BITCQ

DerbyCon8

Size: 39.3 GB
Magnet link

Name Size
DerbyCon8/DerbyCon8_meta.sqlite 289 KB
DerbyCon8/.____padding_file/126 1.7 MB
DerbyCon8/DerbyCon8_meta.xml 768 B
DerbyCon8/.____padding_file/1 2 MB
DerbyCon8/Derbycon-8-Closing-Ceremonies.mp4 290.2 MB
DerbyCon8/.____padding_file/125 1.8 MB
DerbyCon8/Derbycon-8-Closing-Ceremonies.ogv 307.9 MB
DerbyCon8/.____padding_file/127 75 KB
DerbyCon8/Derbycon-8-Opening-Ceremony.mp4 147.8 MB
DerbyCon8/.____padding_file/124 230 KB
DerbyCon8/Derbycon-8-Opening-Ceremony.ogv 147.1 MB
DerbyCon8/.____padding_file/128 944 KB
DerbyCon8/Keynote-00-How-to-influence-security-technology-in-kiwi-underpants-Benjamin-Delpy.mp4 104 MB
DerbyCon8/.____padding_file/123 2 MB
DerbyCon8/Keynote-00-How-to-influence-security-technology-in-kiwi-underpants-Benjamin-Delpy.ogv 135.2 MB
DerbyCon8/.____padding_file/129 837 KB
DerbyCon8/Keynote-01-Panel-Discussion-At-a-Glance-Information-Security-Ed-Skoudis-John-Strand-Lesley-Carhart-Moderated-by-Dave-Kennedy.mp4 603.4 MB
DerbyCon8/.____padding_file/122 572 KB
DerbyCon8/Keynote-01-Panel-Discussion-At-a-Glance-Information-Security-Ed-Skoudis-John-Strand-Lesley-Carhart-Moderated-by-Dave-Kennedy.ogv 284.6 MB
DerbyCon8/.____padding_file/130 1.4 MB
DerbyCon8/Stable-00-Red-Teaming-gaps-and-musings-Samuel-Sayen.mp4 67.7 MB
DerbyCon8/.____padding_file/121 266 KB
DerbyCon8/Stable-00-Red-Teaming-gaps-and-musings-Samuel-Sayen.ogv 116.2 MB
DerbyCon8/.____padding_file/131 1.8 MB
DerbyCon8/Stable-01-A-Process-is-No-One-Hunting-for-Token-Manipulation-Jared-Atkinson-Robby-Winchester.mp4 89.5 MB
DerbyCon8/.____padding_file/120 476 KB
DerbyCon8/Stable-01-A-Process-is-No-One-Hunting-for-Token-Manipulation-Jared-Atkinson-Robby-Winchester.ogv 105.8 MB
DerbyCon8/.____padding_file/132 223 KB
DerbyCon8/Stable-02-Fuzz-your-smartphone-from-4G-base-station-side-Tso-Jen-Liu.mp4 68.2 MB
DerbyCon8/.____padding_file/119 1.8 MB
DerbyCon8/Stable-02-Fuzz-your-smartphone-from-4G-base-station-side-Tso-Jen-Liu.ogv 98.4 MB
DerbyCon8/.____padding_file/133 1.6 MB
DerbyCon8/Stable-03-Clippy-for-the-Dark-Web-Looks-Like-Youre-Trying-to-Buy-Some-Dank-Kush-Can-I-Help-You-With-That-Emma-Zaballos.mp4 130.7 MB
DerbyCon8/.____padding_file/118 1.3 MB
DerbyCon8/Stable-03-Clippy-for-the-Dark-Web-Looks-Like-Youre-Trying-to-Buy-Some-Dank-Kush-Can-I-Help-You-With-That-Emma-Zaballos.ogv 84.9 MB
DerbyCon8/.____padding_file/134 1.1 MB
DerbyCon8/Stable-04-Synfuzz-Building-a-Grammar-Based-Re-targetable-Test-Generation-Framework-Joe-Rozner.mp4 143.6 MB
DerbyCon8/.____padding_file/117 431 KB
DerbyCon8/Stable-04-Synfuzz-Building-a-Grammar-Based-Re-targetable-Test-Generation-Framework-Joe-Rozner.ogv 99.5 MB
DerbyCon8/.____padding_file/135 501 KB
DerbyCon8/Stable-05-Escoteric-Hashcat-Attacks-Evilmog.mp4 52.2 MB
DerbyCon8/.____padding_file/116 1.8 MB
DerbyCon8/Stable-05-Escoteric-Hashcat-Attacks-Evilmog.ogv 77.3 MB
DerbyCon8/.____padding_file/136 694 KB
DerbyCon8/Stable-07-RFID-Luggage-Tags-IATA-vs-Real-Life-Daniel-Lagos.mp4 187.1 MB
DerbyCon8/.____padding_file/115 931 KB
DerbyCon8/Stable-07-RFID-Luggage-Tags-IATA-vs-Real-Life-Daniel-Lagos.ogv 77.6 MB
DerbyCon8/.____padding_file/137 406 KB
DerbyCon8/Stable-08-LOL-They-Placed-Their-DMZ-in-the-Cloud-Easy-Pwnage-or-Disruptive-Protection-Carl-Alexander.mp4 55.3 MB
DerbyCon8/.____padding_file/114 734 KB
DerbyCon8/Stable-08-LOL-They-Placed-Their-DMZ-in-the-Cloud-Easy-Pwnage-or-Disruptive-Protection-Carl-Alexander.ogv 97 MB
DerbyCon8/.____padding_file/138 1 MB
DerbyCon8/Stable-09-Maintaining-post-exploitation-opsec-in-a-world-with-EDR-Michael-Roberts-Martin-Roberts.mp4 147.6 MB
DerbyCon8/.____padding_file/113 416 KB
DerbyCon8/Stable-09-Maintaining-post-exploitation-opsec-in-a-world-with-EDR-Michael-Roberts-Martin-Roberts.ogv 100.8 MB
DerbyCon8/.____padding_file/139 1.2 MB
DerbyCon8/Stable-10-Hey-I-found-a-vulnerability-now-what-Lisa-Bradley-CRob.mp4 87.2 MB
DerbyCon8/.____padding_file/112 787 KB
DerbyCon8/Stable-10-Hey-I-found-a-vulnerability-now-what-Lisa-Bradley-CRob.ogv 114.6 MB
DerbyCon8/.____padding_file/140 1.4 MB
DerbyCon8/Stable-11-Foxtrot-C2-A-Journey-of-Payload-Delivery-Dimitry-Snezhkov.mp4 83.3 MB
DerbyCon8/.____padding_file/111 749 KB
DerbyCon8/Stable-11-Foxtrot-C2-A-Journey-of-Payload-Delivery-Dimitry-Snezhkov.ogv 100.7 MB
DerbyCon8/.____padding_file/141 1.3 MB
DerbyCon8/Stable-12-Ridesharks-Kaleb-Brown.mp4 37.3 MB
