Blue Hat/Blue Hat thank you.txt |
872 B |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Benjamin Delpy 'gentilkiwi'.mp4 |
119.2 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Daniel Bohannon, Mandiant.mp4 |
118.6 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 John Lambert, Microsoft.mp4 |
76.6 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Marina Simakov & Tal Be'ery, Microsoft.mp4 |
104.3 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Marion Marschalek.mp4 |
94.4 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Mark Russinovich, Microsoft.mp4 |
122.9 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Matt Swann, Microsoft.mp4 |
51.4 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Omer Zohar, Topspin Security.mp4 |
82.2 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017 Prof. Yehuda Lindell, Dyadic Security.mp4 |
108.1 MB |
Blue Hat/BlueHat Israel 2017/BlueHat IL 2017.mp4 |
7.1 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Daniel Gruss, Moritz Lipp & Michael Schwarz - The Case of Spectre and Meltdown.mp4 |
123.3 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - David Weston - Windows Hardening with Hardware.mp4 |
172.3 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Gunter Ollmann - Extracting Secrets from Silicon A New Generation of Bug Hunting.mp4 |
100.9 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - John Lambert - The New Paradigm of Security Controls.mp4 |
83.1 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Jordan Rabet - Browser Security Beyond Sandboxing.mp4 |
59.4 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Lee Holmes - How to Design a New Cloud Platform with a Strong Security Posture.mp4 |
113.1 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Marina Simakov & Itai Grady - Computers Gone Rogue.mp4 |
72 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Marion Marschalek - The Wolf in SGX Clothing.mp4 |
114.6 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Mathy Vanhoef - KRACKing WPA2 in Practice Using Key Reinstallation Attacks.mp4 |
98.7 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Matt Graeber - Hi, My Name is CN=Microsoft Windows, O=Microsoft Corporation….mp4 |
78.5 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Matt Suiche - Ethereum VM, Bytecode & Bugged Smart-Contracts.mp4 |
116.7 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Matt Tait - Keynote Fake News and Info-Ops Modern Information Warfare….mp4 |
164.1 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Saar Amar - Linux Vulnerabilities Windows Exploits Escalating Privileges with WSL.mp4 |
111.5 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind.mp4 |
122.3 MB |
Blue Hat/BlueHat Israel 2018/BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or How I Fixed Long-Dead Galaxy S3 Phones.mp4 |
77.1 MB |
Blue Hat/BlueHat Israel 2018/BlueHat Nights Event.mp4 |
5.9 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Andrew bunnie Huang - Supply Chain Security If I were a Nation State...”.en.transcribed.srt |
153 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Andrew bunnie Huang - Supply Chain Security If I were a Nation State...”.mp4 |
56.9 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Benjamin Delpy (@gentilkiwi) - You (dis)liked mimikatz Wait for kekeo.mp4 |
78.6 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Bhavna Soman.en.transcribed.srt |
59 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Bhavna Soman.mp4 |
20.7 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time Compiler.en.transcribed.srt |
138 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time Compiler.mp4 |
46.4 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Day 1 Recap.mp4 |
2.2 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Day 2 Recap.mp4 |
2.6 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Ido Li On & Uri Farkas - The AMDFlaws Story Technical Deep Dive.en.transcribed.srt |
93 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Ido Li On & Uri Farkas - The AMDFlaws Story Technical Deep Dive.mp4 |
41.1 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Luca Todesco (@qwertyoruiop) - Life as an iOS Attacker.en.transcribed.srt |
101 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Luca Todesco (@qwertyoruiop) - Life as an iOS Attacker.mp4 |
43.5 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Lucas Leong - Make Static Instrumentation Great Again.en.transcribed.srt |
62 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Lucas Leong - Make Static Instrumentation Great Again.mp4 |
34.8 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Matt Miller.en.transcribed.srt |
161 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Matt Miller.mp4 |
48.7 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Niek Timmers, Albert Spruyt & Cristofaro Mune.en.transcribed.srt |
120 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Niek Timmers, Albert Spruyt & Cristofaro Mune.mp4 |
