BITCQ

DerbyCon8

Size: 19.1 GB
Magnet link

Name Size
DerbyCon8/DerbyCon8_meta.sqlite 289 KB
DerbyCon8/.____padding_file/126 1.7 MB
DerbyCon8/DerbyCon8_meta.xml 768 B
DerbyCon8/.____padding_file/1 2 MB
DerbyCon8/Derbycon-8-Closing-Ceremonies.mp4 290.2 MB
DerbyCon8/.____padding_file/125 1.8 MB
DerbyCon8/Derbycon-8-Opening-Ceremony.mp4 147.8 MB
DerbyCon8/.____padding_file/124 230 KB
DerbyCon8/Keynote-00-How-to-influence-security-technology-in-kiwi-underpants-Benjamin-Delpy.mp4 104 MB
DerbyCon8/.____padding_file/123 2 MB
DerbyCon8/Keynote-01-Panel-Discussion-At-a-Glance-Information-Security-Ed-Skoudis-John-Strand-Lesley-Carhart-Moderated-by-Dave-Kennedy.mp4 603.4 MB
DerbyCon8/.____padding_file/122 572 KB
DerbyCon8/Stable-00-Red-Teaming-gaps-and-musings-Samuel-Sayen.mp4 67.7 MB
DerbyCon8/.____padding_file/121 266 KB
DerbyCon8/Stable-01-A-Process-is-No-One-Hunting-for-Token-Manipulation-Jared-Atkinson-Robby-Winchester.mp4 89.5 MB
DerbyCon8/.____padding_file/120 476 KB
DerbyCon8/Stable-02-Fuzz-your-smartphone-from-4G-base-station-side-Tso-Jen-Liu.mp4 68.2 MB
DerbyCon8/.____padding_file/119 1.8 MB
DerbyCon8/Stable-03-Clippy-for-the-Dark-Web-Looks-Like-Youre-Trying-to-Buy-Some-Dank-Kush-Can-I-Help-You-With-That-Emma-Zaballos.mp4 130.7 MB
DerbyCon8/.____padding_file/118 1.3 MB
DerbyCon8/Stable-04-Synfuzz-Building-a-Grammar-Based-Re-targetable-Test-Generation-Framework-Joe-Rozner.mp4 143.6 MB
DerbyCon8/.____padding_file/117 431 KB
DerbyCon8/Stable-05-Escoteric-Hashcat-Attacks-Evilmog.mp4 52.2 MB
DerbyCon8/.____padding_file/116 1.8 MB
DerbyCon8/Stable-07-RFID-Luggage-Tags-IATA-vs-Real-Life-Daniel-Lagos.mp4 187.1 MB
DerbyCon8/.____padding_file/115 931 KB
DerbyCon8/Stable-08-LOL-They-Placed-Their-DMZ-in-the-Cloud-Easy-Pwnage-or-Disruptive-Protection-Carl-Alexander.mp4 55.3 MB
DerbyCon8/.____padding_file/114 734 KB
DerbyCon8/Stable-09-Maintaining-post-exploitation-opsec-in-a-world-with-EDR-Michael-Roberts-Martin-Roberts.mp4 147.6 MB
DerbyCon8/.____padding_file/113 416 KB
DerbyCon8/Stable-10-Hey-I-found-a-vulnerability-now-what-Lisa-Bradley-CRob.mp4 87.2 MB
DerbyCon8/.____padding_file/112 787 KB
DerbyCon8/Stable-11-Foxtrot-C2-A-Journey-of-Payload-Delivery-Dimitry-Snezhkov.mp4 83.3 MB
DerbyCon8/.____padding_file/111 749 KB
DerbyCon8/Stable-12-Ridesharks-Kaleb-Brown.mp4 37.3 MB
DerbyCon8/.____padding_file/110 768 KB
DerbyCon8/Stable-13-Tales-From-the-Bug-Mine-Highlights-from-the-Android-VRP-Brian-Claire-Young.mp4 41.4 MB
DerbyCon8/.____padding_file/109 583 KB
