Blue Hat/Blue Hat thank you.txt |
686 B |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Benjamin Delpy 'gentilkiwi'.mp4 |
119.2 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Daniel Bohannon, Mandiant.mp4 |
118.6 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 John Lambert, Microsoft.mp4 |
76.6 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Marina Simakov & Tal Be'ery, Microsoft.mp4 |
104.3 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Marion Marschalek.mp4 |
94.4 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Mark Russinovich, Microsoft.mp4 |
122.9 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Matt Swann, Microsoft.mp4 |
51.4 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Omer Zohar, Topspin Security.mp4 |
82.2 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Prof. Yehuda Lindell, Dyadic Security.mp4 |
108.1 MB |
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017.mp4 |
7.1 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Daniel Gruss, Moritz Lipp & Michael Schwarz - The Case of Spectre and Meltdown.mp4 |
123.3 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - David Weston - Windows Hardening with Hardware.mp4 |
172.3 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Gunter Ollmann - Extracting Secrets from Silicon A New Generation of Bug Hunting.mp4 |
100.9 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls.mp4 |
83.1 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing.mp4 |
59.4 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Lee Holmes - How to Design a New Cloud Platform with a Strong Security Posture.mp4 |
113.1 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Marina Simakov & Itai Grady - Computers Gone Rogue.mp4 |
72 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Marion Marschalek - The Wolf in SGX Clothing.mp4 |
114.6 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Mathy Vanhoef - KRACKing WPA2 in Practice Using Key Reinstallation Attacks.mp4 |
98.7 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Graeber - Hi, My Name is CN=Microsoft Windows, O=Microsoft Corporation….mp4 |
78.5 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Suiche - Ethereum VM, Bytecode & Bugged Smart-Contracts.mp4 |
116.7 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Tait - Keynote Fake News and Info-Ops Modern Information Warfare….mp4 |
164.1 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Saar Amar - Linux Vulnerabilities Windows Exploits Escalating Privileges with WSL.mp4 |
111.5 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind.mp4 |
122.3 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or How I Fixed Long-Dead Galaxy S3 Phones.mp4 |
77.1 MB |
Blue Hat/BlueHat Isreal 2018/BlueHat Nights Event.mp4 |
5.9 MB |
Blue Hat/BlueHat logo.png |
8 KB |
Blue Hat/BlueHat v10/BlueHat v10 Behind the Curtain of Second Tuesdays Challenges in Software Security Response.mp4 |
28.4 MB |
Blue Hat/BlueHat v10/BlueHat v10 Browser Hacks, Design Flaws, & Opt-In Security.mp4 |
40.3 MB |
Blue Hat/BlueHat v10/BlueHat v10 Cyber [Crime War] -- Connecting the Dots.mp4 |
52.2 MB |
Blue Hat/BlueHat v10/BlueHat v10 Enhanced Mitigation Experience Toolkit 2.0.mp4 |
49.6 MB |
Blue Hat/BlueHat v10/BlueHat v10 Everybody Be Cool This Is a ROPpery.mp4 |
59.2 MB |
Blue Hat/BlueHat v10/BlueHat v10 Nine Trends Affecting the Future of Exploitation.mp4 |
25.1 MB |
Blue Hat/BlueHat v10/BlueHat v10.m3u |
422 B |
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).en.transcribed.srt |
216 KB |
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).mp4 |
142 MB |
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt |
110 KB |
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.mp4 |
71.9 MB |
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.en.transcribed.srt |
107 KB |
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.mp4 |
156.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.en.transcribed.srt |
147 KB |
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.mp4 |
102.1 MB |
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.en.transcribed.srt |
74 KB |
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.mp4 |
28.5 MB |
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.en.transcribed.srt |
81 KB |
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.mp4 |
31 MB |
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.en.transcribed.srt |
184 KB |
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.mp4 |
190.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.en.transcribed.srt |
154 KB |
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.mp4 |
147.4 MB |
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.en.transcribed.srt |
138 KB |
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.mp4 |
90.6 MB |
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.en.transcribed.srt |
162 KB |
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.mp4 |
72.6 MB |
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.en.transcribed.srt |
113 KB |
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.mp4 |
132.8 MB |
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.en.transcribed.srt |
67 KB |
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.mp4 |
40.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.en.transcribed.srt |
149 KB |
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.mp4 |
87.7 MB |
Blue Hat/BlueHat v17/Microsoft BlueHat v17 Security Conference.mp4 |
5.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.en.transcribed.srt |
192 KB |
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.mp4 |
157.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.en.transcribed.srt |
61 KB |
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.mp4 |
34.5 MB |
Blue Hat/BlueHat v18/BlueHat v18 A turla gift - popping calc.exe by sending an email.mp4 |
53.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.en.transcribed.srt |
123 KB |
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.mp4 |
91.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.en.transcribed.srt |
162 KB |
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.mp4 |
122.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.en.transcribed.srt |
105 KB |
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.mp4 |
73.5 MB |
Blue Hat/BlueHat v18/BlueHat v18 Evolving chromes secuirty indicators.mp4 |
31.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.en.transcribed.srt |
136 KB |
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.mp4 |
62.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.en.transcribed.srt |
143 KB |
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.mp4 |
94.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.en.transcribed.srt |
102 KB |
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.mp4 |
77.2 MB |
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.en.transcribed.srt |
175 KB |
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.mp4 |
72.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.en.transcribed.srt |
121 KB |
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.mp4 |
47.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.en.transcribed.srt |
113 KB |
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.mp4 |
130.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.en.transcribed.srt |
68 KB |
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.mp4 |
97.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.en.transcribed.srt |
161 KB |
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.mp4 |
108.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.en.transcribed.srt |
44 KB |
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.mp4 |
21.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.en.transcribed.srt |
184 KB |
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.mp4 |
102.9 MB |
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.en.transcribed.srt |
98 KB |
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.mp4 |
45.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.en.transcribed.srt |
121 KB |
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.mp4 |
53.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.en.transcribed.srt |
163 KB |
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.mp4 |
129.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.en.transcribed.srt |
115 KB |
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.mp4 |
89.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.en.transcribed.srt |
65 KB |
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.mp4 |
63.2 MB |
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.en.transcribed.srt |
122 KB |
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.mp4 |
93.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.en.transcribed.srt |
117 KB |
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.mp4 |
154.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Straight outta VMware.mp4 |
47.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.en.transcribed.srt |
135 KB |
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.mp4 |
49.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.en.transcribed.srt |
127 KB |
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.mp4 |
117.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.en.transcribed.srt |
131 KB |
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.mp4 |
142.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.en.transcribed.srt |
129 KB |
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.mp4 |
74 MB |
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.en.transcribed.srt |
150 KB |
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.mp4 |
151.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.en.transcribed.srt |
103 KB |
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.mp4 |
91.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.en.transcribed.srt |
53 KB |
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.mp4 |
37.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 1 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 2 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 3 6.mp4 |
17.5 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 4 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 5 6.mp4 |
17.5 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 6 6.mp4 |
17.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 1 5.mp4 |
21.9 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 2 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 3 5.mp4 |
22 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 4 5.mp4 |
19.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 5 5.mp4 |
13.2 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 1 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 2 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 3 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 4 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 5 5.mp4 |
14.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 1 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 2 5.mp4 |
19.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 3 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 4 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 5 5.mp4 |
18.5 MB |
Blue Hat/BlueHat v9/BlueHat v9.m3u |
2 KB |