50.5 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Or Pinchasof - Bridging Emulation and the Real World with the Nintendo Game Boy.en.transcribed.srt |
88 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Or Pinchasof - Bridging Emulation and the Real World with the Nintendo Game Boy.mp4 |
53.7 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Ulf Frisk - Practical Uses for Hardware-assisted Memory Visualization.en.transcribed.srt |
106 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - Ulf Frisk - Practical Uses for Hardware-assisted Memory Visualization.mp4 |
48.6 MB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - x0rz - No Code No Crime UPnP as an Off-the-Shelf Attacker's Toolkit.en.transcribed.srt |
50 KB |
Blue Hat/BlueHat Israel 2019/BlueHat IL 2019 - x0rz - No Code No Crime UPnP as an Off-the-Shelf Attacker's Toolkit.mp4 |
22.7 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Amy Burnett - Forget the Sandbox Escape Abusing Browsers from Code Execution.en(transcribed).srt |
66 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Amy Burnett - Forget the Sandbox Escape Abusing Browsers from Code Execution.mp4 |
73.1 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Andy Nguyen - Trinity PSP Emulator Escape.en(transcribed).srt |
48 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Andy Nguyen - Trinity PSP Emulator Escape.mp4 |
59.1 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Ben Seri & Yuval Sarel - CDPwn Taking Over Millions of Enterprise-Things....en(transcribed).srt |
64 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Ben Seri & Yuval Sarel - CDPwn Taking Over Millions of Enterprise-Things....mp4 |
62.1 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild.en(transcribed).srt |
43 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Boris Larin - Retrospective on the Latest Zero-days Found in the Wild.mp4 |
62.5 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - David Weston - Keeping Windows Secure.en(transcribed).srt |
93 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - David Weston - Keeping Windows Secure.mp4 |
98.9 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Dmitry Vyukov - syzkaller Adventures in Continuous Coverage-guided Kernel Fuzzing.en(transcribed).srt |
76 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Dmitry Vyukov - syzkaller Adventures in Continuous Coverage-guided Kernel Fuzzing.mp4 |
77.9 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Gal De Leon - Exploiting Errors in Windows Error Reporting.en(transcribed).srt |
75 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Gal De Leon - Exploiting Errors in Windows Error Reporting.mp4 |
62.7 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Kevin Bock & George Hughey - Geneva An AI Approach to Evading Nation-State....en(transcribed).srt |
57 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Kevin Bock & George Hughey - Geneva An AI Approach to Evading Nation-State....mp4 |
58.8 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Luca Todesco - The One Weird Trick SecureROM Hates.en(transcribed).srt |
61 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Luca Todesco - The One Weird Trick SecureROM Hates.mp4 |
68.3 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Maddie Stone - Where's Waldo...'s Brothers and Sisters Variant Analysis on....en(transcribed).srt |
70 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Maddie Stone - Where's Waldo...'s Brothers and Sisters Variant Analysis on....mp4 |
80.2 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Nate Warfield - We Can't Stop Here! This is Bot Country!.en(transcribed).srt |
69 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Nate Warfield - We Can't Stop Here! This is Bot Country!.mp4 |
60.4 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Netanel Ben-Simon & Yoav Alon - Bugs on the Windshield Fuzzing the Windows Kernel.en(transcribed).srt |
63 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Netanel Ben-Simon & Yoav Alon - Bugs on the Windshield Fuzzing the Windows Kernel.mp4 |
65.2 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Recap.mp4 |
4.3 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Robert Lipovsky - Tactics, Techniques, and Procedures of the World's Most....en(transcribed).srt |
53 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Robert Lipovsky - Tactics, Techniques, and Procedures of the World's Most....mp4 |
63 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to.NET.en(transcribed).srt |
68 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to.NET.mp4 |
62.2 MB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Zuzana Hromcova - ATTOR Spy Platform with Curious GSM Fingerprinting.en(transcribed).srt |
40 KB |
Blue Hat/BlueHat Isreal 2020/BlueHat IL 2020 - Zuzana Hromcova - ATTOR Spy Platform with Curious GSM Fingerprinting.mp4 |
49 MB |
Blue Hat/BlueHat logo.png |
8 KB |