DerbyCon8/.____padding_file/110 768 KB
DerbyCon8/Stable-12-Ridesharks-Kaleb-Brown.ogv 69.4 MB
DerbyCon8/.____padding_file/142 564 KB
DerbyCon8/Stable-13-Tales-From-the-Bug-Mine-Highlights-from-the-Android-VRP-Brian-Claire-Young.mp4 41.4 MB
DerbyCon8/.____padding_file/109 583 KB
DerbyCon8/Stable-13-Tales-From-the-Bug-Mine-Highlights-from-the-Android-VRP-Brian-Claire-Young.ogv 97.9 MB
DerbyCon8/.____padding_file/143 95 KB
DerbyCon8/Stable-14-Decision-Analysis-Applications-in-Threat-Analysis-Frameworks-Emily-Shawgo.mp4 34.5 MB
DerbyCon8/.____padding_file/107 1.5 MB
DerbyCon8/Stable-14-Decision-Analysis-Applications-in-Threat-Analysis-Frameworks-Emily-Shawgo.ogv 58.3 MB
DerbyCon8/.____padding_file/144 1.7 MB
DerbyCon8/Stable-15-Threat-Intel-On-The-Fly-Tazz.mp4 555.4 MB
DerbyCon8/.____padding_file/108 655 KB
DerbyCon8/Stable-15-Threat-Intel-On-The-Fly-Tazz.ogv 105.7 MB
DerbyCon8/.____padding_file/145 301 KB
DerbyCon8/Stable-16-Make-Me-Your-Dark-Web-Personal-Shopper-Emma-Zaballos.mp4 69.4 MB
DerbyCon8/.____padding_file/106 637 KB
DerbyCon8/Stable-16-Make-Me-Your-Dark-Web-Personal-Shopper-Emma-Zaballos.ogv 153.1 MB
DerbyCon8/.____padding_file/146 954 KB
DerbyCon8/Stable-17-Driving-Away-Social-Anxiety-Joey-Maresca.mp4 49.3 MB
DerbyCon8/.____padding_file/105 755 KB
DerbyCon8/Stable-17-Driving-Away-Social-Anxiety-Joey-Maresca.ogv 100.3 MB
DerbyCon8/.____padding_file/147 1.7 MB
DerbyCon8/Stable-18-Off-grid-coms-and-power-Justin-Herman.mp4 454.2 MB
DerbyCon8/.____padding_file/104 1.8 MB
DerbyCon8/Stable-18-Off-grid-coms-and-power-Justin-Herman.ogv 85.6 MB
DerbyCon8/.____padding_file/148 405 KB
DerbyCon8/Stable-19-CTFs-Leveling-Up-Through-Competition-Alex-Flores.mp4 50.4 MB
DerbyCon8/.____padding_file/103 1.6 MB
DerbyCon8/Stable-19-CTFs-Leveling-Up-Through-Competition-Alex-Flores.ogv 111.5 MB
DerbyCon8/.____padding_file/149 552 KB
DerbyCon8/Stable-21-Extending-Burp-to-Find-Struts-and-XXE-Vulnerabilities-Chris-Elgee.mp4 47.8 MB
DerbyCon8/.____padding_file/102 217 KB
DerbyCon8/Stable-21-Extending-Burp-to-Find-Struts-and-XXE-Vulnerabilities-Chris-Elgee.ogv 82.2 MB
DerbyCon8/.____padding_file/150 1.8 MB
DerbyCon8/Stable-22-Introduction-to-x86-Assembly-DazzleCatDuo.mp4 50.9 MB
DerbyCon8/.____padding_file/101 1.1 MB
DerbyCon8/Stable-22-Introduction-to-x86-Assembly-DazzleCatDuo.ogv 111.3 MB
DerbyCon8/.____padding_file/151 749 KB
DerbyCon8/Stable-23-Pacu-Attack-and-Post-Exploitation-in-AWS-Spencer-Gietzen.mp4 101.2 MB
DerbyCon8/.____padding_file/100 774 KB
DerbyCon8/Stable-23-Pacu-Attack-and-Post-Exploitation-in-AWS-Spencer-Gietzen.ogv 105.9 MB
DerbyCon8/.____padding_file/152 68 KB
DerbyCon8/Stable-24-An-Inconvenient-Truth-Evading-the-Ransomware-Protection-in-Windows-10-Soya-Aoyama.mp4 89.6 MB
DerbyCon8/.____padding_file/99 394 KB
DerbyCon8/Stable-24-An-Inconvenient-Truth-Evading-the-Ransomware-Protection-in-Windows-10-Soya-Aoyama.ogv 97.9 MB
DerbyCon8/.____padding_file/153 97 KB
DerbyCon8/Stable-25-Brutal-Blogging-Go-for-the-Jugular-Kate-Brew.mp4 78.4 MB
DerbyCon8/.____padding_file/98 1.6 MB
DerbyCon8/Stable-25-Brutal-Blogging-Go-for-the-Jugular-Kate-Brew.ogv 97.1 MB
DerbyCon8/.____padding_file/154 944 KB
DerbyCon8/Stable-26-RID-Hijacking-Maintaining-Access-on-Windows-Machines-Sebastin-Castro.mp4 90 MB
DerbyCon8/.____padding_file/97 2 MB
DerbyCon8/Stable-26-RID-Hijacking-Maintaining-Access-on-Windows-Machines-Sebastin-Castro.ogv 98.1 MB
DerbyCon8/.____padding_file/155 1.9 MB
DerbyCon8/Stable-27-Your-Training-Data-is-Bad-and-You-Should-Feel-Bad-Ryan-J-OGrady.mp4 71 MB
DerbyCon8/.____padding_file/96 1 MB
DerbyCon8/Stable-27-Your-Training-Data-is-Bad-and-You-Should-Feel-Bad-Ryan-J-OGrady.ogv 94.4 MB
DerbyCon8/.____padding_file/156 1.6 MB
DerbyCon8/Stable-28-So-many-pentesting-tools-from-a-4-Arduino-Kevin-Bong-Michael-Vieau.mp4 62.1 MB
DerbyCon8/.____padding_file/95 1.9 MB
DerbyCon8/Stable-28-So-many-pentesting-tools-from-a-4-Arduino-Kevin-Bong-Michael-Vieau.ogv 106.7 MB
DerbyCon8/.____padding_file/157 1.3 MB
DerbyCon8/Stable-29-Patching-Show-me-where-it-hurts-Cheryl-Biswas.mp4 67.7 MB
DerbyCon8/.____padding_file/94 318 KB
DerbyCon8/Stable-29-Patching-Show-me-where-it-hurts-Cheryl-Biswas.ogv 83.6 MB
DerbyCon8/.____padding_file/158 417 KB
DerbyCon8/Stable-30-Advanced-Deception-Technology-Through-Behavioral-Biometrics-Curt-Barnard-Dawud-Gordon.mp4 83.1 MB
DerbyCon8/.____padding_file/93 918 KB
