BITCQ

CODE BLUE

Size: 15.2 GB
Magnet link

Name Size
CODE BLUE/Code Blue logo.jpg 5 KB
CODE BLUE/CODE BLUE thank you.txt 1 KB
CODE BLUE/CODE BLUE 2013/A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 93.7 MB
CODE BLUE/CODE BLUE 2013/Fight Against Citadel in Japan by You Nakatsuru.mp4 93.8 MB
CODE BLUE/CODE BLUE 2013/HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4 43.6 MB
CODE BLUE/CODE BLUE 2013/Intel Management Engine Secrets by Igor Skochinsky.mp4 94.7 MB
CODE BLUE/CODE BLUE 2013/Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 86.8 MB
CODE BLUE/CODE BLUE 2013/Keynote - CODE BLUE in the ICU by Jeff Moss.srt 63 KB
CODE BLUE/CODE BLUE 2013/Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 122.7 MB
CODE BLUE/CODE BLUE 2013/libinjection - from SQLi to XSS by Nick Galbreath.mp4 36.1 MB
CODE BLUE/CODE BLUE 2013/libinjection - from SQLi to XSS by Nick Galbreath.srt 22 KB
CODE BLUE/CODE BLUE 2013/Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 105 MB
CODE BLUE/CODE BLUE 2013/o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 102.3 MB
CODE BLUE/CODE BLUE 2013/Preventing hard disk firmware manipulation attack and disaster recovery.mp4 73.8 MB
CODE BLUE/CODE BLUE 2013/SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4 61.6 MB
CODE BLUE/CODE BLUE 2013/The Current State of Automotive Security by Chris Valasek.mp4 98.5 MB
CODE BLUE/CODE BLUE 2013/various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 80.4 MB
CODE BLUE/CODE BLUE 2014/Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 114.8 MB
CODE BLUE/CODE BLUE 2014/Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.srt 77 KB
CODE BLUE/CODE BLUE 2014/David Jacoby - How I Hacked My Home.mp4 77 MB
CODE BLUE/CODE BLUE 2014/David Jacoby - How I Hacked My Home.srt 61 KB
CODE BLUE/CODE BLUE 2014/David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.mp4 71.9 MB
CODE BLUE/CODE BLUE 2014/David Seidman - Microsoft Vulnerability Research - How to be a Finder as a Vendor.srt 63 KB
CODE BLUE/CODE BLUE 2014/Dongcheol Hong - Drone attack by malware and network hacking.mp4 95.7 MB
CODE BLUE/CODE BLUE 2014/Dongcheol Hong - Drone attack by malware and network hacking.srt 45 KB
CODE BLUE/CODE BLUE 2014/Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4 42.9 MB
CODE BLUE/CODE BLUE 2014/Ilfak Guilfanov - Keynote - The story of IDA Pro.mp4 85.1 MB
CODE BLUE/CODE BLUE 2014/Keren Elazari - Keynote - The 5 biggest problems of cyber security.mp4 107 MB
CODE BLUE/CODE BLUE 2014/Keren Elazari - Keynote - The 5 biggest problems of cyber security.srt 76 KB
CODE BLUE/CODE BLUE 2014/Kuniyasu Suzaki - DeviceDisEnabler.mp4 86.7 MB
CODE BLUE/CODE BLUE 2014/Takahiro Matsuki & Dennis Kengo Oka.mp4 99.3 MB
CODE BLUE/CODE BLUE 2014/The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 89 MB
CODE BLUE/CODE BLUE 2014/The active use and exploitation of Microsoft s Application Compatibility Framework.srt 65 KB
CODE BLUE/CODE BLUE 2015/(In)Security of Medical Devices by Florian Grunow.mp4 102.3 MB
CODE BLUE/CODE BLUE 2015/(In)Security of Medical Devices by Florian Grunow.srt 74 KB
CODE BLUE/CODE BLUE 2015/[audio] Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa.mp4 31 MB
CODE BLUE/CODE BLUE 2015/[audio] Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako.mp4 55.1 MB
CODE BLUE/CODE BLUE 2015/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri.mp4 27.4 MB
CODE BLUE/CODE BLUE 2015/A new exploitation method to bypass stack canaries by Yuki Koike.mp4 44.3 MB
CODE BLUE/CODE BLUE 2015/Abusing Adobe Reader's JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.srt 41 KB
CODE BLUE/CODE BLUE 2015/Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc.mp4 68.3 MB
CODE BLUE/CODE BLUE 2015/An Abusive Relationship with AngularJS by Mario Heiderich.mp4 133.8 MB
CODE BLUE/CODE BLUE 2015/An Abusive Relationship with AngularJS by Mario Heiderich.srt 54 KB
CODE BLUE/CODE BLUE 2015/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.mp4 106.4 MB
CODE BLUE/CODE BLUE 2015/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik.srt 39 KB
CODE BLUE/CODE BLUE 2015/Defeating Firefox by Muneaki Nishimura.mp4 74.4 MB
CODE BLUE/CODE BLUE 2015/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.mp4 98.2 MB
CODE BLUE/CODE BLUE 2015/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio.srt 50 KB
CODE BLUE/CODE BLUE 2015/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.mp4 114.8 MB
CODE BLUE/CODE BLUE 2015/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim.srt 35 KB
