BITCQ

Blue Hat

Size: 7 GB
Magnet link

Name Size
Blue Hat/Blue Hat thank you.txt 686 B
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Benjamin Delpy 'gentilkiwi'.mp4 119.2 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Daniel Bohannon, Mandiant.mp4 118.6 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 John Lambert, Microsoft.mp4 76.6 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Marina Simakov & Tal Be'ery, Microsoft.mp4 104.3 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Marion Marschalek.mp4 94.4 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Mark Russinovich, Microsoft.mp4 122.9 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Matt Swann, Microsoft.mp4 51.4 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Omer Zohar, Topspin Security.mp4 82.2 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017 Prof. Yehuda Lindell, Dyadic Security.mp4 108.1 MB
Blue Hat/BlueHat Isreal 2017/BlueHat IL 2017.mp4 7.1 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Daniel Gruss, Moritz Lipp & Michael Schwarz - The Case of Spectre and Meltdown.mp4 123.3 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - David Weston - Windows Hardening with Hardware.mp4 172.3 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Gunter Ollmann - Extracting Secrets from Silicon A New Generation of Bug Hunting.mp4 100.9 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls.mp4 83.1 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing.mp4 59.4 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Lee Holmes - How to Design a New Cloud Platform with a Strong Security Posture.mp4 113.1 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Marina Simakov & Itai Grady - Computers Gone Rogue.mp4 72 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Marion Marschalek - The Wolf in SGX Clothing.mp4 114.6 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Mathy Vanhoef - KRACKing WPA2 in Practice Using Key Reinstallation Attacks.mp4 98.7 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Graeber - Hi, My Name is CN=Microsoft Windows, O=Microsoft Corporation….mp4 78.5 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Suiche - Ethereum VM, Bytecode & Bugged Smart-Contracts.mp4 116.7 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Matt Tait - Keynote Fake News and Info-Ops Modern Information Warfare….mp4 164.1 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Saar Amar - Linux Vulnerabilities Windows Exploits Escalating Privileges with WSL.mp4 111.5 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind.mp4 122.3 MB
Blue Hat/BlueHat Isreal 2018/BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or How I Fixed Long-Dead Galaxy S3 Phones.mp4 77.1 MB
Blue Hat/BlueHat Isreal 2018/BlueHat Nights Event.mp4 5.9 MB
Blue Hat/BlueHat logo.png 8 KB
Blue Hat/BlueHat v10/BlueHat v10 Behind the Curtain of Second Tuesdays Challenges in Software Security Response.mp4 28.4 MB
Blue Hat/BlueHat v10/BlueHat v10 Browser Hacks, Design Flaws, & Opt-In Security.mp4 40.3 MB
Blue Hat/BlueHat v10/BlueHat v10 Cyber [Crime War] -- Connecting the Dots.mp4 52.2 MB
Blue Hat/BlueHat v10/BlueHat v10 Enhanced Mitigation Experience Toolkit 2.0.mp4 49.6 MB
Blue Hat/BlueHat v10/BlueHat v10 Everybody Be Cool This Is a ROPpery.mp4 59.2 MB
Blue Hat/BlueHat v10/BlueHat v10 Nine Trends Affecting the Future of Exploitation.mp4 25.1 MB
Blue Hat/BlueHat v10/BlueHat v10.m3u 422 B
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).en.transcribed.srt 216 KB
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).mp4 142 MB
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt 110 KB
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.mp4 71.9 MB
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.en.transcribed.srt 107 KB
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.mp4 156.2 MB
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.en.transcribed.srt 147 KB
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.mp4 102.1 MB
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.en.transcribed.srt 74 KB
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.mp4 28.5 MB
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.en.transcribed.srt 81 KB
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.mp4 31 MB
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.en.transcribed.srt 184 KB
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.mp4 190.2 MB
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.en.transcribed.srt 154 KB
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.mp4 147.4 MB
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.en.transcribed.srt 138 KB
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.mp4 90.6 MB
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.en.transcribed.srt 162 KB
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.mp4 72.6 MB
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.en.transcribed.srt 113 KB
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.mp4 132.8 MB
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.en.transcribed.srt 67 KB
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.mp4 40.2 MB
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.en.transcribed.srt 149 KB
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.mp4 87.7 MB
Blue Hat/BlueHat v17/Microsoft BlueHat v17 Security Conference.mp4 5.8 MB
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.en.transcribed.srt 192 KB
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.mp4 157.7 MB
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.en.transcribed.srt 61 KB
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.mp4 34.5 MB
