE
magnet:?xt=urn:btih:57bf1d3a7ad4c199ffd123250a25f33cadacd789&dn=CODE BLUE
磁力链接详情
Hash值:
57bf1d3a7ad4c199ffd123250a25f33cadacd789
点击数:
70
文件大小:
12.86 GB
文件数量:
172
创建日期:
2021-11-13 11:04
最后访问:
2024-12-22 15:33
访问标签:
CODE
BLUE
文件列表详情
CODE BLUE 2013/[CB13] A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 93.71 MB
CODE BLUE 2013/[CB13] Fight Against Citadel in Japan by You Nakatsuru.mp4 93.77 MB
CODE BLUE 2013/[CB13] HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4 43.63 MB
CODE BLUE 2013/[CB13] Intel Management Engine Secrets by Igor Skochinsky.mp4 94.74 MB
CODE BLUE 2013/[CB13] Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 86.75 MB
CODE BLUE 2013/[CB13] Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 122.74 MB
CODE BLUE 2013/[CB13] Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 104.96 MB
CODE BLUE 2013/[CB13] Preventing hard disk firmware manipulation attack and disaster recovery.mp4 73.83 MB
CODE BLUE 2013/[CB13] SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4 61.59 MB
CODE BLUE 2013/[CB13] The Current State of Automotive Security by Chris Valasek.mp4 98.46 MB
CODE BLUE 2013/[CB13] libinjection - from SQLi to XSS by Nick Galbreath.mp4 36.11 MB
CODE BLUE 2013/[CB13] o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 102.27 MB
CODE BLUE 2013/[CB13] various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 80.36 MB
CODE BLUE 2014/[CB14] Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 114.84 MB
CODE BLUE 2014/[CB14] David Jacoby - How I Hacked My Home.mp4 76.99 MB
CODE BLUE 2014/[CB14] David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4 71.88 MB
CODE BLUE 2014/[CB14] Dongcheol Hong - Drone attack by malware and network hacking.mp4 95.66 MB
CODE BLUE 2014/[CB14] Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4 42.9 MB
CODE BLUE 2014/[CB14] Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4 85.09 MB
CODE BLUE 2014/[CB14] Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4 106.95 MB
CODE BLUE 2014/[CB14] Kuniyasu Suzaki - DeviceDisEnabler.mp4 86.73 MB
CODE BLUE 2014/[CB14] Takahiro Matsuki & Dennis Kengo Oka.mp4 99.33 MB
CODE BLUE 2014/[CB14] The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 88.99 MB
CODE BLUE 2015/[CB15] (In)Security of Medical Devices by Florian Grunow.mp4 102.26 MB
CODE BLUE 2015/[CB15] A new exploitation method to bypass stack canaries by Yuki Koike.mp4 44.28 MB
CODE BLUE 2015/[CB15] Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4 68.28 MB
CODE BLUE 2015/[CB15] An Abusive Relationship with AngularJS by Mario Heiderich.mp4 133.79 MB
CODE BLUE 2015/[CB15] Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4 106.37 MB
CODE BLUE 2015/[CB15] Defeating Firefox by Muneaki Nishimura.mp4 74.35 MB
CODE BLUE 2015/[CB15] Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4 98.24 MB
CODE BLUE 2015/[CB15] How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4 114.82 MB
CODE BLUE 2015/[CB15] Is there an EFI monster inside your apple by Pedro Vilaca.mp4 121.58 MB
CODE BLUE 2015/[CB15] Keynote The Singularity is Near by Takuya Matsuda.mp4 84.94 MB
CODE BLUE 2015/[CB15] Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4 97.94 MB
CODE BLUE 2015/[CB15] New immune system of information security from CHINA by Xiaodun Fang.mp4 92.49 MB
CODE BLUE 2015/[CB15] Ninja Correlation of APT Binaries by Bhavna Soman.mp4 62.88 MB
CODE BLUE 2015/[CB15] PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4 46.38 MB
CODE BLUE 2015/[CB15] Practical network defense at scale by Travis Carelock.mp4 133.92 MB
CODE BLUE 2015/[CB15] Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4 109.32 MB
CODE BLUE 2015/[CB15] The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4 145.26 MB
CODE BLUE 2015/[CB15] Wireless security testing with attack by Keiichi Horiai.mp4 113.98 MB
CODE BLUE 2015/[CB15] [audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4 31.01 MB
CODE BLUE 2015/[CB15] [audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4 55.06 MB
CODE BLUE 2015/[CB15] [audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4 27.39 MB
CODE BLUE 2016/[CB16] (P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4 73.15 MB
CODE BLUE 2016/[CB16] ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4 67.65 MB
CODE BLUE 2016/[CB16] About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4 65.26 MB
CODE BLUE 2016/[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4 113.7 MB
CODE BLUE 2016/[CB16] Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4 62.69 MB
CODE BLUE 2016/[CB16] Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4 69.52 MB
CODE BLUE 2016/[CB16] Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4 65.16 MB
CODE BLUE 2016/[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4 42.17 MB
CODE BLUE 2016/[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4 63.2 MB
CODE BLUE 2016/[CB16] DVB-T Hacking by Amihai Neiderman.mp4 40.64 MB
CODE BLUE 2016/[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 49.77 MB