DerbyCon8/Stable-30-Advanced-Deception-Technology-Through-Behavioral-Biometrics-Curt-Barnard-Dawud-Gordon.ogv 106.7 MB
DerbyCon8/.____padding_file/159 1.3 MB
DerbyCon8/Stable-31-We-are-all-on-the-spectrum-What-my-10-year-old-taught-me-about-leading-teams-Carla-A-Raisler.mp4 110.4 MB
DerbyCon8/.____padding_file/92 1.6 MB
DerbyCon8/Stable-31-We-are-all-on-the-spectrum-What-my-10-year-old-taught-me-about-leading-teams-Carla-A-Raisler.ogv 105.8 MB
DerbyCon8/.____padding_file/160 204 KB
DerbyCon8/Stable-32-No-Place-Like-Home-Real-Estate-OSINT-and-OPSec-Fails-John-Bullinger.mp4 60.6 MB
DerbyCon8/.____padding_file/91 1.4 MB
DerbyCon8/Stable-32-No-Place-Like-Home-Real-Estate-OSINT-and-OPSec-Fails-John-Bullinger.ogv 101.8 MB
DerbyCon8/.____padding_file/161 220 KB
DerbyCon8/Stable-33-The-Layer2-Nightmare-Chris-Mallz.mp4 621.5 MB
DerbyCon8/.____padding_file/90 535 KB
DerbyCon8/Stable-33-The-Layer2-Nightmare-Chris-Mallz.ogv 73.4 MB
DerbyCon8/.____padding_file/162 644 KB
DerbyCon8/Stable-34-Attacking-Azure-Environments-with-PowerShell-Karl-Fosaaen.mp4 56 MB
DerbyCon8/.____padding_file/89 2 MB
DerbyCon8/Stable-34-Attacking-Azure-Environments-with-PowerShell-Karl-Fosaaen.ogv 114.2 MB
DerbyCon8/.____padding_file/163 1.8 MB
DerbyCon8/Stable-35-Blue-Blood-Injection-Transitioning-Red-to-Purple-Lsly-Ayyy.mp4 80 MB
DerbyCon8/.____padding_file/88 40 KB
DerbyCon8/Stable-35-Blue-Blood-Injection-Transitioning-Red-to-Purple-Lsly-Ayyy.ogv 101.3 MB
DerbyCon8/.____padding_file/164 752 KB
DerbyCon8/Stable-36-Mirai-Satori-OMG-and-Owari-IoT-Botnets-Oh-My-Peter-Arzamendi.mp4 88.4 MB
DerbyCon8/.____padding_file/87 1.6 MB
DerbyCon8/Stable-36-Mirai-Satori-OMG-and-Owari-IoT-Botnets-Oh-My-Peter-Arzamendi.ogv 97.4 MB
DerbyCon8/.____padding_file/165 586 KB
DerbyCon8/Stable-37-Comparing-apples-to-Apple-Adam-Mathis.mp4 116.5 MB
DerbyCon8/.____padding_file/86 1.5 MB
DerbyCon8/Stable-37-Comparing-apples-to-Apple-Adam-Mathis.ogv 105.3 MB
DerbyCon8/.____padding_file/166 696 KB
DerbyCon8/Stable-38-How-online-dating-made-me-better-at-threat-modeling-Isaiah-Sarju.mp4 102.5 MB
DerbyCon8/.____padding_file/85 1.5 MB
DerbyCon8/Stable-38-How-online-dating-made-me-better-at-threat-modeling-Isaiah-Sarju.ogv 100.1 MB
DerbyCon8/.____padding_file/167 1.9 MB
DerbyCon8/Stable-39-Threat-Hunting-with-a-Raspberry-Pi-Jamie-Murdock.mp4 77 MB
DerbyCon8/.____padding_file/84 1013 KB
DerbyCon8/Stable-39-Threat-Hunting-with-a-Raspberry-Pi-Jamie-Murdock.ogv 81.1 MB
DerbyCon8/.____padding_file/168 897 KB
DerbyCon8/Stable-40-MA-Defense-and-Integration-All-that-Glitters-is-not-Gold-Sara-Leal-Jason-Morrow.mp4 178.6 MB
DerbyCon8/.____padding_file/83 1.4 MB
DerbyCon8/Stable-40-MA-Defense-and-Integration-All-that-Glitters-is-not-Gold-Sara-Leal-Jason-Morrow.ogv 118.5 MB
DerbyCon8/.____padding_file/169 1.5 MB
DerbyCon8/Track-1-00-IRS-HR-Microsoft-and-your-Grandma-What-they-all-have-in-common-Christopher-Hadnagy-Cat-Murdock.mp4 165.2 MB
DerbyCon8/.____padding_file/82 795 KB
DerbyCon8/Track-1-00-IRS-HR-Microsoft-and-your-Grandma-What-they-all-have-in-common-Christopher-Hadnagy-Cat-Murdock.ogv 214.1 MB
DerbyCon8/.____padding_file/170 1.9 MB
DerbyCon8/Track-1-01-LOLBins-Nothing-to-LOL-about-Oddvar-Moe.mp4 132.2 MB
DerbyCon8/.____padding_file/81 1.8 MB
DerbyCon8/Track-1-01-LOLBins-Nothing-to-LOL-about-Oddvar-Moe.ogv 198.6 MB
DerbyCon8/.____padding_file/171 1.4 MB
DerbyCon8/Track-1-02-Everything-Else-I-Learned-About-Security-I-Learned-From-Hip-Hop-Paul-Asadoorian.mp4 105.8 MB
DerbyCon8/.____padding_file/80 244 KB
DerbyCon8/Track-1-02-Everything-Else-I-Learned-About-Security-I-Learned-From-Hip-Hop-Paul-Asadoorian.ogv 201.8 MB
DerbyCon8/.____padding_file/172 250 KB
DerbyCon8/Track-1-03-Hackers-Hugs-Drugs-Mental-Health-in-Infosec-Amanda-Berlin.mp4 425.1 MB
DerbyCon8/.____padding_file/79 955 KB
DerbyCon8/Track-1-03-Hackers-Hugs-Drugs-Mental-Health-in-Infosec-Amanda-Berlin.ogv 216.5 MB
DerbyCon8/.____padding_file/173 1.5 MB
DerbyCon8/Track-1-04-Android-App-Penetration-Testing-101-Joff-Thyer-Derek-Banks.mp4 141.4 MB
DerbyCon8/.____padding_file/78 620 KB
DerbyCon8/Track-1-04-Android-App-Penetration-Testing-101-Joff-Thyer-Derek-Banks.ogv 206.3 MB
DerbyCon8/.____padding_file/174 1.7 MB
DerbyCon8/Track-1-05-Draw-a-Bigger-Circle-InfoSec-Evolves-Cheryl-Biswas.mp4 133.8 MB
DerbyCon8/.____padding_file/77 155 KB
DerbyCon8/Track-1-05-Draw-a-Bigger-Circle-InfoSec-Evolves-Cheryl-Biswas.ogv 207.6 MB