Blue Hat/BlueHat v10/BlueHat v10 Behind the Curtain of Second Tuesdays Challenges in Software Security Response.mp4 |
28.4 MB |
Blue Hat/BlueHat v10/BlueHat v10 Browser Hacks, Design Flaws, & Opt-In Security.mp4 |
40.3 MB |
Blue Hat/BlueHat v10/BlueHat v10 Cyber [Crime War] -- Connecting the Dots.mp4 |
52.2 MB |
Blue Hat/BlueHat v10/BlueHat v10 Enhanced Mitigation Experience Toolkit 2.0.mp4 |
49.6 MB |
Blue Hat/BlueHat v10/BlueHat v10 Everybody Be Cool This Is a ROPpery.mp4 |
59.2 MB |
Blue Hat/BlueHat v10/BlueHat v10 Nine Trends Affecting the Future of Exploitation.mp4 |
25.1 MB |
Blue Hat/BlueHat v10/BlueHat v10.m3u |
422 B |
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).en.transcribed.srt |
216 KB |
Blue Hat/BlueHat v17/BlueHat Exploitation Chronomancy Temporal Return Addresses (2005).mp4 |
142 MB |
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt |
110 KB |
Blue Hat/BlueHat v17/BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights.mp4 |
71.9 MB |
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.en.transcribed.srt |
107 KB |
Blue Hat/BlueHat v17/BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing.mp4 |
156.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.en.transcribed.srt |
147 KB |
Blue Hat/BlueHat v17/BlueHat v17 Born Secure. How to Design A Brand New Cloud Platform With A Strong Security Posture.mp4 |
102.1 MB |
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.en.transcribed.srt |
74 KB |
Blue Hat/BlueHat v17/BlueHat v17 Dangerous Contents - Securing .Net Deserialization.mp4 |
28.5 MB |
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.en.transcribed.srt |
81 KB |
Blue Hat/BlueHat v17/BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector.mp4 |
31 MB |
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.en.transcribed.srt |
184 KB |
Blue Hat/BlueHat v17/BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting.mp4 |
190.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.en.transcribed.srt |
154 KB |
Blue Hat/BlueHat v17/BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection.mp4 |
147.4 MB |
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.en.transcribed.srt |
138 KB |
Blue Hat/BlueHat v17/BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos.mp4 |
90.6 MB |
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.en.transcribed.srt |
162 KB |
Blue Hat/BlueHat v17/BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard.mp4 |
72.6 MB |
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.en.transcribed.srt |
113 KB |
Blue Hat/BlueHat v17/BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations.mp4 |
132.8 MB |
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.en.transcribed.srt |
67 KB |
Blue Hat/BlueHat v17/BlueHat v17 Scaling Incident Response - 5 Keys to Successful Defense at Scale.mp4 |
40.2 MB |
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.en.transcribed.srt |
149 KB |
Blue Hat/BlueHat v17/BlueHat v17 Securing Windows Defender Application Guard.mp4 |
87.7 MB |
Blue Hat/BlueHat v17/Microsoft BlueHat v17 Security Conference.mp4 |
5.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.en.transcribed.srt |
192 KB |
Blue Hat/BlueHat v18/BlueHat v18 If we win, we lose.mp4 |
157.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.en.transcribed.srt |
61 KB |
Blue Hat/BlueHat v18/BlueHat v18 A mitigation for kernel toctou vulnerabilities.mp4 |
34.5 MB |
Blue Hat/BlueHat v18/BlueHat v18 A turla gift - popping calc.exe by sending an email.mp4 |
53.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.en.transcribed.srt |
123 KB |
Blue Hat/BlueHat v18/BlueHat v18 An Ice Cold boot to break bitlocker.mp4 |
91.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.en.transcribed.srt |
162 KB |
Blue Hat/BlueHat v18/BlueHat v18 Cybersecurity for the defense of democracy.mp4 |
122.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.en.transcribed.srt |
105 KB |
Blue Hat/BlueHat v18/BlueHat v18 DEP for the app layer - Time for app sec to grow up.mp4 |
73.5 MB |
Blue Hat/BlueHat v18/BlueHat v18 Evolving chromes secuirty indicators.mp4 |
31.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.en.transcribed.srt |
136 KB |
Blue Hat/BlueHat v18/BlueHat v18 False Flag Foibles.mp4 |
62.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.en.transcribed.srt |
143 KB |
Blue Hat/BlueHat v18/BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled.mp4 |
94.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.en.transcribed.srt |
102 KB |
Blue Hat/BlueHat v18/BlueHat v18 Go Build A Tool.mp4 |
77.2 MB |
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.en.transcribed.srt |
175 KB |
Blue Hat/BlueHat v18/BlueHat v18 Hardening hyper-v through offensive security research.mp4 |
72.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.en.transcribed.srt |
121 KB |
Blue Hat/BlueHat v18/BlueHat v18 Killsuit the equation group's swiss army knife for persistence.mp4 |