CODE BLUE/CODE BLUE 2015/Is there an EFI monster inside your apple by Pedro Vilaca.mp4 121.6 MB
CODE BLUE/CODE BLUE 2015/Is there an EFI monster inside your apple by Pedro Vilccca.srt 86 KB
CODE BLUE/CODE BLUE 2015/Keynote The Singularity is Near by Takuya Matsuda.mp4 84.9 MB
CODE BLUE/CODE BLUE 2015/Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.mp4 97.9 MB
CODE BLUE/CODE BLUE 2015/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio.srt 76 KB
CODE BLUE/CODE BLUE 2015/New immune system of information security from CHINA by Xiaodun Fang.mp4 92.5 MB
CODE BLUE/CODE BLUE 2015/Ninja Correlation of APT Binaries by Bhavna Soman.mp4 62.9 MB
CODE BLUE/CODE BLUE 2015/Ninja Correlation of APT Binaries by Bhavna Soman.srt 39 KB
CODE BLUE/CODE BLUE 2015/PANDEMONIUM - Automated Identification of Cryptographic Algorithms by Yuma Kurogome.mp4 46.4 MB
CODE BLUE/CODE BLUE 2015/Practical network defense at scale by Travis Carelock.mp4 133.9 MB
CODE BLUE/CODE BLUE 2015/Practical network defense at scale by Travis Carelock.srt 73 KB
CODE BLUE/CODE BLUE 2015/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura.mp4 109.3 MB
CODE BLUE/CODE BLUE 2015/The Only Way to Tell the Truth is in Fiction by Richard Thieme.mp4 145.3 MB
CODE BLUE/CODE BLUE 2015/Wireless security testing with attack by Keiichi Horiai.mp4 114 MB
CODE BLUE/CODE BLUE 2016/(P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4 73.2 MB
CODE BLUE/CODE BLUE 2016/About CGC - the world’s first all-machine hacking tournament by Tyler Nighswander.mp4 65.3 MB
CODE BLUE/CODE BLUE 2016/Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici.mp4 113.7 MB
CODE BLUE/CODE BLUE 2016/Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4 62.7 MB
CODE BLUE/CODE BLUE 2016/Around the Web in 80 Hours - Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4 69.5 MB
CODE BLUE/CODE BLUE 2016/ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4 67.7 MB
CODE BLUE/CODE BLUE 2016/Background Story of - Operation neutralizing banking malware - by Kazuki Takada.mp4 65.2 MB
CODE BLUE/CODE BLUE 2016/Be a Binary Rockstar by Sophia DAntoine.mp4 42.2 MB
CODE BLUE/CODE BLUE 2016/COFI break by Ron Shina & Shlomi Oberman.mp4 63.2 MB
CODE BLUE/CODE BLUE 2016/DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 49.8 MB
CODE BLUE/CODE BLUE 2016/DVB-T Hacking by Amihai Neiderman.mp4 40.6 MB
CODE BLUE/CODE BLUE 2016/Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4 76.4 MB
CODE BLUE/CODE BLUE 2016/Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 98.3 MB
CODE BLUE/CODE BLUE 2016/EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 99.9 MB
CODE BLUE/CODE BLUE 2016/Facebook Malware - Tag Me If You Can by Ido Naor & Dani Goland.mp4 83.6 MB
CODE BLUE/CODE BLUE 2016/House of Einherjar - Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 51.5 MB
CODE BLUE/CODE BLUE 2016/Keynote - Digital Society - e-Estonia - by Anna Piperal.mp4 101.6 MB
CODE BLUE/CODE BLUE 2016/Keynote - How much security is too much by Karsten Nohl.mp4 75.8 MB
CODE BLUE/CODE BLUE 2016/Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 90.5 MB
CODE BLUE/CODE BLUE 2016/PowerShell obfuskation Techniques & How To Detect Them​ by Daniel Bohannon.mp4 93.7 MB
CODE BLUE/CODE BLUE 2016/The ARMs race for kernel protection by Jonathan​ ​Levin.mp4 91.1 MB
CODE BLUE/CODE BLUE 2016/Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4 92 MB
CODE BLUE/CODE BLUE 2016/Who put the backdoor in my modem by Ewerson Guimaraes.mp4 77.6 MB
CODE BLUE/CODE BLUE 2016/WireGuard - Next Generation Abuse-Resistant Kernel Network Tunnel by Jason Donenfeld.mp4 96.6 MB
CODE BLUE/CODE BLUE 2017/(In)Security of Japanese IT Asset Management Software.mp4 108.4 MB
CODE BLUE/CODE BLUE 2017/A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages.mp4 68.1 MB
CODE BLUE/CODE BLUE 2017/Androsia - A step ahead in securing in-memory Android application data.mp4 82.8 MB
CODE BLUE/CODE BLUE 2017/Detection index learning based on cyber threat intelligence and its application.mp4 71.4 MB
CODE BLUE/CODE BLUE 2017/For the Greater Good - Leveraging VMware's RPC Interface for fun and profit.mp4 83.1 MB
CODE BLUE/CODE BLUE 2017/Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4 2.7 MB
CODE BLUE/CODE BLUE 2017/George Hotz - Keynote - Make your car self-driving using open-source software.mp4 116.5 MB
CODE BLUE/CODE BLUE 2017/Industroyer - biggest threat to industrial control systems since Stuxnet.mp4 56.9 MB
CODE BLUE/CODE BLUE 2017/Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4 84.9 MB