DerbyCon8/.____padding_file/175 394 KB
DerbyCon8/Track-1-06-Building-an-Empire-with-IronPython-Jim-Shaver.mp4 85.6 MB
DerbyCon8/.____padding_file/76 390 KB
DerbyCon8/Track-1-06-Building-an-Empire-with-IronPython-Jim-Shaver.ogv 160.5 MB
DerbyCon8/.____padding_file/176 1.5 MB
DerbyCon8/Track-1-07-SAEDY-Subversion-and-Espionage-Directed-Against-You-Judy-Towers.mp4 163.5 MB
DerbyCon8/.____padding_file/75 522 KB
DerbyCon8/Track-1-07-SAEDY-Subversion-and-Espionage-Directed-Against-You-Judy-Towers.ogv 251.8 MB
DerbyCon8/.____padding_file/177 160 KB
DerbyCon8/Track-1-08-OSXPirrit-Reverse-engineering-mac-OSX-malware-and-the-legal-department-of-the-company-who-makes-it-Amit-Serper-Niv-Yona-Yuval-Chuddy.mp4 251.9 MB
DerbyCon8/.____padding_file/74 139 KB
DerbyCon8/Track-1-08-OSXPirrit-Reverse-engineering-mac-OSX-malware-and-the-legal-department-of-the-company-who-makes-it-Amit-Serper-Niv-Yona-Yuval-Chuddy.ogv 203.8 MB
DerbyCon8/.____padding_file/178 186 KB
DerbyCon8/Track-1-09-How-to-test-Network-Investigative-TechniquesNITs-used-by-the-FBI-Dr-Matthew-Miller.mp4 100.7 MB
DerbyCon8/.____padding_file/73 1.3 MB
DerbyCon8/Track-1-09-How-to-test-Network-Investigative-TechniquesNITs-used-by-the-FBI-Dr-Matthew-Miller.ogv 184.5 MB
DerbyCon8/.____padding_file/179 1.5 MB
DerbyCon8/Track-1-10-Cloud-Computing-Therapy-Session-Cara-Marie-Andy-Cooper.mp4 104.7 MB
DerbyCon8/.____padding_file/72 1.3 MB
DerbyCon8/Track-1-10-Cloud-Computing-Therapy-Session-Cara-Marie-Andy-Cooper.ogv 179.8 MB
DerbyCon8/.____padding_file/180 235 KB
DerbyCon8/Track-1-11-Silent-Compromise-Social-Engineering-Fortune-500-Businesses-Joe-Gray.mp4 113.4 MB
DerbyCon8/.____padding_file/71 624 KB
DerbyCon8/Track-1-11-Silent-Compromise-Social-Engineering-Fortune-500-Businesses-Joe-Gray.ogv 187.7 MB
DerbyCon8/.____padding_file/181 273 KB
DerbyCon8/Track-1-12-Dexter-the-friendly-forensics-expert-on-the-Coinbase-security-team-Hayden-Parker.mp4 78.6 MB
DerbyCon8/.____padding_file/70 1.4 MB
DerbyCon8/Track-1-12-Dexter-the-friendly-forensics-expert-on-the-Coinbase-security-team-Hayden-Parker.ogv 189.5 MB
DerbyCon8/.____padding_file/182 471 KB
DerbyCon8/Track-1-13-Going-on-a-Printer-Safari-Hunting-Zebra-Printers-James-Edge.mp4 84.5 MB
DerbyCon8/.____padding_file/69 1.5 MB
DerbyCon8/Track-1-13-Going-on-a-Printer-Safari-Hunting-Zebra-Printers-James-Edge.ogv 197.6 MB
DerbyCon8/.____padding_file/183 365 KB
DerbyCon8/Track-1-14-Social-Engineering-At-Work-How-to-use-positive-influence-to-gain-management-buy-in-for-anything-April-Wright.mp4 113.5 MB
DerbyCon8/.____padding_file/68 487 KB
DerbyCon8/Track-1-14-Social-Engineering-At-Work-How-to-use-positive-influence-to-gain-management-buy-in-for-anything-April-Wright.ogv 215.6 MB
DerbyCon8/.____padding_file/184 402 KB
DerbyCon8/Track-1-15-Ham-Radio-4-Hackers-Eric-Watkins-Devin-Noel.mp4 126.9 MB
DerbyCon8/.____padding_file/67 1.1 MB
DerbyCon8/Track-1-15-Ham-Radio-4-Hackers-Eric-Watkins-Devin-Noel.ogv 203.4 MB
DerbyCon8/.____padding_file/185 579 KB
DerbyCon8/Track-1-16-Getting-Control-of-Your-Vendors-Before-They-Take-You-Down-Dan-Browder.mp4 91.2 MB
DerbyCon8/.____padding_file/66 811 KB
DerbyCon8/Track-1-16-Getting-Control-of-Your-Vendors-Before-They-Take-You-Down-Dan-Browder.ogv 193.7 MB
DerbyCon8/.____padding_file/186 352 KB
DerbyCon8/Track-1-17-Cyber-Intelligence-There-Are-No-Rules-and-No-Certainties-Coleman-Kane.mp4 113.1 MB
DerbyCon8/.____padding_file/65 958 KB
DerbyCon8/Track-1-17-Cyber-Intelligence-There-Are-No-Rules-and-No-Certainties-Coleman-Kane.ogv 254.1 MB
DerbyCon8/.____padding_file/187 1.9 MB
DerbyCon8/Track-1-18-Getting-Started-in-CCDC-Russell-Nielsen.mp4 56.1 MB
DerbyCon8/.____padding_file/64 1.9 MB
DerbyCon8/Track-1-18-Getting-Started-in-CCDC-Russell-Nielsen.ogv 138 MB
DerbyCon8/.____padding_file/188 44 KB
DerbyCon8/Track-1-19-Changing-Our-Mindset-From-Technical-To-Psychological-Defenses-Andrew-Kalat.mp4 99.7 MB
DerbyCon8/.____padding_file/63 337 KB
DerbyCon8/Track-1-19-Changing-Our-Mindset-From-Technical-To-Psychological-Defenses-Andrew-Kalat.ogv 244 MB
DerbyCon8/.____padding_file/189 31 KB
DerbyCon8/Track-2-00-I-Can-Be-Apple-and-So-Can-You-Josh-Pitts.mp4 262.1 MB
DerbyCon8/.____padding_file/62 1.9 MB
DerbyCon8/Track-2-00-I-Can-Be-Apple-and-So-Can-You-Josh-Pitts.ogv 156.3 MB
DerbyCon8/.____padding_file/190 1.7 MB
DerbyCon8/Track-2-01-From-Workstation-to-Domain-Admin-Why-Secure-Administration-Isnt-Secure-and-How-to-Fix-It-Sean-Metcalf.mp4 345.9 MB