DerbyCon8/Stable-14-Decision-Analysis-Applications-in-Threat-Analysis-Frameworks-Emily-Shawgo.mp4 34.5 MB
DerbyCon8/.____padding_file/107 1.5 MB
DerbyCon8/Stable-15-Threat-Intel-On-The-Fly-Tazz.mp4 555.4 MB
DerbyCon8/.____padding_file/108 655 KB
DerbyCon8/Stable-16-Make-Me-Your-Dark-Web-Personal-Shopper-Emma-Zaballos.mp4 69.4 MB
DerbyCon8/.____padding_file/106 637 KB
DerbyCon8/Stable-17-Driving-Away-Social-Anxiety-Joey-Maresca.mp4 49.3 MB
DerbyCon8/.____padding_file/105 755 KB
DerbyCon8/Stable-18-Off-grid-coms-and-power-Justin-Herman.mp4 454.2 MB
DerbyCon8/.____padding_file/104 1.8 MB
DerbyCon8/Stable-19-CTFs-Leveling-Up-Through-Competition-Alex-Flores.mp4 50.4 MB
DerbyCon8/.____padding_file/103 1.6 MB
DerbyCon8/Stable-21-Extending-Burp-to-Find-Struts-and-XXE-Vulnerabilities-Chris-Elgee.mp4 47.8 MB
DerbyCon8/.____padding_file/102 217 KB
DerbyCon8/Stable-22-Introduction-to-x86-Assembly-DazzleCatDuo.mp4 50.9 MB
DerbyCon8/.____padding_file/101 1.1 MB
DerbyCon8/Stable-23-Pacu-Attack-and-Post-Exploitation-in-AWS-Spencer-Gietzen.mp4 101.2 MB
DerbyCon8/.____padding_file/100 774 KB
DerbyCon8/Stable-24-An-Inconvenient-Truth-Evading-the-Ransomware-Protection-in-Windows-10-Soya-Aoyama.mp4 89.6 MB
DerbyCon8/.____padding_file/99 394 KB
DerbyCon8/Stable-25-Brutal-Blogging-Go-for-the-Jugular-Kate-Brew.mp4 78.4 MB
DerbyCon8/.____padding_file/98 1.6 MB
DerbyCon8/Stable-26-RID-Hijacking-Maintaining-Access-on-Windows-Machines-Sebastin-Castro.mp4 90 MB
DerbyCon8/.____padding_file/97 2 MB
DerbyCon8/Stable-27-Your-Training-Data-is-Bad-and-You-Should-Feel-Bad-Ryan-J-OGrady.mp4 71 MB
DerbyCon8/.____padding_file/96 1 MB
DerbyCon8/Stable-28-So-many-pentesting-tools-from-a-4-Arduino-Kevin-Bong-Michael-Vieau.mp4 62.1 MB
DerbyCon8/.____padding_file/95 1.9 MB
DerbyCon8/Stable-29-Patching-Show-me-where-it-hurts-Cheryl-Biswas.mp4 67.7 MB
DerbyCon8/.____padding_file/94 318 KB
DerbyCon8/Stable-30-Advanced-Deception-Technology-Through-Behavioral-Biometrics-Curt-Barnard-Dawud-Gordon.mp4 83.1 MB
DerbyCon8/.____padding_file/93 918 KB
DerbyCon8/Stable-31-We-are-all-on-the-spectrum-What-my-10-year-old-taught-me-about-leading-teams-Carla-A-Raisler.mp4 110.4 MB
DerbyCon8/.____padding_file/92 1.6 MB
DerbyCon8/Stable-32-No-Place-Like-Home-Real-Estate-OSINT-and-OPSec-Fails-John-Bullinger.mp4 60.6 MB
DerbyCon8/.____padding_file/91 1.4 MB
DerbyCon8/Stable-33-The-Layer2-Nightmare-Chris-Mallz.mp4 621.5 MB
DerbyCon8/.____padding_file/90 535 KB
DerbyCon8/Stable-34-Attacking-Azure-Environments-with-PowerShell-Karl-Fosaaen.mp4 56 MB