CODE BLUE/CODE BLUE 2017/LG vs. Samsung Smart TV - Which Is Better for Tracking You by Sangmin Lee.mp4 124.3 MB
CODE BLUE/CODE BLUE 2017/National Security and Public-Private Partnership for Cybersecurity - Strengths and Challenges.mp4 127.8 MB
CODE BLUE/CODE BLUE 2017/Ory Segal - Passive Fingerprinting of HTTP 2 Clients.mp4 85.2 MB
CODE BLUE/CODE BLUE 2017/Possibility of arbitrary code execution by Step-Oriented Programming.mp4 88.5 MB
CODE BLUE/CODE BLUE 2017/PowerShell Inside Out - Applied .NET Hacking for Enhanced Visibility.mp4 136.7 MB
CODE BLUE/CODE BLUE 2017/Pursue the Attackers - Identify and Investigate Lateral Movement Based on Behavior Pattern.mp4 98.6 MB
CODE BLUE/CODE BLUE 2017/Take a Jailbreak -Stunning Guards for iOS Jailbreak.mp4 117.7 MB
CODE BLUE/CODE BLUE 2017/The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel.mp4 74.3 MB
CODE BLUE/CODE BLUE 2017/吉村 孝広, 吉村 賢哉 - Trueseeing - Effective Dataflow Analysis over Dalvik Opcodes.mp4 75.6 MB
CODE BLUE/CODE BLUE 2017/確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4 91.5 MB
CODE BLUE/CODE BLUE 2018/A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.eng.srt 76 KB
CODE BLUE/CODE BLUE 2018/A Dive in to Hyper-V Architecture & Vulnerabilities by Joe Bialek & Nicolas Joly.mp4 123.1 MB
CODE BLUE/CODE BLUE 2018/Are You Trading Stocks Securely by Alejandro Hernandez.eng.srt 59 KB
CODE BLUE/CODE BLUE 2018/Are You Trading Stocks Securely by Alejandro Hernandez.mp4 108.8 MB
CODE BLUE/CODE BLUE 2018/BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.eng.srt 55 KB
CODE BLUE/CODE BLUE 2018/BB] CIRCO Cisco Implant Raspberry Controlled Operations by Emilio Couto.mp4 48.5 MB
CODE BLUE/CODE BLUE 2018/CoinMiner are Evasive by Thomas Roccia and Omri Moyal.eng.srt 58 KB
CODE BLUE/CODE BLUE 2018/CoinMiner are Evasive by Thomas Roccia and Omri Moyal.mp4 77.1 MB
CODE BLUE/CODE BLUE 2018/Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.eng.srt 91 KB
CODE BLUE/CODE BLUE 2018/Crashing to root How to escape the iOS sandbox using abort() by Brandon Azad.mp4 89 MB
CODE BLUE/CODE BLUE 2018/Crypto Gold Mine Is Your Environment Safe by Austin McBride.eng.srt 59 KB
CODE BLUE/CODE BLUE 2018/Crypto Gold Mine Is Your Environment Safe by Austin McBride.mp4 81.7 MB
CODE BLUE/CODE BLUE 2018/Discover traces of attackers from the remains - by Tsuyoshi Taniguchi & Kunihiko Yoshimura.mp4 108 MB
CODE BLUE/CODE BLUE 2018/Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.eng.srt 39 KB
CODE BLUE/CODE BLUE 2018/Dissect Android Bluetooth for Fun & Profit by Jianjun Dai, Guang Gong.mp4 81.9 MB
CODE BLUE/CODE BLUE 2018/From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.eng.srt 48 KB
CODE BLUE/CODE BLUE 2018/From Seoul to Tokyo - Threats for Japan and South Korea by Minseok Cha, Jaejun Heo.mp4 81.1 MB
CODE BLUE/CODE BLUE 2018/Fuzz your smartphone from 4G base station side by Tsojen Liu.eng.srt 47 KB
CODE BLUE/CODE BLUE 2018/Fuzz your smartphone from 4G base station side by Tsojen Liu.mp4 83.7 MB
CODE BLUE/CODE BLUE 2018/GLitch hammering your phone through WebGL by Pietro Frigo.eng.srt 67 KB
CODE BLUE/CODE BLUE 2018/GLitch hammering your phone through WebGL by Pietro Frigo.mp4 92 MB
CODE BLUE/CODE BLUE 2018/How to hack SD-WAN and keep your sanity by Sergey Goreychik.mp4 114.8 MB
CODE BLUE/CODE BLUE 2018/INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.eng.srt 47 KB
CODE BLUE/CODE BLUE 2018/INTERNATIONAL COLLABORATION A TOOL FOR COMBATING BEC by Alex Ogbole.mp4 72.1 MB
CODE BLUE/CODE BLUE 2018/Keynote Cyber Arms Race by Mikko Hyppönen.eng.srt 75 KB
CODE BLUE/CODE BLUE 2018/Keynote Cyber Arms Race by Mikko Hyppönen.mp4 137.9 MB
CODE BLUE/CODE BLUE 2018/Keynote Power, Patience, and Persistence by Kenneth Geers.eng.srt 55 KB
CODE BLUE/CODE BLUE 2018/Keynote Power, Patience, and Persistence by Kenneth Geers.mp4 101.3 MB
CODE BLUE/CODE BLUE 2018/LogonTracer Analyze Active Directory Event Logs by Shusei Tomonaga, Tomoaki Tani.mp4 106.9 MB
CODE BLUE/CODE BLUE 2018/Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.eng.srt 50 KB
CODE BLUE/CODE BLUE 2018/Methodology for controlling connected cars remotely by Minrui Yan, Jiahao Li.mp4 92.4 MB
CODE BLUE/CODE BLUE 2018/Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.eng.srt 52 KB
CODE BLUE/CODE BLUE 2018/Policy Options for Cyber Middle Powers against Strategic Cyber Attacks by Philipp S. Kruger.mp4 116.4 MB
CODE BLUE/CODE BLUE 2018/Practical method and practice of OSINT for cyber defense by Ataru Ishii.mp4 104.8 MB