DerbyCon8/.____padding_file/61 51 KB
DerbyCon8/Track-2-01-From-Workstation-to-Domain-Admin-Why-Secure-Administration-Isnt-Secure-and-How-to-Fix-It-Sean-Metcalf.ogv 194.7 MB
DerbyCon8/.____padding_file/191 1.3 MB
DerbyCon8/Track-2-02-MS17-010-zerosum0x0.mp4 324.2 MB
DerbyCon8/.____padding_file/60 1.8 MB
DerbyCon8/Track-2-02-MS17-010-zerosum0x0.ogv 192.2 MB
DerbyCon8/.____padding_file/192 1.8 MB
DerbyCon8/Track-2-03-The-Unintended-Risks-of-Trusting-Active-Directory-Lee-Christensen-Will-Schroeder-Matt-Nelson.mp4 414.4 MB
DerbyCon8/.____padding_file/59 1.6 MB
DerbyCon8/Track-2-03-The-Unintended-Risks-of-Trusting-Active-Directory-Lee-Christensen-Will-Schroeder-Matt-Nelson.ogv 202.4 MB
DerbyCon8/.____padding_file/193 1.6 MB
DerbyCon8/Track-2-04-Lessons-Learned-by-the-WordPress-Security-Team-Aaron-D-Campbell.mp4 317.6 MB
DerbyCon8/.____padding_file/58 426 KB
DerbyCon8/Track-2-04-Lessons-Learned-by-the-WordPress-Security-Team-Aaron-D-Campbell.ogv 197.5 MB
DerbyCon8/.____padding_file/194 503 KB
DerbyCon8/Track-2-05-IronPython-omfg-Marcello-Salvati.mp4 400.1 MB
DerbyCon8/.____padding_file/57 1.9 MB
DerbyCon8/Track-2-05-IronPython-omfg-Marcello-Salvati.ogv 223.6 MB
DerbyCon8/.____padding_file/195 420 KB
DerbyCon8/Track-2-06-Hardware-Slashing-Smashing-and-Reconstructing-for-Root-access-Deral-Heiland.mp4 125 MB
DerbyCon8/.____padding_file/56 1020 KB
DerbyCon8/Track-2-06-Hardware-Slashing-Smashing-and-Reconstructing-for-Root-access-Deral-Heiland.ogv 197.2 MB
DerbyCon8/.____padding_file/196 787 KB
DerbyCon8/Track-2-07-App-o-Lockalypse-now-Oddvar-Moe.mp4 140.7 MB
DerbyCon8/.____padding_file/55 1.3 MB
DerbyCon8/Track-2-07-App-o-Lockalypse-now-Oddvar-Moe.ogv 220.8 MB
DerbyCon8/.____padding_file/197 1.2 MB
DerbyCon8/Track-2-08-Web-App-101-Getting-the-lay-of-the-land-Mike-Saunders.mp4 85.7 MB
DerbyCon8/.____padding_file/54 319 KB
DerbyCon8/Track-2-08-Web-App-101-Getting-the-lay-of-the-land-Mike-Saunders.ogv 186.4 MB
DerbyCon8/.____padding_file/198 1.6 MB
DerbyCon8/Track-2-09-Invoke-DOSfuscation-Techniques-FOR-F-IN-style-DO-S-level-CMD-Obfuscation-Daniel-Bohannon.mp4 115 MB
DerbyCon8/.____padding_file/53 1 MB
DerbyCon8/Track-2-09-Invoke-DOSfuscation-Techniques-FOR-F-IN-style-DO-S-level-CMD-Obfuscation-Daniel-Bohannon.ogv 221.6 MB
DerbyCon8/.____padding_file/199 360 KB
DerbyCon8/Track-2-10-WE-ARE-THE-ARTILLERY-Using-Google-Fu-To-Take-Down-The-Grids-Chris-Sistrunk-Krypt3ia-SynAckPwn.mp4 90.9 MB
DerbyCon8/.____padding_file/52 1.1 MB
DerbyCon8/Track-2-10-WE-ARE-THE-ARTILLERY-Using-Google-Fu-To-Take-Down-The-Grids-Chris-Sistrunk-Krypt3ia-SynAckPwn.ogv 194.8 MB
DerbyCon8/.____padding_file/200 1.2 MB
DerbyCon8/Track-2-11-Just-Let-Yourself-In-David-Boyd.mp4 131.9 MB
DerbyCon8/.____padding_file/51 123 KB
DerbyCon8/Track-2-11-Just-Let-Yourself-In-David-Boyd.ogv 214.1 MB
DerbyCon8/.____padding_file/201 1.9 MB
DerbyCon8/Track-2-12-A-Crash-Course-in-Exploiting-Buffer-Overflows-Live-Demos-Parker-Garrison.mp4 116.6 MB
DerbyCon8/.____padding_file/50 1.4 MB
DerbyCon8/Track-2-12-A-Crash-Course-in-Exploiting-Buffer-Overflows-Live-Demos-Parker-Garrison.ogv 214.7 MB
DerbyCon8/.____padding_file/202 1.3 MB
DerbyCon8/Track-2-13-Living-in-a-Secure-Container-Down-by-the-River-Jack-Mannino.mp4 78.7 MB
DerbyCon8/.____padding_file/49 1.3 MB
DerbyCon8/Track-2-13-Living-in-a-Secure-Container-Down-by-the-River-Jack-Mannino.ogv 186.8 MB
DerbyCon8/.____padding_file/203 1.2 MB
DerbyCon8/Track-2-14-Red-Mirror-Bringing-Telemetry-to-Red-Teaming-Zach-Grace.mp4 101.6 MB
DerbyCon8/.____padding_file/48 385 KB
DerbyCon8/Track-2-14-Red-Mirror-Bringing-Telemetry-to-Red-Teaming-Zach-Grace.ogv 225 MB
DerbyCon8/.____padding_file/204 1007 KB
DerbyCon8/Track-2-15-Two-Factor-Too-Furious-Evading-and-Protecting-Evolving-MFA-Schemes-Austin-Baker-Doug-Bienstock.mp4 96.9 MB
DerbyCon8/.____padding_file/47 1.1 MB
DerbyCon8/Track-2-15-Two-Factor-Too-Furious-Evading-and-Protecting-Evolving-MFA-Schemes-Austin-Baker-Doug-Bienstock.ogv 201.2 MB
DerbyCon8/.____padding_file/205 777 KB
DerbyCon8/Track-2-16-IoT-Not-Even-Your-Bed-Is-Safe-Darby-Mullen.mp4 111.2 MB
DerbyCon8/.____padding_file/46 816 KB
DerbyCon8/Track-2-16-IoT-Not-Even-Your-Bed-Is-Safe-Darby-Mullen.ogv 189.8 MB
DerbyCon8/.____padding_file/206 234 KB
DerbyCon8/Track-2-17-Fingerprinting-Encrypted-Channels-for-Detection-John-Althouse.mp4 70.8 MB