DerbyCon8/.____padding_file/89 2 MB
DerbyCon8/Stable-35-Blue-Blood-Injection-Transitioning-Red-to-Purple-Lsly-Ayyy.mp4 80 MB
DerbyCon8/.____padding_file/88 40 KB
DerbyCon8/Stable-36-Mirai-Satori-OMG-and-Owari-IoT-Botnets-Oh-My-Peter-Arzamendi.mp4 88.4 MB
DerbyCon8/.____padding_file/87 1.6 MB
DerbyCon8/Stable-37-Comparing-apples-to-Apple-Adam-Mathis.mp4 116.5 MB
DerbyCon8/.____padding_file/86 1.5 MB
DerbyCon8/Stable-38-How-online-dating-made-me-better-at-threat-modeling-Isaiah-Sarju.mp4 102.5 MB
DerbyCon8/.____padding_file/85 1.5 MB
DerbyCon8/Stable-39-Threat-Hunting-with-a-Raspberry-Pi-Jamie-Murdock.mp4 77 MB
DerbyCon8/.____padding_file/84 1013 KB
DerbyCon8/Stable-40-MA-Defense-and-Integration-All-that-Glitters-is-not-Gold-Sara-Leal-Jason-Morrow.mp4 178.6 MB
DerbyCon8/.____padding_file/83 1.4 MB
DerbyCon8/Track-1-00-IRS-HR-Microsoft-and-your-Grandma-What-they-all-have-in-common-Christopher-Hadnagy-Cat-Murdock.mp4 165.2 MB
DerbyCon8/.____padding_file/82 795 KB
DerbyCon8/Track-1-01-LOLBins-Nothing-to-LOL-about-Oddvar-Moe.mp4 132.2 MB
DerbyCon8/.____padding_file/81 1.8 MB
DerbyCon8/Track-1-02-Everything-Else-I-Learned-About-Security-I-Learned-From-Hip-Hop-Paul-Asadoorian.mp4 105.8 MB
DerbyCon8/.____padding_file/80 244 KB
DerbyCon8/Track-1-03-Hackers-Hugs-Drugs-Mental-Health-in-Infosec-Amanda-Berlin.mp4 425.1 MB
DerbyCon8/.____padding_file/79 955 KB
DerbyCon8/Track-1-04-Android-App-Penetration-Testing-101-Joff-Thyer-Derek-Banks.mp4 141.4 MB
DerbyCon8/.____padding_file/78 620 KB
DerbyCon8/Track-1-05-Draw-a-Bigger-Circle-InfoSec-Evolves-Cheryl-Biswas.mp4 133.8 MB
DerbyCon8/.____padding_file/77 155 KB
DerbyCon8/Track-1-06-Building-an-Empire-with-IronPython-Jim-Shaver.mp4 85.6 MB
DerbyCon8/.____padding_file/76 390 KB
DerbyCon8/Track-1-07-SAEDY-Subversion-and-Espionage-Directed-Against-You-Judy-Towers.mp4 163.5 MB
DerbyCon8/.____padding_file/75 522 KB
DerbyCon8/Track-1-08-OSXPirrit-Reverse-engineering-mac-OSX-malware-and-the-legal-department-of-the-company-who-makes-it-Amit-Serper-Niv-Yona-Yuval-Chuddy.mp4 251.9 MB
DerbyCon8/.____padding_file/74 139 KB
DerbyCon8/Track-1-09-How-to-test-Network-Investigative-TechniquesNITs-used-by-the-FBI-Dr-Matthew-Miller.mp4 100.7 MB
DerbyCon8/.____padding_file/73 1.3 MB
DerbyCon8/Track-1-10-Cloud-Computing-Therapy-Session-Cara-Marie-Andy-Cooper.mp4 104.7 MB
DerbyCon8/.____padding_file/72 1.3 MB
DerbyCon8/Track-1-11-Silent-Compromise-Social-Engineering-Fortune-500-Businesses-Joe-Gray.mp4 113.4 MB