CODE BLUE/CODE BLUE 2018/Privacy by Design Methodology by Vanessa Henri.eng.srt 57 KB
CODE BLUE/CODE BLUE 2018/Privacy by Design Methodology by Vanessa Henri.mp4 80.9 MB
CODE BLUE/CODE BLUE 2018/RCE with Captive Portal by Yongtao Wang, Yunfei Yang, Kunzhe Chai.mp4 37.6 MB
CODE BLUE/CODE BLUE 2018/Reading the norms of cyberspace - by Koichiro Sparky Komiyama.mp4 86.6 MB
CODE BLUE/CODE BLUE 2018/Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.eng.srt 63 KB
CODE BLUE/CODE BLUE 2018/Remotely Cracking Smart Gun Safes by Austin Fletcher, Daniel Su.mp4 90.1 MB
CODE BLUE/CODE BLUE 2018/Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.eng.srt 51 KB
CODE BLUE/CODE BLUE 2018/Smart Contract Honeypots for Profit (and probably Fun) by Ben Schmidt.mp4 69 MB
CODE BLUE/CODE BLUE 2018/Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.eng.srt 46 KB
CODE BLUE/CODE BLUE 2018/Smart Fuzzing XPC & XNU by Juwei Lin, Lilang Wu, Moony Li.mp4 89.5 MB
CODE BLUE/CODE BLUE 2018/The concepts and legality of Active Cyber Defense - Japanese perspective by Ikuo Takahashi.mp4 79.6 MB
CODE BLUE/CODE BLUE 2018/The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.eng.srt 78 KB
CODE BLUE/CODE BLUE 2018/The Decalogue(ish) of Contractual Security Sins by Sebastian Avarvarei.mp4 136.6 MB
CODE BLUE/CODE BLUE 2018/The Mystery of WannaCry Mutants - by Makoto Iwamura.mp4 106.6 MB
CODE BLUE/CODE BLUE 2018/uclear Weapons and Cyber Risks by Julia Franziska Berghofer.eng.srt 60 KB
CODE BLUE/CODE BLUE 2018/uclear Weapons and Cyber Risks by Julia Franziska Berghofer.mp4 96.9 MB
CODE BLUE/CODE BLUE 2018/Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt 50 KB
CODE BLUE/CODE BLUE 2018/Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4 88.8 MB
CODE BLUE/CODE BLUE 2018/WHAT THE FAX by Yaniv Balmas, Eyal Itkin.eng.srt 68 KB
CODE BLUE/CODE BLUE 2018/WHAT THE FAX by Yaniv Balmas, Eyal Itkin.mp4 100.4 MB
CODE BLUE/CODE BLUE 2018/Who's guarding the gateway - by Nicole Beckwith.eng.srt 38 KB
CODE BLUE/CODE BLUE 2018/Who's guarding the gateway - by Nicole Beckwith.mp4 67.1 MB
CODE BLUE/CODE BLUE 2018/Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.eng.srt 38 KB
CODE BLUE/CODE BLUE 2018/Wow, PESSR has Eroded Apple in Blink by Ju Zhu, Moony Li, Lilang Wu.mp4 74.2 MB
CODE BLUE/CODE BLUE 2019/[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.eng.srt 24 KB
CODE BLUE/CODE BLUE 2019/[BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4 50 MB
CODE BLUE/CODE BLUE 2019/[BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4 46.7 MB
CODE BLUE/CODE BLUE 2019/Applicability of GDPR and APPI to international companies and the impact on IT Security.eng.srt 58 KB
CODE BLUE/CODE BLUE 2019/Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4 100.3 MB
CODE BLUE/CODE BLUE 2019/Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.eng.srt 43 KB
CODE BLUE/CODE BLUE 2019/Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4 63.6 MB
CODE BLUE/CODE BLUE 2019/Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4 36.8 MB
CODE BLUE/CODE BLUE 2019/Coinbase and the Firefox 0-day by Philip Martin.eng.srt 54 KB
CODE BLUE/CODE BLUE 2019/Coinbase and the Firefox 0-day by Philip Martin.mp4 68.2 MB
CODE BLUE/CODE BLUE 2019/Hardware Wallet Security by Sergei Volokitin.eng.srt 61 KB
CODE BLUE/CODE BLUE 2019/Hardware Wallet Security by Sergei Volokitin.mp4 74.9 MB
CODE BLUE/CODE BLUE 2019/Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.eng.srt 79 KB
CODE BLUE/CODE BLUE 2019/Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4 105.5 MB
CODE BLUE/CODE BLUE 2019/KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.eng.srt 53 KB
CODE BLUE/CODE BLUE 2019/KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4 77.1 MB
CODE BLUE/CODE BLUE 2019/KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.eng.srt 83 KB
CODE BLUE/CODE BLUE 2019/KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4 102.7 MB
CODE BLUE/CODE BLUE 2019/Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.eng.srt 35 KB
CODE BLUE/CODE BLUE 2019/Let's Make Windows Defender Angry Antivirus can be an oracle by Ryo Ichikawa.mp4 74.5 MB
CODE BLUE/CODE BLUE 2019/Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.eng.srt 43 KB
CODE BLUE/CODE BLUE 2019/Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4 53 MB
CODE BLUE/CODE BLUE 2019/MalCfgParser A Lightweight Malware Configuration Parsing Tool.eng.srt 17 KB
CODE BLUE/CODE BLUE 2019/MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4 33 MB