DerbyCon8/.____padding_file/45 1.2 MB
DerbyCon8/Track-2-17-Fingerprinting-Encrypted-Channels-for-Detection-John-Althouse.ogv 173.2 MB
DerbyCon8/.____padding_file/207 777 KB
DerbyCon8/Track-2-18-On-the-Nose-Bypassing-Huaweis-Fingerprint-authentication-by-exploiting-the-TrustZone-Nick-Stephens.mp4 77.2 MB
DerbyCon8/.____padding_file/44 820 KB
DerbyCon8/Track-2-18-On-the-Nose-Bypassing-Huaweis-Fingerprint-authentication-by-exploiting-the-TrustZone-Nick-Stephens.ogv 195.9 MB
DerbyCon8/.____padding_file/208 122 KB
DerbyCon8/Track-2-19-Bypassing-Port-Security-In-2018-Defeating-MacSEC-and-8021x-2010-Gabriel-Ryan.mp4 98.5 MB
DerbyCon8/.____padding_file/43 1.5 MB
DerbyCon8/Track-2-19-Bypassing-Port-Security-In-2018-Defeating-MacSEC-and-8021x-2010-Gabriel-Ryan.ogv 219.2 MB
DerbyCon8/.____padding_file/209 793 KB
DerbyCon8/Track-3-00-Invoke-EmpireHound-Merging-BloodHound-Empire-for-Enhanced-Red-Team-Workflow-Walter-Legowski.mp4 221.7 MB
DerbyCon8/.____padding_file/42 265 KB
DerbyCon8/Track-3-00-Invoke-EmpireHound-Merging-BloodHound-Empire-for-Enhanced-Red-Team-Workflow-Walter-Legowski.ogv 156.3 MB
DerbyCon8/.____padding_file/210 1.7 MB
DerbyCon8/Track-3-01-When-Macs-Come-Under-ATTCK-Richie-Cyrus.mp4 222.5 MB
DerbyCon8/.____padding_file/41 1.5 MB
DerbyCon8/Track-3-01-When-Macs-Come-Under-ATTCK-Richie-Cyrus.ogv 201 MB
DerbyCon8/.____padding_file/211 989 KB
DerbyCon8/Track-3-02-Abusing-IoT-Medical-Devices-For-Your-Precious-Health-Records-Saurabh-Harit-Nick-Delewski.mp4 253.7 MB
DerbyCon8/.____padding_file/40 351 KB
DerbyCon8/Track-3-02-Abusing-IoT-Medical-Devices-For-Your-Precious-Health-Records-Saurabh-Harit-Nick-Delewski.ogv 208.3 MB
DerbyCon8/.____padding_file/212 1.7 MB
DerbyCon8/Track-3-03-Detecting-WMI-exploitation-Michael-Gough.mp4 258 MB
DerbyCon8/.____padding_file/39 2 MB
DerbyCon8/Track-3-03-Detecting-WMI-exploitation-Michael-Gough.ogv 217.4 MB
DerbyCon8/.____padding_file/213 598 KB
DerbyCon8/Track-3-04-Gryffindor-Pure-JavaScript-Covert-Exploitation-Matthew-Toussain.mp4 210.9 MB
DerbyCon8/.____padding_file/38 1.1 MB
DerbyCon8/Track-3-04-Gryffindor-Pure-JavaScript-Covert-Exploitation-Matthew-Toussain.ogv 190 MB
DerbyCon8/.____padding_file/214 29 KB
DerbyCon8/Track-3-05-Instant-Response-Making-IR-faster-than-you-thought-possible-Mick-Douglas-Josh-Johnson.mp4 231.4 MB
DerbyCon8/.____padding_file/37 663 KB
DerbyCon8/Track-3-05-Instant-Response-Making-IR-faster-than-you-thought-possible-Mick-Douglas-Josh-Johnson.ogv 194 MB
DerbyCon8/.____padding_file/215 2 MB
DerbyCon8/Track-3-06-VBA-Stomping-Advanced-Malware-Techniques-Carrie-Roberts-Kirk-Sayre-Harold-Ogden-.mp4 453.9 MB
DerbyCon8/.____padding_file/36 136 KB
DerbyCon8/Track-3-06-VBA-Stomping-Advanced-Malware-Techniques-Carrie-Roberts-Kirk-Sayre-Harold-Ogden-.ogv 197.6 MB
DerbyCon8/.____padding_file/216 361 KB
DerbyCon8/Track-3-07-Media-hacks-an-Infosec-guide-to-dealing-with-journalists-Sean-Gallagher-Steve-Ragan-Paul-Wagenseil.mp4 354.5 MB
DerbyCon8/.____padding_file/35 1.5 MB
DerbyCon8/Track-3-07-Media-hacks-an-Infosec-guide-to-dealing-with-journalists-Sean-Gallagher-Steve-Ragan-Paul-Wagenseil.ogv 212.4 MB
DerbyCon8/.____padding_file/217 1.6 MB
DerbyCon8/Track-3-08-Deploying-Deceptive-Systems-Luring-Attackers-from-the-Shadows-Kevin-Gennuso.mp4 191.7 MB
DerbyCon8/.____padding_file/34 338 KB
DerbyCon8/Track-3-08-Deploying-Deceptive-Systems-Luring-Attackers-from-the-Shadows-Kevin-Gennuso.ogv 151.3 MB
DerbyCon8/.____padding_file/218 764 KB
DerbyCon8/Track-3-09-The-Money-Laundering-Cannon-Real-cash-Real-Criminals-and-Real-Layoffs-Arian-Evans.mp4 259.8 MB
DerbyCon8/.____padding_file/33 206 KB
DerbyCon8/Track-3-09-The-Money-Laundering-Cannon-Real-cash-Real-Criminals-and-Real-Layoffs-Arian-Evans.ogv 203.9 MB
DerbyCon8/.____padding_file/219 141 KB
DerbyCon8/Track-3-10-Perfect-Storm-Taking-the-Helm-of-Kubernetes-Ian-Coldwater.mp4 281.2 MB
DerbyCon8/.____padding_file/32 783 KB
DerbyCon8/Track-3-10-Perfect-Storm-Taking-the-Helm-of-Kubernetes-Ian-Coldwater.ogv 178.6 MB
DerbyCon8/.____padding_file/220 1.4 MB
DerbyCon8/Track-3-11-How-to-put-on-a-Con-for-Fun-and-Non-Profit-Benny-Karnes-John-Moore-Rick-Hayes-Matt-Perry-Bill-Gardner-Justin-Rogosky-Mike-Fry-Steve-Truax.mp4 279.1 MB
DerbyCon8/.____padding_file/31 956 KB
DerbyCon8/Track-3-11-How-to-put-on-a-Con-for-Fun-and-Non-Profit-Benny-Karnes-John-Moore-Rick-Hayes-Matt-Perry-Bill-Gardner-Justin-Rogosky-Mike-Fry-Steve-Truax.ogv 200.2 MB