DerbyCon8/.____padding_file/71 624 KB
DerbyCon8/Track-1-12-Dexter-the-friendly-forensics-expert-on-the-Coinbase-security-team-Hayden-Parker.mp4 78.6 MB
DerbyCon8/.____padding_file/70 1.4 MB
DerbyCon8/Track-1-13-Going-on-a-Printer-Safari-Hunting-Zebra-Printers-James-Edge.mp4 84.5 MB
DerbyCon8/.____padding_file/69 1.5 MB
DerbyCon8/Track-1-14-Social-Engineering-At-Work-How-to-use-positive-influence-to-gain-management-buy-in-for-anything-April-Wright.mp4 113.5 MB
DerbyCon8/.____padding_file/68 487 KB
DerbyCon8/Track-1-15-Ham-Radio-4-Hackers-Eric-Watkins-Devin-Noel.mp4 126.9 MB
DerbyCon8/.____padding_file/67 1.1 MB
DerbyCon8/Track-1-16-Getting-Control-of-Your-Vendors-Before-They-Take-You-Down-Dan-Browder.mp4 91.2 MB
DerbyCon8/.____padding_file/66 811 KB
DerbyCon8/Track-1-17-Cyber-Intelligence-There-Are-No-Rules-and-No-Certainties-Coleman-Kane.mp4 113.1 MB
DerbyCon8/.____padding_file/65 958 KB
DerbyCon8/Track-1-18-Getting-Started-in-CCDC-Russell-Nielsen.mp4 56.1 MB
DerbyCon8/.____padding_file/64 1.9 MB
DerbyCon8/Track-1-19-Changing-Our-Mindset-From-Technical-To-Psychological-Defenses-Andrew-Kalat.mp4 99.7 MB
DerbyCon8/.____padding_file/63 337 KB
DerbyCon8/Track-2-00-I-Can-Be-Apple-and-So-Can-You-Josh-Pitts.mp4 262.1 MB
DerbyCon8/.____padding_file/62 1.9 MB
DerbyCon8/Track-2-01-From-Workstation-to-Domain-Admin-Why-Secure-Administration-Isnt-Secure-and-How-to-Fix-It-Sean-Metcalf.mp4 345.9 MB
DerbyCon8/.____padding_file/61 51 KB
DerbyCon8/Track-2-02-MS17-010-zerosum0x0.mp4 324.2 MB
DerbyCon8/.____padding_file/60 1.8 MB
DerbyCon8/Track-2-03-The-Unintended-Risks-of-Trusting-Active-Directory-Lee-Christensen-Will-Schroeder-Matt-Nelson.mp4 414.4 MB
DerbyCon8/.____padding_file/59 1.6 MB
DerbyCon8/Track-2-04-Lessons-Learned-by-the-WordPress-Security-Team-Aaron-D-Campbell.mp4 317.6 MB
DerbyCon8/.____padding_file/58 426 KB
DerbyCon8/Track-2-05-IronPython-omfg-Marcello-Salvati.mp4 400.1 MB
DerbyCon8/.____padding_file/57 1.9 MB
DerbyCon8/Track-2-06-Hardware-Slashing-Smashing-and-Reconstructing-for-Root-access-Deral-Heiland.mp4 125 MB
DerbyCon8/.____padding_file/56 1020 KB
DerbyCon8/Track-2-07-App-o-Lockalypse-now-Oddvar-Moe.mp4 140.7 MB
DerbyCon8/.____padding_file/55 1.3 MB
DerbyCon8/Track-2-08-Web-App-101-Getting-the-lay-of-the-land-Mike-Saunders.mp4 85.7 MB
DerbyCon8/.____padding_file/54 319 KB
DerbyCon8/Track-2-09-Invoke-DOSfuscation-Techniques-FOR-F-IN-style-DO-S-level-CMD-Obfuscation-Daniel-Bohannon.mp4 115 MB
DerbyCon8/.____padding_file/53 1 MB