CODE BLUE 2016/[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 99.9 MB
CODE BLUE 2016/[CB16] Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4 76.43 MB
CODE BLUE 2016/[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 98.33 MB
CODE BLUE 2016/[CB16] Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4 83.61 MB
CODE BLUE 2016/[CB16] House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 51.53 MB
CODE BLUE 2016/[CB16] Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4 101.57 MB
CODE BLUE 2016/[CB16] Keynote - How much security is too much by Karsten Nohl.mp4 75.81 MB
CODE BLUE 2016/[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 90.53 MB
CODE BLUE 2016/[CB16] PowerShell obfuskation Techniques & How To Detect Them by Daniel Bohannon.mp4 93.72 MB
CODE BLUE 2016/[CB16] The ARMs race for kernel protection by Jonathan Levin.mp4 91.06 MB
CODE BLUE 2016/[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4 91.98 MB
CODE BLUE 2016/[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4 77.6 MB
CODE BLUE 2016/[CB16] WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4 96.61 MB
CODE BLUE 2017/[CB17 ](In)Security of Japanese IT Asset Management Software.mp4 108.35 MB
CODE BLUE 2017/[CB17] A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 68.14 MB
CODE BLUE 2017/[CB17] Androsia - A step ahead in securing in-memory Android application data.mp4 82.85 MB
CODE BLUE 2017/[CB17] Detection index learning based on cyber threat intelligence and its application.mp4 71.42 MB
CODE BLUE 2017/[CB17] For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4 83.1 MB
CODE BLUE 2017/[CB17] Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4 2.69 MB
CODE BLUE 2017/[CB17] George Hotz - Keynote - Make your car self-driving using open-source software.mp4 116.53 MB
CODE BLUE 2017/[CB17] Industroyer - biggest threat to industrial control systems since Stuxnet.mp4 56.86 MB
CODE BLUE 2017/[CB17] LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4 124.26 MB
CODE BLUE 2017/[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4 84.93 MB
CODE BLUE 2017/[CB17] National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4 127.82 MB
CODE BLUE 2017/[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4 85.24 MB
CODE BLUE 2017/[CB17] Possibility of arbitrary code execution by Step-Oriented Programming.mp4 88.46 MB
CODE BLUE 2017/[CB17] PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4 136.74 MB
CODE BLUE 2017/[CB17] Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4 98.56 MB
CODE BLUE 2017/[CB17] Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4 117.68 MB
CODE BLUE 2017/[CB17] The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4 74.29 MB
CODE BLUE 2017/[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4 75.63 MB
CODE BLUE 2017/[CB17][確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4 91.48 MB
CODE BLUE 2018/[CB18] A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4 123.11 MB
CODE BLUE 2018/[CB18] Are You Trading Stocks Securely by Alejandro Hernandez.mp4 108.77 MB
CODE BLUE 2018/[CB18] CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4 77.06 MB
CODE BLUE 2018/[CB18] Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4 88.99 MB
CODE BLUE 2018/[CB18] Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4 81.69 MB
CODE BLUE 2018/[CB18] Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4 108.01 MB
CODE BLUE 2018/[CB18] Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4 81.94 MB
CODE BLUE 2018/[CB18] From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4 81.09 MB
CODE BLUE 2018/[CB18] Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4 83.67 MB
CODE BLUE 2018/[CB18] GLitch hammering your phone through WebGL by Pietro Frigo.mp4 92 MB
CODE BLUE 2018/[CB18] How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4 114.79 MB
CODE BLUE 2018/[CB18] INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4 72.12 MB
CODE BLUE 2018/[CB18] Keynote Cyber Arms Race by Mikko Hyppönen.mp4 137.89 MB
CODE BLUE 2018/[CB18] Keynote Power, Patience, and Persistence by Kenneth Geers.mp4 101.34 MB
CODE BLUE 2018/[CB18] LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4 106.87 MB
CODE BLUE 2018/[CB18] Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4 92.36 MB
CODE BLUE 2018/[CB18] Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4 116.35 MB
CODE BLUE 2018/[CB18] Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4 104.81 MB
CODE BLUE 2018/[CB18] Privacy by Design Methodology by Vanessa Henri.mp4 80.95 MB
CODE BLUE 2018/[CB18] RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4 37.56 MB
CODE BLUE 2018/[CB18] Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4 86.58 MB
CODE BLUE 2018/[CB18] Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4 90.1 MB
CODE BLUE 2018/[CB18] Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4 69.02 MB
CODE BLUE 2018/[CB18] Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4 89.53 MB
CODE BLUE 2018/[CB18] The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4 136.62 MB