DerbyCon8/.____padding_file/221 1.8 MB
DerbyCon8/Track-3-12-Web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly-Lee-Neely-Chelle-Clements-James-McMurry.mp4 210.9 MB
DerbyCon8/.____padding_file/30 1.1 MB
DerbyCon8/Track-3-12-Web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly-Lee-Neely-Chelle-Clements-James-McMurry.ogv 142 MB
DerbyCon8/.____padding_file/222 2 MB
DerbyCon8/Track-3-13-Metasploit-Town-Hall-0x4-Brent-Cook-Aaron-Soto-Adam-Cammack-Cody-Pierce.mp4 281.4 MB
DerbyCon8/.____padding_file/29 615 KB
DerbyCon8/Track-3-13-Metasploit-Town-Hall-0x4-Brent-Cook-Aaron-Soto-Adam-Cammack-Cody-Pierce.ogv 172.1 MB
DerbyCon8/.____padding_file/223 1.9 MB
DerbyCon8/Track-3-14-Community-Based-Career-Development-or-How-to-Get-More-than-a-T-Shirt-When-Participating-as-part-of-the-Community-Kathleen-Smith-Magen-Wu-Cindy-Jones-Kathryn-Seymour-Kirsten-Renner.mp4 479.7 MB
DerbyCon8/.____padding_file/28 328 KB
DerbyCon8/Track-3-14-Community-Based-Career-Development-or-How-to-Get-More-than-a-T-Shirt-When-Participating-as-part-of-the-Community-Kathleen-Smith-Magen-Wu-Cindy-Jones-Kathryn-Seymour-Kirsten-Renner.ogv 216 MB
DerbyCon8/.____padding_file/224 2 MB
DerbyCon8/Track-3-15-Goodbye-Obfuscation-Hello-Invisi-Shell-Hiding-Your-Powershell-Script-in-Plain-Sight-Omer-Yair.mp4 148.4 MB
DerbyCon8/.____padding_file/27 1.6 MB
DerbyCon8/Track-3-15-Goodbye-Obfuscation-Hello-Invisi-Shell-Hiding-Your-Powershell-Script-in-Plain-Sight-Omer-Yair.ogv 191.9 MB
DerbyCon8/.____padding_file/225 119 KB
DerbyCon8/Track-3-16-Cloud-Forensics-Putting-The-Bits-Back-Together-Brandon-Sherman-.mp4 149.1 MB
DerbyCon8/.____padding_file/26 888 KB
DerbyCon8/Track-3-16-Cloud-Forensics-Putting-The-Bits-Back-Together-Brandon-Sherman-.ogv 211.1 MB
DerbyCon8/.____padding_file/226 911 KB
DerbyCon8/Track-3-17-Killsuit-The-Equation-Groups-Swiss-Army-knife-for-persistence-evasion-and-data-exfil-Francisco-Donoso.mp4 142.2 MB
DerbyCon8/.____padding_file/25 1.8 MB
DerbyCon8/Track-3-17-Killsuit-The-Equation-Groups-Swiss-Army-knife-for-persistence-evasion-and-data-exfil-Francisco-Donoso.ogv 170.5 MB
DerbyCon8/.____padding_file/227 1.5 MB
DerbyCon8/Track-3-18-The-MS-Office-Magic-Show-Stan-Hegt-Pieter-Ceelen.mp4 126.9 MB
DerbyCon8/.____padding_file/24 1.1 MB
DerbyCon8/Track-3-18-The-MS-Office-Magic-Show-Stan-Hegt-Pieter-Ceelen.ogv 180.7 MB
DerbyCon8/.____padding_file/228 1.3 MB
DerbyCon8/Track-3-19-Living-off-the-land-enterprise-post-exploitation-Adam-Reiser.mp4 74.5 MB
DerbyCon8/.____padding_file/23 1.5 MB
DerbyCon8/Track-3-19-Living-off-the-land-enterprise-post-exploitation-Adam-Reiser.ogv 133.1 MB
DerbyCon8/.____padding_file/229 922 KB
DerbyCon8/Track-3-20-Hillbilly-Storytime-Pentest-Fails-Adam-Compton.mp4 132 MB
DerbyCon8/.____padding_file/22 1 KB
DerbyCon8/Track-3-20-Hillbilly-Storytime-Pentest-Fails-Adam-Compton.ogv 203.9 MB
DerbyCon8/.____padding_file/230 129 KB
DerbyCon8/Track-4-00-The-History-of-the-Future-of-Cyber-Education-Winn-Schwartau.mp4 462.3 MB
DerbyCon8/.____padding_file/2 1.7 MB
DerbyCon8/Track-4-00-The-History-of-the-Future-of-Cyber-Education-Winn-Schwartau.ogv 206.7 MB
DerbyCon8/.____padding_file/231 1.3 MB
DerbyCon8/Track-4-01-State-of-Win32k-Security-Revisiting-Insecure-design-Vishal-Chauhan.mp4 61.9 MB
DerbyCon8/.____padding_file/3 100 KB
DerbyCon8/Track-4-01-State-of-Win32k-Security-Revisiting-Insecure-design-Vishal-Chauhan.ogv 174.9 MB
DerbyCon8/.____padding_file/232 1.1 MB
DerbyCon8/Track-4-02-Offensive-Browser-Extension-Development-Michael-Weber.mp4 90.2 MB
DerbyCon8/.____padding_file/4 1.8 MB
DerbyCon8/Track-4-02-Offensive-Browser-Extension-Development-Michael-Weber.ogv 215.7 MB
DerbyCon8/.____padding_file/233 349 KB
DerbyCon8/Track-4-03-Protect-Your-Payloads-Modern-Keying-Techniques-Leo-Loobeek.mp4 76.7 MB
DerbyCon8/.____padding_file/5 1.3 MB
DerbyCon8/Track-4-03-Protect-Your-Payloads-Modern-Keying-Techniques-Leo-Loobeek.ogv 169.3 MB
DerbyCon8/.____padding_file/234 712 KB
DerbyCon8/Track-4-04-Jump-Into-IOT-Hacking-with-the-Damn-Vulnerable-Habit-Helper-Device-Nancy-Snoke-Phoenix-Snoke.mp4 86.5 MB
DerbyCon8/.____padding_file/6 1.5 MB
DerbyCon8/Track-4-04-Jump-Into-IOT-Hacking-with-the-Damn-Vulnerable-Habit-Helper-Device-Nancy-Snoke-Phoenix-Snoke.ogv 193.6 MB
DerbyCon8/.____padding_file/235 390 KB
DerbyCon8/Track-4-06-Disaster-Strikes-A-Hackers-Cook-book-Jose-Quinones-Carlos-Perez.mp4 112.7 MB