CODE BLUE/CODE BLUE 2019/Recent APT attack on crypto exchange employees by Heungsoo Kang.eng.srt 49 KB
CODE BLUE/CODE BLUE 2019/Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4 80.8 MB
CODE BLUE/CODE BLUE 2019/Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4 64.5 MB
CODE BLUE/CODE BLUE 2019/Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4 94.3 MB
CODE BLUE/CODE BLUE 2019/Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.eng.srt 58 KB
CODE BLUE/CODE BLUE 2019/Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4 85.3 MB
CODE BLUE/CODE BLUE 2019/tknk scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4 87 MB
CODE BLUE/CODE BLUE 2019/Wifi sniffing with the WifiKraken by Mike Spicer.eng.srt 66 KB
CODE BLUE/CODE BLUE 2019/Wifi sniffing with the WifiKraken by Mike Spicer.mp4 114.4 MB
CODE BLUE/CODE BLUE 2020/ Keynote1 - Ms. Audrey Guinchard.eng.srt 40 KB
CODE BLUE/CODE BLUE 2020/ Keynote1 - Ms. Audrey Guinchard.mp4 36.5 MB
CODE BLUE/CODE BLUE 2020/ Keynote2 - Practical and Intelligent Incident Response Planning.eng.srt 46 KB
CODE BLUE/CODE BLUE 2020/ Keynote2 - Practical and Intelligent Incident Response Planning.mp4 51.7 MB
CODE BLUE/CODE BLUE 2020/Alliance power for Cyber Security.eng.srt 23 KB
CODE BLUE/CODE BLUE 2020/Alliance power for Cyber Security.mp4 26.5 MB
CODE BLUE/CODE BLUE 2020/Apk-medit memory search and patch tool for APK without root & android NDK.eng.srt 15 KB
CODE BLUE/CODE BLUE 2020/Apk-medit memory search and patch tool for APK without root & android NDK.mp4 16.9 MB
CODE BLUE/CODE BLUE 2020/Automated Hunting for Cross-Server Xrefs in Microsoft RPC and COM.mp4 31.6 MB
CODE BLUE/CODE BLUE 2020/Cryfind - A Static Tool to Identify Cryptographic Algorithm in Binary.mp4 22.8 MB
CODE BLUE/CODE BLUE 2020/DeClang ハッキング対策コンパイラ - DeClang Anti-hacking compiler.mp4 22.9 MB
CODE BLUE/CODE BLUE 2020/Defending Computer CriminalsPresented - Andrea Monti.eng.srt 37 KB
CODE BLUE/CODE BLUE 2020/Defending Computer CriminalsPresented - Andrea Monti.mp4 26.9 MB
CODE BLUE/CODE BLUE 2020/Dissecting China’s Information Operations with Threat Intelligence.eng.srt 35 KB
CODE BLUE/CODE BLUE 2020/Dissecting China’s Information Operations with Threat Intelligence.mp4 44 MB
CODE BLUE/CODE BLUE 2020/Don't Be Silly - It's Only a Lightbulb.eng.srt 48 KB
CODE BLUE/CODE BLUE 2020/Don't Be Silly - It's Only a Lightbulb.mp4 81.1 MB
CODE BLUE/CODE BLUE 2020/Drones' Cryptanalysis - Detecting Spying Drones.eng.srt 47 KB
CODE BLUE/CODE BLUE 2020/Drones' Cryptanalysis - Detecting Spying Drones.mp4 41.8 MB
CODE BLUE/CODE BLUE 2020/Ethereum 2.0のセキュリティ.mp4 27.3 MB
CODE BLUE/CODE BLUE 2020/Frankenstein - Uncovering Bugs in Embedded Firmware and Android with Full-Stack Fuzzing.mp4 35 MB
CODE BLUE/CODE BLUE 2020/Hunting kernel exploits with filesystem fuzzer.eng.srt 31 KB
CODE BLUE/CODE BLUE 2020/Hunting kernel exploits with filesystem fuzzer.mp4 33.8 MB
CODE BLUE/CODE BLUE 2020/Illicit QQ Communities What's Being Shared.eng.srt 39 KB
CODE BLUE/CODE BLUE 2020/Illicit QQ Communities What's Being Shared.mp4 26.8 MB
CODE BLUE/CODE BLUE 2020/It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.eng.srt 42 KB
CODE BLUE/CODE BLUE 2020/It is a World Wide Web, but All Politics is Local Planning to Survive a Balkanizing Internet.mp4 53.2 MB
CODE BLUE/CODE BLUE 2020/Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.eng.srt 52 KB
CODE BLUE/CODE BLUE 2020/Kr00k Serious vulnerability affected encryption of billion Wi-Fi devices.mp4 49.4 MB
CODE BLUE/CODE BLUE 2020/Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.eng.srt 47 KB
CODE BLUE/CODE BLUE 2020/Lamphone Real-Time Passive Sound Recovery from Light Bulb Vibrations.mp4 40.2 MB
CODE BLUE/CODE BLUE 2020/Law Enforcement Access to Transborder.eng.srt 48 KB
CODE BLUE/CODE BLUE 2020/Law Enforcement Access to Transborder.mp4 50.6 MB
CODE BLUE/CODE BLUE 2020/Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.eng.srt 40 KB
CODE BLUE/CODE BLUE 2020/Life After Privacy Shield - Will Data Transfer Laws Stop the World Doing Business.mp4 41.4 MB
CODE BLUE/CODE BLUE 2020/LogonTracer v1.5 - Elasticsearch = Real-time AD Log Analysis System.mp4 39 MB
CODE BLUE/CODE BLUE 2020/Operation Chimera - APT Operation Targets Semiconductor Vendors.mp4 54.6 MB
CODE BLUE/CODE BLUE 2020/Operation I am Tom How APT actors move laterally in corporate networks.eng.srt 42 KB
CODE BLUE/CODE BLUE 2020/Operation I am Tom How APT actors move laterally in corporate networks.mp4 49.2 MB