CODE BLUE 2018/[CB18] The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4 106.6 MB
CODE BLUE 2018/[CB18] The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4 79.65 MB
CODE BLUE 2018/[CB18] WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4 100.4 MB
CODE BLUE 2018/[CB18] Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4 88.84 MB
CODE BLUE 2018/[CB18] Who's guarding the gateway - by Nicole Beckwith.mp4 67.14 MB
CODE BLUE 2018/[CB18] Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4 74.21 MB
CODE BLUE 2018/[CB18]Nuclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4 96.94 MB
CODE BLUE 2018/[CB19][BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4 48.54 MB
CODE BLUE 2019/[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4 100.31 MB
CODE BLUE 2019/[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4 63.56 MB
CODE BLUE 2019/[CB19] Coinbase and the Firefox 0-day by Philip Martin.mp4 68.25 MB
CODE BLUE 2019/[CB19] Hardware Wallet Security by Sergei Volokitin.mp4 74.92 MB
CODE BLUE 2019/[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4 105.45 MB
CODE BLUE 2019/[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4 77.14 MB
CODE BLUE 2019/[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4 102.71 MB
CODE BLUE 2019/[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4 74.48 MB
CODE BLUE 2019/[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4 52.95 MB
CODE BLUE 2019/[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4 80.78 MB
CODE BLUE 2019/[CB19] Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4 64.48 MB
CODE BLUE 2019/[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4 85.25 MB
CODE BLUE 2019/[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4 49.96 MB
CODE BLUE 2019/[CB19] [BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4 46.72 MB
CODE BLUE 2019/[CB19][BB] Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4 36.79 MB
CODE BLUE 2019/[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4 32.96 MB
CODE BLUE 2019/[CB19][BB] Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4 94.32 MB
CODE BLUE 2019/[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.mp4 114.35 MB
CODE BLUE 2019/[CB19][BB] tknk_scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4 86.96 MB
CODE BLUE 2020/[CB20] Keynote1 - Ms. Audrey Guinchard.mp4 36.5 MB
CODE BLUE 2020/[CB20] Keynote2 - Practical and Intelligent Incident Response Planning.mp4 51.73 MB
CODE BLUE 2020/[CB20]Alliance power for Cyber Security.mp4 26.47 MB
CODE BLUE 2020/[CB20]Apk-medit memory search and patch tool for APK without root & android NDK.mp4 16.87 MB
CODE BLUE 2020/[CB20]Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4 31.59 MB
CODE BLUE 2020/[CB20]Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4 22.77 MB
CODE BLUE 2020/[CB20]DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4 22.88 MB
CODE BLUE 2020/[CB20]Defending Computer CriminalsPresented - Andrea Monti.mp4 26.94 MB
CODE BLUE 2020/[CB20]Dissecting China’s Information Operations with Threat Intelligence.mp4 44.04 MB
CODE BLUE 2020/[CB20]Don't Be Silly - It's Only a Lightbulb.mp4 81.13 MB
CODE BLUE 2020/[CB20]Drones' Cryptanalysis - Detecting Spying Drones.mp4 41.8 MB
CODE BLUE 2020/[CB20]Ethereum 2.0のセキュリティ.mp4 27.3 MB
CODE BLUE 2020/[CB20]Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4 34.96 MB
CODE BLUE 2020/[CB20]Hunting kernel exploits with filesystem fuzzer.mp4 33.79 MB
CODE BLUE 2020/[CB20]Illicit QQ Communities What's Being Shared.mp4 26.78 MB
CODE BLUE 2020/[CB20]It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4 53.18 MB
CODE BLUE 2020/[CB20]Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4 49.36 MB
CODE BLUE 2020/[CB20]Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4 40.21 MB
CODE BLUE 2020/[CB20]Law Enforcement Access to Transborder.mp4 50.62 MB
CODE BLUE 2020/[CB20]Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4 41.44 MB
CODE BLUE 2020/[CB20]LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4 38.95 MB
CODE BLUE 2020/[CB20]Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4 54.57 MB
CODE BLUE 2020/[CB20]Operation I am Tom How APT actors move laterally in corporate networks.mp4 49.18 MB
CODE BLUE 2020/[CB20]Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4 40.68 MB
CODE BLUE 2020/[CB20]Reflex you give me a parser, I give you a token generator.mp4 34.13 MB
CODE BLUE 2020/[CB20]Reverse Engineering archeology.mp4 64.5 MB
CODE BLUE 2020/[CB20]SOARによるセキュリティ監視業務の効率化とSecOps.mp4 31.67 MB
CODE BLUE 2020/[CB20]Speccial Session - Digital Social Innovation.mp4 78.92 MB
CODE BLUE 2020/[CB20]Vulnerabilities of Machine Learning Infrastructure.mp4 42.88 MB
CODE BLUE 2020/[CB20]Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4 49.45 MB
CODE BLUE 2020/[CB20]サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4 36.65 MB
CODE BLUE 2020/[CB20]虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4 34.89 MB
CODE BLUE 2020/[CB20]説明可能な悪性ドメイン診断.mp4 47.12 MB
其他位置