DerbyCon8/.____padding_file/7 1.3 MB
DerbyCon8/Track-4-06-Disaster-Strikes-A-Hackers-Cook-book-Jose-Quinones-Carlos-Perez.ogv 217.3 MB
DerbyCon8/.____padding_file/236 708 KB
DerbyCon8/Track-4-07-Ninja-Looting-Like-a-Pirate-Infojanitor.mp4 84.7 MB
DerbyCon8/.____padding_file/8 1.3 MB
DerbyCon8/Track-4-07-Ninja-Looting-Like-a-Pirate-Infojanitor.ogv 178.3 MB
DerbyCon8/.____padding_file/237 1.7 MB
DerbyCon8/Track-4-08-Hacking-Mobile-Applications-with-Frida-David-Coursey.mp4 163.5 MB
DerbyCon8/.____padding_file/9 554 KB
DerbyCon8/Track-4-08-Hacking-Mobile-Applications-with-Frida-David-Coursey.ogv 205.4 MB
DerbyCon8/.____padding_file/238 635 KB
DerbyCon8/Track-4-09-Victor-or-Victim-Strategies-for-Avoiding-an-InfoSec-Cold-War-Jason-Lang-Stuart-McIntosh.mp4 134 MB
DerbyCon8/.____padding_file/10 2 MB
DerbyCon8/Track-4-09-Victor-or-Victim-Strategies-for-Avoiding-an-InfoSec-Cold-War-Jason-Lang-Stuart-McIntosh.ogv 199.7 MB
DerbyCon8/.____padding_file/239 330 KB
DerbyCon8/Track-4-10-Ubiquitous-Shells-Jon-Gorenflo.mp4 159.7 MB
DerbyCon8/.____padding_file/11 308 KB
DerbyCon8/Track-4-10-Ubiquitous-Shells-Jon-Gorenflo.ogv 209.4 MB
DerbyCon8/.____padding_file/240 569 KB
DerbyCon8/Track-4-11-99-Reasons-Your-Perimeter-Is-Leaking-Evolution-of-CC-John-Askew.mp4 139.4 MB
DerbyCon8/.____padding_file/12 569 KB
DerbyCon8/Track-4-11-99-Reasons-Your-Perimeter-Is-Leaking-Evolution-of-CC-John-Askew.ogv 207.1 MB
DerbyCon8/.____padding_file/241 939 KB
DerbyCon8/Track-4-12-Ship-Hacking-a-Primer-for-Todays-Pirate-Brian-Satira-Brian-Olson.mp4 129.7 MB
DerbyCon8/.____padding_file/13 358 KB
DerbyCon8/Track-4-12-Ship-Hacking-a-Primer-for-Todays-Pirate-Brian-Satira-Brian-Olson.ogv 198.7 MB
DerbyCon8/.____padding_file/242 1.3 MB
DerbyCon8/Track-4-13-Code-Execution-with-JDK-Scripting-Tools-Nashorn-Javascript-Engine-Brett-Hawkins.mp4 84 MB
DerbyCon8/.____padding_file/14 2 MB
DerbyCon8/Track-4-13-Code-Execution-with-JDK-Scripting-Tools-Nashorn-Javascript-Engine-Brett-Hawkins.ogv 173.8 MB
DerbyCon8/.____padding_file/243 213 KB
DerbyCon8/Track-4-14-PHONOPTICON-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget-Mark-Milhouse.mp4 167.8 MB
DerbyCon8/.____padding_file/15 187 KB
DerbyCon8/Track-4-14-PHONOPTICON-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget-Mark-Milhouse.ogv 208.8 MB
DerbyCon8/.____padding_file/244 1.2 MB
DerbyCon8/Track-4-15-Bug-Hunting-in-RouterOS-Jacob-Baines.mp4 95.1 MB
DerbyCon8/.____padding_file/16 879 KB
DerbyCon8/Track-4-15-Bug-Hunting-in-RouterOS-Jacob-Baines.ogv 174.9 MB
DerbyCon8/.____padding_file/245 1.1 MB
DerbyCon8/Track-4-16-Breaking-Into-Your-Building-A-Hackers-Guide-to-Unauthorized-Access-Tim-Roberts-Brent-White.mp4 113.3 MB
DerbyCon8/.____padding_file/17 715 KB
DerbyCon8/Track-4-16-Breaking-Into-Your-Building-A-Hackers-Guide-to-Unauthorized-Access-Tim-Roberts-Brent-White.ogv 213.5 MB
DerbyCon8/.____padding_file/246 516 KB
DerbyCon8/Track-4-17-The-making-of-an-iOS-11-jailbreak-Kiddie-to-kernel-hacker-in-14-sleepless-nights-Bryce-soen-Bearchell.mp4 73.3 MB
DerbyCon8/.____padding_file/18 689 KB
DerbyCon8/Track-4-17-The-making-of-an-iOS-11-jailbreak-Kiddie-to-kernel-hacker-in-14-sleepless-nights-Bryce-soen-Bearchell.ogv 165.6 MB
DerbyCon8/.____padding_file/247 422 KB
DerbyCon8/Track-4-18-Who-Watches-the-Watcher-Detecting-Hypervisor-Introspection-from-Unprivileged-Guests-Tomasz-Tuzel.mp4 76.6 MB
DerbyCon8/.____padding_file/19 1.4 MB
DerbyCon8/Track-4-18-Who-Watches-the-Watcher-Detecting-Hypervisor-Introspection-from-Unprivileged-Guests-Tomasz-Tuzel.ogv 194.9 MB
DerbyCon8/.____padding_file/248 1.1 MB
DerbyCon8/Track-4-19-Pwning-in-the-Sandbox-OSX-Macro-Exploitation-Beyond-Adam-Gold-Danny-Chrastil.mp4 83 MB
DerbyCon8/.____padding_file/20 996 KB
DerbyCon8/Track-4-19-Pwning-in-the-Sandbox-OSX-Macro-Exploitation-Beyond-Adam-Gold-Danny-Chrastil.ogv 134.2 MB
DerbyCon8/.____padding_file/249 1.8 MB
DerbyCon8/Track-4-20-IOCs-Today-Intelligence-Led-Security-Tomorrow-Katie-Kusjanovic-Matthew-Shelton.mp4 88.6 MB
DerbyCon8/.____padding_file/21 1.4 MB
DerbyCon8/Track-4-20-IOCs-Today-Intelligence-Led-Security-Tomorrow-Katie-Kusjanovic-Matthew-Shelton.ogv 216.3 MB
DerbyCon8/.____padding_file/250 1.7 MB
DerbyCon8/__ia_thumb.jpg 5 KB
DerbyCon8/.____padding_file/251 2 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
DerbyCon8 Video 19.1 GB 1
DerbyCon8 Video 39.3 GB 3

Loading...