CODE BLUE/CODE BLUE 2020/Privacy protection and Data breach incident response regulation in East Asia and Europe.eng.srt 38 KB
CODE BLUE/CODE BLUE 2020/Privacy protection and Data breach incident response regulation in East Asia and Europe.mp4 40.7 MB
CODE BLUE/CODE BLUE 2020/Reflex you give me a parser, I give you a token generator.eng.srt 43 KB
CODE BLUE/CODE BLUE 2020/Reflex you give me a parser, I give you a token generator.mp4 34.1 MB
CODE BLUE/CODE BLUE 2020/Reverse Engineering archeology.mp4 64.5 MB
CODE BLUE/CODE BLUE 2020/SOARによるセキュリティ監視業務の効率化とSecOps.mp4 31.7 MB
CODE BLUE/CODE BLUE 2020/Speccial Session - Digital Social Innovation.eng.srt 43 KB
CODE BLUE/CODE BLUE 2020/Speccial Session - Digital Social Innovation.mp4 78.9 MB
CODE BLUE/CODE BLUE 2020/Vulnerabilities of Machine Learning Infrastructure.mp4 42.9 MB
CODE BLUE/CODE BLUE 2020/Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.eng.srt 45 KB
CODE BLUE/CODE BLUE 2020/Who stole My 100,000 Dollars’ Worth Bitcoin Wallets - Catch Them All With New Deceptive Bait.mp4 49.5 MB
CODE BLUE/CODE BLUE 2020/サイバーデブリをどう片づけるか? ~感染 脆弱IoT機器の発見、観測、分析、通知活動の今~.mp4 36.7 MB
CODE BLUE/CODE BLUE 2020/虚偽情報は真実よりも魅力的か?:ソーシャルメディアにおける虚偽情報の拡散を低減する.mp4 34.9 MB
CODE BLUE/CODE BLUE 2020/説明可能な悪性ドメイン診断.mp4 47.1 MB
CODE BLUE/CODE BLUE 2021/Appearances are deceiving Novel offensive techniques in Windows 10 11 on ARM.mp4 46 MB
CODE BLUE/CODE BLUE 2021/Day1 Closing.mp4 4.3 MB
CODE BLUE/CODE BLUE 2021/Day1 Opening.mp4 6.4 MB
CODE BLUE/CODE BLUE 2021/Day2 Event Closing.mp4 25.9 MB
CODE BLUE/CODE BLUE 2021/Day2 Online Closing.mp4 9.1 MB
CODE BLUE/CODE BLUE 2021/Day2 Opening.mp4 13.5 MB
CODE BLUE/CODE BLUE 2021/Hacking the Code Blue Seas Maritime Community Building Across the Pacific.eng.srt 41 KB
CODE BLUE/CODE BLUE 2021/Hacking the Code Blue Seas Maritime Community Building Across the Pacific.mp4 34.1 MB
CODE BLUE/CODE BLUE 2021/Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.eng.srt 51 KB
CODE BLUE/CODE BLUE 2021/Keynote1 - Shaking the Cybersecurity Kaleidoscope - An Immersive Look into Human Behaviour.mp4 38.9 MB
CODE BLUE/CODE BLUE 2021/Last Mile Problem Third Party Scripts included by Web Marketers and their Dangers.mp4 29.7 MB
CODE BLUE/CODE BLUE 2021/MUSHIKAGO IT and OT Automation Penetration testing Tool Using Game AI.mp4 33.2 MB
CODE BLUE/CODE BLUE 2021/NAS as Not As Secure.eng.srt 50 KB
CODE BLUE/CODE BLUE 2021/NAS as Not As Secure.mp4 26.9 MB
CODE BLUE/CODE BLUE 2021/Non-Private Chat Police investigation legislation in the flat world.eng.srt 48 KB
CODE BLUE/CODE BLUE 2021/Non-Private Chat Police investigation legislation in the flat world.mp4 38.7 MB
CODE BLUE/CODE BLUE 2021/Operation Software Concepts A Beautiful Envelope for Wrapping Weapon.mp4 29 MB
CODE BLUE/CODE BLUE 2021/ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt 57 KB
CODE BLUE/CODE BLUE 2021/ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4 40.4 MB
CODE BLUE/CODE BLUE 2021/The Lazarus Group's Attack Operations Targeting Japan.mp4 47.9 MB
CODE BLUE/CODE BLUE 2021/The security thing - Knowledge, skills, and two more things.mp4 91.4 MB
CODE BLUE/CODE BLUE 2021/Were - 2020 - Subdomains Abused Actually - Mining the Real Threat Hidden in Subdomains.mp4 46.2 MB
CODE BLUE/CODE BLUE 2022/[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embedded ..mp4 18.8 MB
CODE BLUE/CODE BLUE 2022/[U25]Are Embedded Devices Ready for ROP Attacks -ROP verification for low-spec embeddedeng.srt 29 KB
CODE BLUE/CODE BLUE 2022/[U25]Under the hood of Wslink’s multilayered virtual machine.eng.srt 43 KB
CODE BLUE/CODE BLUE 2022/[U25]Under the hood of Wslink’s multilayered virtual machine.mp4 31.8 MB
CODE BLUE/CODE BLUE 2022/Closing adddress.eng.srt 34 KB
CODE BLUE/CODE BLUE 2022/Closing adddress.mp4 46 MB
CODE BLUE/CODE BLUE 2022/CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.eng.srt 41 KB
CODE BLUE/CODE BLUE 2022/CloudDragon’s Credential Factory is Powering Up Its Espionage Activities Against All the.mp4 34.2 MB
CODE BLUE/CODE BLUE 2022/Fight Against Malware Development Life Cycle.eng.srt 55 KB
CODE BLUE/CODE BLUE 2022/Fight Against Malware Development Life Cycle.mp4 42.6 MB
CODE BLUE/CODE BLUE 2022/From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.eng.srt 53 KB
CODE BLUE/CODE BLUE 2022/From Parroting to Echoing The Evolution of China’s Bots-Driven InfoOps targeting Taiwan.mp4 44.3 MB
CODE BLUE/CODE BLUE 2022/Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.eng.srt 40 KB