47.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.en.transcribed.srt |
113 KB |
Blue Hat/BlueHat v18/BlueHat v18 MSRC Listens.mp4 |
130.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.en.transcribed.srt |
68 KB |
Blue Hat/BlueHat v18/BlueHat v18 May I see your credentials, please.mp4 |
97.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.en.transcribed.srt |
161 KB |
Blue Hat/BlueHat v18/BlueHat v18 Memory Resident Implants Code injection is alive and well.mp4 |
108.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.en.transcribed.srt |
44 KB |
Blue Hat/BlueHat v18/BlueHat v18 Mitigation Bypass The Past, Present, and Future.mp4 |
21.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.en.transcribed.srt |
184 KB |
Blue Hat/BlueHat v18/BlueHat v18 Modern day entomology - examining the inner workings of the bug bazaar.mp4 |
102.9 MB |
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.en.transcribed.srt |
98 KB |
Blue Hat/BlueHat v18/BlueHat v18 Mstic threat intelligence year in review.mp4 |
45.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.en.transcribed.srt |
121 KB |
Blue Hat/BlueHat v18/BlueHat v18 Overt Command & Control The Art of Blending In.mp4 |
53.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.en.transcribed.srt |
163 KB |
Blue Hat/BlueHat v18/BlueHat v18 Record Now, Decrypt Later - Future Quantum Computers Are a Present Threat.mp4 |
129.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.en.transcribed.srt |
115 KB |
Blue Hat/BlueHat v18/BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows.mp4 |
89.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.en.transcribed.srt |
65 KB |
Blue Hat/BlueHat v18/BlueHat v18 Scaling Security Scanning.mp4 |
63.2 MB |
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.en.transcribed.srt |
122 KB |
Blue Hat/BlueHat v18/BlueHat v18 Securely handling data in marginalized communities.mp4 |
93.1 MB |
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.en.transcribed.srt |
117 KB |
Blue Hat/BlueHat v18/BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world.mp4 |
154.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 Straight outta VMware.mp4 |
47.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.en.transcribed.srt |
135 KB |
Blue Hat/BlueHat v18/BlueHat v18 Tales from the SOC.mp4 |
49.8 MB |
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.en.transcribed.srt |
127 KB |
Blue Hat/BlueHat v18/BlueHat v18 The hitchhiker's guide to north korean malware.mp4 |
117.7 MB |
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.en.transcribed.srt |
131 KB |
Blue Hat/BlueHat v18/BlueHat v18 The law of unintended consequences.mp4 |
142.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.en.transcribed.srt |
129 KB |
Blue Hat/BlueHat v18/BlueHat v18 The matrix has you protecting linux using deception.mp4 |
74 MB |
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.en.transcribed.srt |
150 KB |
Blue Hat/BlueHat v18/BlueHat v18 This is not fine - Surviving Cynicism and Building Happy Security Teams.mp4 |
151.3 MB |
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.en.transcribed.srt |
103 KB |
Blue Hat/BlueHat v18/BlueHat v18 software supply chain attacks in 2018 - predictions vs reality.mp4 |
91.4 MB |
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.en.transcribed.srt |
53 KB |
Blue Hat/BlueHat v18/BlueHat v18 Malicious User profiling using deep neural networks.mp4 |
37.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 1 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 2 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 3 6.mp4 |
17.5 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 4 6.mp4 |
20.1 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 5 6.mp4 |
17.5 MB |
Blue Hat/BlueHat v9/BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure 6 6.mp4 |
17.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 1 5.mp4 |
21.9 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 2 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 3 5.mp4 |
22 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 4 5.mp4 |
19.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 Office Security Engineering 5 5.mp4 |
13.2 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 1 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 2 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 3 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 4 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 RIA Security Real-World Lessons from Flash and Silverlight 5 5.mp4 |
14.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 1 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 2 5.mp4 |
19.4 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 3 5.mp4 |
19.3 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 4 5.mp4 |
16.7 MB |
Blue Hat/BlueHat v9/BlueHat v9 iPhone SMS Hacking with a Touch About Payloads 5 5.mp4 |
18.5 MB |
Blue Hat/BlueHat v9/BlueHat v9.m3u |
2 KB |
Blue Hat/Thumbs.db |
10 KB |