DerbyCon8/Track-2-10-WE-ARE-THE-ARTILLERY-Using-Google-Fu-To-Take-Down-The-Grids-Chris-Sistrunk-Krypt3ia-SynAckPwn.mp4 90.9 MB
DerbyCon8/.____padding_file/52 1.1 MB
DerbyCon8/Track-2-11-Just-Let-Yourself-In-David-Boyd.mp4 131.9 MB
DerbyCon8/.____padding_file/51 123 KB
DerbyCon8/Track-2-12-A-Crash-Course-in-Exploiting-Buffer-Overflows-Live-Demos-Parker-Garrison.mp4 116.6 MB
DerbyCon8/.____padding_file/50 1.4 MB
DerbyCon8/Track-2-13-Living-in-a-Secure-Container-Down-by-the-River-Jack-Mannino.mp4 78.7 MB
DerbyCon8/.____padding_file/49 1.3 MB
DerbyCon8/Track-2-14-Red-Mirror-Bringing-Telemetry-to-Red-Teaming-Zach-Grace.mp4 101.6 MB
DerbyCon8/.____padding_file/48 385 KB
DerbyCon8/Track-2-15-Two-Factor-Too-Furious-Evading-and-Protecting-Evolving-MFA-Schemes-Austin-Baker-Doug-Bienstock.mp4 96.9 MB
DerbyCon8/.____padding_file/47 1.1 MB
DerbyCon8/Track-2-16-IoT-Not-Even-Your-Bed-Is-Safe-Darby-Mullen.mp4 111.2 MB
DerbyCon8/.____padding_file/46 816 KB
DerbyCon8/Track-2-17-Fingerprinting-Encrypted-Channels-for-Detection-John-Althouse.mp4 70.8 MB
DerbyCon8/.____padding_file/45 1.2 MB
DerbyCon8/Track-2-18-On-the-Nose-Bypassing-Huaweis-Fingerprint-authentication-by-exploiting-the-TrustZone-Nick-Stephens.mp4 77.2 MB
DerbyCon8/.____padding_file/44 820 KB
DerbyCon8/Track-2-19-Bypassing-Port-Security-In-2018-Defeating-MacSEC-and-8021x-2010-Gabriel-Ryan.mp4 98.5 MB
DerbyCon8/.____padding_file/43 1.5 MB
DerbyCon8/Track-3-00-Invoke-EmpireHound-Merging-BloodHound-Empire-for-Enhanced-Red-Team-Workflow-Walter-Legowski.mp4 221.7 MB
DerbyCon8/.____padding_file/42 265 KB
DerbyCon8/Track-3-01-When-Macs-Come-Under-ATTCK-Richie-Cyrus.mp4 222.5 MB
DerbyCon8/.____padding_file/41 1.5 MB
DerbyCon8/Track-3-02-Abusing-IoT-Medical-Devices-For-Your-Precious-Health-Records-Saurabh-Harit-Nick-Delewski.mp4 253.7 MB
DerbyCon8/.____padding_file/40 351 KB
DerbyCon8/Track-3-03-Detecting-WMI-exploitation-Michael-Gough.mp4 258 MB
DerbyCon8/.____padding_file/39 2 MB
DerbyCon8/Track-3-04-Gryffindor-Pure-JavaScript-Covert-Exploitation-Matthew-Toussain.mp4 210.9 MB
DerbyCon8/.____padding_file/38 1.1 MB
DerbyCon8/Track-3-05-Instant-Response-Making-IR-faster-than-you-thought-possible-Mick-Douglas-Josh-Johnson.mp4 231.4 MB
DerbyCon8/.____padding_file/37 663 KB
DerbyCon8/Track-3-06-VBA-Stomping-Advanced-Malware-Techniques-Carrie-Roberts-Kirk-Sayre-Harold-Ogden-.mp4 453.9 MB
DerbyCon8/.____padding_file/36 136 KB
DerbyCon8/Track-3-07-Media-hacks-an-Infosec-guide-to-dealing-with-journalists-Sean-Gallagher-Steve-Ragan-Paul-Wagenseil.mp4 354.5 MB