CODE BLUE/CODE BLUE 2022/Hayabusa - Threat Hunting and Fast Forensics in Windows environments for free.mp4 38.4 MB
CODE BLUE/CODE BLUE 2022/Ipa-medit Memory modification tool for iOS apps without Jailbreaking.eng.srt 23 KB
CODE BLUE/CODE BLUE 2022/Ipa-medit Memory modification tool for iOS apps without Jailbreaking.mp4 20.7 MB
CODE BLUE/CODE BLUE 2022/KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.eng.srt 80 KB
CODE BLUE/CODE BLUE 2022/KeynoteUnderwhelmed Making Sense of the Overwhelming Challenge of Cybersecurity.mp4 50 MB
CODE BLUE/CODE BLUE 2022/Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS.mp4 40.1 MB
CODE BLUE/CODE BLUE 2022/Opening.eng.srt 14 KB
CODE BLUE/CODE BLUE 2022/Opening.mp4 21.5 MB
CODE BLUE/CODE BLUE 2022/Red light in the factory - From 0 to 100 OT adversary emulation.eng.srt 39 KB
CODE BLUE/CODE BLUE 2022/Red light in the factory - From 0 to 100 OT adversary emulation.mp4 31.9 MB
CODE BLUE/CODE BLUE 2022/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.eng.srt 73 KB
CODE BLUE/CODE BLUE 2022/Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All.mp4 42.1 MB
CODE BLUE/CODE BLUE 2022/Sisyphus and the CVE Feed Vulnerability Management at Scale.eng.srt 75 KB
CODE BLUE/CODE BLUE 2022/Sisyphus and the CVE Feed Vulnerability Management at Scale.mp4 40.9 MB
CODE BLUE/CODE BLUE 2022/SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.eng.srt 49 KB
CODE BLUE/CODE BLUE 2022/SMARTIAN Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses.mp4 34.6 MB
CODE BLUE/CODE BLUE 2022/Tales of 5G hacking.eng.srt 66 KB
CODE BLUE/CODE BLUE 2022/Tales of 5G hacking.mp4 53.1 MB
CODE BLUE/CODE BLUE 2022/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discuss..mp4 87.1 MB
CODE BLUE/CODE BLUE 2022/The Present and Future of Coordinated Vulnerability Disclosure - International Panel Discusseng.srt 84 KB
CODE BLUE/CODE BLUE 2022/Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.eng.srt 47 KB
CODE BLUE/CODE BLUE 2022/Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulation and Scanning.mp4 40.3 MB
CODE BLUE/CODE BLUE 2022/What I learned from the direct confrontation with the adversaries who hid C&C server.eng.srt 64 KB
CODE BLUE/CODE BLUE 2022/What I learned from the direct confrontation with the adversaries who hid C&C server.mp4 42.4 MB
CODE BLUE/CODE BLUE 2022/Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.eng.srt 60 KB
CODE BLUE/CODE BLUE 2022/Who is the Mal-Gopher - Implementation and Evaluation of gimpfuzzy for Go Malware Class.mp4 34.6 MB
CODE BLUE/CODE BLUE 2022/Your Printer is not your Printer - Hacking Printers at Pwn2Own.mp4 32.4 MB
CODE BLUE/CODE BLUE 2022/「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.eng.srt 84 KB
CODE BLUE/CODE BLUE 2022/「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション.mp4 87.2 MB
CODE BLUE/CODE BLUE 2023/A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.eng.srt 54 KB
CODE BLUE/CODE BLUE 2023/A 3-Year Tale of Hacking a Pwn2Own Target The Attacks, Vendor Evolution, and Lesson Learneds.mp4 49.8 MB
CODE BLUE/CODE BLUE 2023/BSides Tokyo 2024.eng.srt 41 KB
CODE BLUE/CODE BLUE 2023/BSides Tokyo 2024.mp4 52.8 MB
CODE BLUE/CODE BLUE 2023/Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.eng.srt 68 KB
CODE BLUE/CODE BLUE 2023/Bypassing macOS Security and Privacy Mechanisms From Gatekeeper to System Integrity Protectio.mp4 45.5 MB
CODE BLUE/CODE BLUE 2023/Closing Keynote Cyber and Security in Times of War.eng.srt 56 KB
CODE BLUE/CODE BLUE 2023/Closing Keynote Cyber and Security in Times of War.mp4 35.7 MB
CODE BLUE/CODE BLUE 2023/Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.eng.srt 51 KB
CODE BLUE/CODE BLUE 2023/Deep-Kernel Treasure Hunt Finding exploitable structures in the Linux kernel.mp4 28.5 MB
CODE BLUE/CODE BLUE 2023/Digital sovereignty - shaping regulatory responses to technological dominance.eng.srt 60 KB
CODE BLUE/CODE BLUE 2023/Digital sovereignty - shaping regulatory responses to technological dominance.mp4 43.9 MB
CODE BLUE/CODE BLUE 2023/Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.eng.srt 42 KB
CODE BLUE/CODE BLUE 2023/Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis.mp4 28.4 MB
CODE BLUE/CODE BLUE 2023/filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.eng.srt 49 KB
CODE BLUE/CODE BLUE 2023/filename - in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen.mp4 37.1 MB
CODE BLUE/CODE BLUE 2023/Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.eng.srt 60 KB
CODE BLUE/CODE BLUE 2023/Hi My Name Is [What] Abusing DHCP To Spoof DNS Records.mp4 42.6 MB