Blue Hat/BlueHat v18/BlueHat v18 A turla gift - popping calc.exe by sending an email.mp4 53.4 MB
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.en.transcribed.srt 123 KB
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.mp4 91.3 MB
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.en.transcribed.srt 162 KB
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.mp4 122.1 MB
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.en.transcribed.srt 105 KB
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.mp4 73.5 MB
Blue Hat/BlueHat v18/BlueHat v18 Evolving chromes secuirty indicators.mp4 31.8 MB
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.en.transcribed.srt 136 KB
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.mp4 62.4 MB
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.en.transcribed.srt 143 KB
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.mp4 94.8 MB
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.en.transcribed.srt 102 KB
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.mp4 77.2 MB
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.en.transcribed.srt 175 KB
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.mp4 72.7 MB
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.en.transcribed.srt 121 KB
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.mp4 47.3 MB
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.en.transcribed.srt 113 KB
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.mp4 130.1 MB
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.en.transcribed.srt 68 KB
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.mp4 97.1 MB
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.en.transcribed.srt 161 KB
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.mp4 108.4 MB
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.en.transcribed.srt 44 KB
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.mp4 21.8 MB
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.en.transcribed.srt 184 KB
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.mp4 102.9 MB
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.en.transcribed.srt 98 KB
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.mp4 45.8 MB
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.en.transcribed.srt 121 KB
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.mp4 53.4 MB
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.en.transcribed.srt 163 KB
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.mp4 129.7 MB
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.en.transcribed.srt 115 KB
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.mp4 89.7 MB
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.en.transcribed.srt 65 KB
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.mp4 63.2 MB
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.en.transcribed.srt 122 KB
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.mp4 93.1 MB
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.en.transcribed.srt 117 KB
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.mp4 154.7 MB
Blue Hat/BlueHat v18/BlueHat v18 Straight outta VMware.mp4 47.4 MB
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.en.transcribed.srt 135 KB
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.mp4 49.8 MB
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.en.transcribed.srt 127 KB
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.mp4 117.7 MB
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.en.transcribed.srt 131 KB
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.mp4 142.4 MB
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.en.transcribed.srt 129 KB
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.mp4 74 MB
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.en.transcribed.srt 150 KB
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.mp4 151.3 MB
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.en.transcribed.srt 103 KB
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.mp4 91.4 MB
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.en.transcribed.srt 53 KB
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.mp4 37.4 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 1 6.mp4 20.1 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 2 6.mp4 20.1 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 3 6.mp4 17.5 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 4 6.mp4 20.1 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 5 6.mp4 17.5 MB
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 6 6.mp4 17.3 MB
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 1 5.mp4 21.9 MB
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 2 5.mp4 16.7 MB
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 3 5.mp4 22 MB
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 4 5.mp4 19.4 MB
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 5 5.mp4 13.2 MB
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 1 5.mp4 16.7 MB
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 2 5.mp4 19.3 MB
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 3 5.mp4 19.3 MB
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 4 5.mp4 19.3 MB
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 5 5.mp4 14.4 MB
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 1 5.mp4 19.3 MB
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 2 5.mp4 19.4 MB
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 3 5.mp4 19.3 MB
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 4 5.mp4 16.7 MB
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 5 5.mp4 18.5 MB
Blue Hat/BlueHat v9/BlueHat v9.m3u 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...