DerbyCon8/.____padding_file/35 1.5 MB
DerbyCon8/Track-3-08-Deploying-Deceptive-Systems-Luring-Attackers-from-the-Shadows-Kevin-Gennuso.mp4 191.7 MB
DerbyCon8/.____padding_file/34 338 KB
DerbyCon8/Track-3-09-The-Money-Laundering-Cannon-Real-cash-Real-Criminals-and-Real-Layoffs-Arian-Evans.mp4 259.8 MB
DerbyCon8/.____padding_file/33 206 KB
DerbyCon8/Track-3-10-Perfect-Storm-Taking-the-Helm-of-Kubernetes-Ian-Coldwater.mp4 281.2 MB
DerbyCon8/.____padding_file/32 783 KB
DerbyCon8/Track-3-11-How-to-put-on-a-Con-for-Fun-and-Non-Profit-Benny-Karnes-John-Moore-Rick-Hayes-Matt-Perry-Bill-Gardner-Justin-Rogosky-Mike-Fry-Steve-Truax.mp4 279.1 MB
DerbyCon8/.____padding_file/31 956 KB
DerbyCon8/Track-3-12-Web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly-Lee-Neely-Chelle-Clements-James-McMurry.mp4 210.9 MB
DerbyCon8/.____padding_file/30 1.1 MB
DerbyCon8/Track-3-13-Metasploit-Town-Hall-0x4-Brent-Cook-Aaron-Soto-Adam-Cammack-Cody-Pierce.mp4 281.4 MB
DerbyCon8/.____padding_file/29 615 KB
DerbyCon8/Track-3-14-Community-Based-Career-Development-or-How-to-Get-More-than-a-T-Shirt-When-Participating-as-part-of-the-Community-Kathleen-Smith-Magen-Wu-Cindy-Jones-Kathryn-Seymour-Kirsten-Renner.mp4 479.7 MB
DerbyCon8/.____padding_file/28 328 KB
DerbyCon8/Track-3-15-Goodbye-Obfuscation-Hello-Invisi-Shell-Hiding-Your-Powershell-Script-in-Plain-Sight-Omer-Yair.mp4 148.4 MB
DerbyCon8/.____padding_file/27 1.6 MB
DerbyCon8/Track-3-16-Cloud-Forensics-Putting-The-Bits-Back-Together-Brandon-Sherman-.mp4 149.1 MB
DerbyCon8/.____padding_file/26 888 KB
DerbyCon8/Track-3-17-Killsuit-The-Equation-Groups-Swiss-Army-knife-for-persistence-evasion-and-data-exfil-Francisco-Donoso.mp4 142.2 MB
DerbyCon8/.____padding_file/25 1.8 MB
DerbyCon8/Track-3-18-The-MS-Office-Magic-Show-Stan-Hegt-Pieter-Ceelen.mp4 126.9 MB
DerbyCon8/.____padding_file/24 1.1 MB
DerbyCon8/Track-3-19-Living-off-the-land-enterprise-post-exploitation-Adam-Reiser.mp4 74.5 MB
DerbyCon8/.____padding_file/23 1.5 MB
DerbyCon8/Track-3-20-Hillbilly-Storytime-Pentest-Fails-Adam-Compton.mp4 132 MB
DerbyCon8/.____padding_file/22 1 KB
DerbyCon8/Track-4-00-The-History-of-the-Future-of-Cyber-Education-Winn-Schwartau.mp4 462.3 MB
DerbyCon8/.____padding_file/2 1.7 MB
DerbyCon8/Track-4-01-State-of-Win32k-Security-Revisiting-Insecure-design-Vishal-Chauhan.mp4 61.9 MB
DerbyCon8/.____padding_file/3 100 KB
DerbyCon8/Track-4-02-Offensive-Browser-Extension-Development-Michael-Weber.mp4 90.2 MB
DerbyCon8/.____padding_file/4 1.8 MB