CODE BLUE/CODE BLUE 2023/International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.eng.srt 61 KB
CODE BLUE/CODE BLUE 2023/International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence'.mp4 69.6 MB
CODE BLUE/CODE BLUE 2023/KeynoteIf It's Smart, It's Vulnerable.eng.srt 65 KB
CODE BLUE/CODE BLUE 2023/KeynoteIf It's Smart, It's Vulnerable.mp4 60.1 MB
CODE BLUE/CODE BLUE 2023/Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.eng.srt 55 KB
CODE BLUE/CODE BLUE 2023/Modems (and telecoms) are also not as secure - 6 0-days to 4 million modems within a week.mp4 43.3 MB
CODE BLUE/CODE BLUE 2023/Open Sesame The full story behind opening a smart lock.eng.srt 47 KB
CODE BLUE/CODE BLUE 2023/Open Sesame The full story behind opening a smart lock.mp4 41.2 MB
CODE BLUE/CODE BLUE 2023/OSBT OpenID Connect Scenario-Based Tester.eng.srt 54 KB
CODE BLUE/CODE BLUE 2023/OSBT OpenID Connect Scenario-Based Tester.mp4 48.3 MB
CODE BLUE/CODE BLUE 2023/Pennywise - Invisible privacy risk in the new AI era.eng.srt 53 KB
CODE BLUE/CODE BLUE 2023/Pennywise - Invisible privacy risk in the new AI era.mp4 42.7 MB
CODE BLUE/CODE BLUE 2023/Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.eng.srt 66 KB
CODE BLUE/CODE BLUE 2023/Power Automate C2 Stealth Living-Off-the-Cloud C2 Framework.mp4 42.4 MB
CODE BLUE/CODE BLUE 2023/Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.eng.srt 33 KB
CODE BLUE/CODE BLUE 2023/Pwning Electron Application - Analysis and Defense of Vulnerabilities in Electron Applications.mp4 20.6 MB
CODE BLUE/CODE BLUE 2023/stelftools cross-architecture static library detector for IoT malware.eng.srt 63 KB
CODE BLUE/CODE BLUE 2023/stelftools cross-architecture static library detector for IoT malware.mp4 58.8 MB
CODE BLUE/CODE BLUE 2023/The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.eng.srt 55 KB
CODE BLUE/CODE BLUE 2023/The Dark Side of Cloud Computing How Threat Actors Abuse Millions of Dollars of Cloud Compute.mp4 30.2 MB
CODE BLUE/CODE BLUE 2023/The Renaissance of Cyber Physical Offensive Capabilities.eng.srt 73 KB
CODE BLUE/CODE BLUE 2023/The Renaissance of Cyber Physical Offensive Capabilities.mp4 39.5 MB
CODE BLUE/CODE BLUE 2023/Unlocking the Drive Exploiting Tesla Model 3.eng.srt 47 KB
CODE BLUE/CODE BLUE 2023/Unlocking the Drive Exploiting Tesla Model 3.mp4 45.2 MB
CODE BLUE/CODE BLUE 2023/Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.eng.srt 59 KB
CODE BLUE/CODE BLUE 2023/Windows Event Log Internals Understanding the Core Mechanisms for Enhanced Security.mp4 58.3 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
CODE BLUE Video 15.2 GB 7
[Blue Bean (Kaname Aomame)] C2lemon@Max 7 (Code Geass Lelouch of the Rebellion) [English] =TB=.zip Application 39.1 MB 6
Unrise - 2021 - Code Blue Audio 122.3 MB 1
[Blue Bean (Kaname Aomame)] C2lemon@Max 4 (Code Geass: Lelouch of the Rebellion) [Digital] Image 17.6 MB 5
Blue Code Of Silence (2020) [720p] [WEBRip] [YTS.MX] Video 686.5 MB 151
Blue Code Of Silence (2020) [1080p] [WEBRip] [YTS.MX] Video 1.2 GB 38
[Blue Bean (Kaname Aomame)] C2lemon@Max 3 (Code Geass Lelouch of the Rebellion) [English] [Panatical] [Digital] Image 23 MB 9
Code Blue Murder S01 2019 720p WEB-DL x264 BONE Video 747.5 MB 5
Code Blue -急救直升机-.Code.Blue.Doctor.Heli.Kinkyu.Kyumei.S02E01.Chi_Jap.BDrip.1280X720-ZhuixinFan.mp4 Video 787.2 MB 4
Code.Blue.Murder.S01.1080p.AMZN.WEBRip.DDP2.0.x264-NTb[rartv] Video 5.8 GB 4
[Blue Bean (Kaname Aomame)] C2lemon@Max 2 (CODE GEASS: Lelouch of the Rebellion) [Chinese] [不咕鸟汉化组] [Digital] Image 19.8 MB 4
(C83) [Blue Bean (Kaname Aomame)] C2lemon@M (Code Geass: Lelouch of the Rebellion) [Chinese] [全彩版个人重嵌] [Decensored] [Colorized] Image 16.7 MB 3
Blue.Code.of.Silence.2020.1080p.WEBRip.x265-RARBG Video 1.2 GB 3
[Blue Bean (Kaname Aomame)] C2lemon@V c2 (CODE GEASS: Lelouch of the Rebellion) [English] {Hennojin} [Digital] Image 16.8 MB 2
Mega.Zoo.S01E09.Code.Blue.ANPL.WEBRip.AAC2.0.x264-BOOP[TGx] Video 347.1 MB 1
紧急救命.Code.Blue.the.Movie.2018.JAPANESE.1080p.BluRay.H264.AAC-中文字幕.mkv Video 2.6 GB 61
[Blue Bean (Kaname Aomame)] C2lemon@Max 3 (Code Geass Lelouch of the Rebellion) [English] [Panatical] [Digital].zip Application 52.3 MB 51
Code Blue The Movie (2018) [1080p] [BluRay] [5.1] [YTS.MX] Video 2.4 GB 34
[Blue Bean (Kaname Aomame)] C2lemonV.c2 (CODE GEASS: Lelouch of the Rebellion) [Digital] [Chinese].zip Application 28.7 MB 31
www.SceneTime.com - Code Blue Murder S01E02 The Murder of John Jack Williams HDTV Video 211.2 MB 30

Loading...