DerbyCon8/Track-4-03-Protect-Your-Payloads-Modern-Keying-Techniques-Leo-Loobeek.mp4 76.7 MB
DerbyCon8/.____padding_file/5 1.3 MB
DerbyCon8/Track-4-04-Jump-Into-IOT-Hacking-with-the-Damn-Vulnerable-Habit-Helper-Device-Nancy-Snoke-Phoenix-Snoke.mp4 86.5 MB
DerbyCon8/.____padding_file/6 1.5 MB
DerbyCon8/Track-4-06-Disaster-Strikes-A-Hackers-Cook-book-Jose-Quinones-Carlos-Perez.mp4 112.7 MB
DerbyCon8/.____padding_file/7 1.3 MB
DerbyCon8/Track-4-07-Ninja-Looting-Like-a-Pirate-Infojanitor.mp4 84.7 MB
DerbyCon8/.____padding_file/8 1.3 MB
DerbyCon8/Track-4-08-Hacking-Mobile-Applications-with-Frida-David-Coursey.mp4 163.5 MB
DerbyCon8/.____padding_file/9 554 KB
DerbyCon8/Track-4-09-Victor-or-Victim-Strategies-for-Avoiding-an-InfoSec-Cold-War-Jason-Lang-Stuart-McIntosh.mp4 134 MB
DerbyCon8/.____padding_file/10 2 MB
DerbyCon8/Track-4-10-Ubiquitous-Shells-Jon-Gorenflo.mp4 159.7 MB
DerbyCon8/.____padding_file/11 308 KB
DerbyCon8/Track-4-11-99-Reasons-Your-Perimeter-Is-Leaking-Evolution-of-CC-John-Askew.mp4 139.4 MB
DerbyCon8/.____padding_file/12 569 KB
DerbyCon8/Track-4-12-Ship-Hacking-a-Primer-for-Todays-Pirate-Brian-Satira-Brian-Olson.mp4 129.7 MB
DerbyCon8/.____padding_file/13 358 KB
DerbyCon8/Track-4-13-Code-Execution-with-JDK-Scripting-Tools-Nashorn-Javascript-Engine-Brett-Hawkins.mp4 84 MB
DerbyCon8/.____padding_file/14 2 MB
DerbyCon8/Track-4-14-PHONOPTICON-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget-Mark-Milhouse.mp4 167.8 MB
DerbyCon8/.____padding_file/15 187 KB
DerbyCon8/Track-4-15-Bug-Hunting-in-RouterOS-Jacob-Baines.mp4 95.1 MB
DerbyCon8/.____padding_file/16 879 KB
DerbyCon8/Track-4-16-Breaking-Into-Your-Building-A-Hackers-Guide-to-Unauthorized-Access-Tim-Roberts-Brent-White.mp4 113.3 MB
DerbyCon8/.____padding_file/17 715 KB
DerbyCon8/Track-4-17-The-making-of-an-iOS-11-jailbreak-Kiddie-to-kernel-hacker-in-14-sleepless-nights-Bryce-soen-Bearchell.mp4 73.3 MB
DerbyCon8/.____padding_file/18 689 KB
DerbyCon8/Track-4-18-Who-Watches-the-Watcher-Detecting-Hypervisor-Introspection-from-Unprivileged-Guests-Tomasz-Tuzel.mp4 76.6 MB
DerbyCon8/.____padding_file/19 1.4 MB
DerbyCon8/Track-4-19-Pwning-in-the-Sandbox-OSX-Macro-Exploitation-Beyond-Adam-Gold-Danny-Chrastil.mp4 83 MB
DerbyCon8/.____padding_file/20 996 KB
DerbyCon8/Track-4-20-IOCs-Today-Intelligence-Led-Security-Tomorrow-Katie-Kusjanovic-Matthew-Shelton.mp4 88.6 MB
DerbyCon8/.____padding_file/21 1.4 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DerbyCon8 Video 19.1 GB 1
DerbyCon8 Video 39.3 GB 3

Loading...