MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[Udemy] Этический взлом с Go (2020)

磁力链接/BT种子名称

[Udemy] Этический взлом с Go (2020)

磁力链接/BT种子简介

种子哈希:9b5187cf0330c73fdbbb8d96daf5a9c30bce3cf7
文件大小: 3.4G
已经下载:6917次
下载速度:极快
收录时间:2021-03-24
最近下载:2026-05-12
DMCA/投诉/Complaint:DMCA/投诉/Complaint

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:9B5187CF0330C73FDBBB8D96DAF5A9C30BCE3CF7
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 快手视频 51品茶 萝莉岛APP 51动漫 91短视频 抖音Max 91porn视频 TikTok成人版 PornHub 暗网Xvideo 草榴社区 P站专业版 海角乱伦 萝莉岛 搜同 91妻友

最近搜索

cia.s01e22 linux 王瑞微,天津百华实验中学高三女生 patreon★ fullfive son+ye-eun+손예은+ onlyfans tommy king donglanshui 天仙顏值,飯店自拍,男人最愛的顏值和身材 widescreen 韩漫+人妻猎人 onlyfans+2023+kittyxkum porno irvine welsh audiobook sienna santana onlyfans+-+ellieli 半岛艺束台 samples 丝雨+合集 潜规则外企实习大三清纯嫩妹被插入 fantia-3760310 erika合集 onlyfans+dredd 凌云父女系列 jerid and+jill+-+wgqhs easeus wizard classes metallica - discography dass-480 dorcel

文件列表

  • 18. Protection - How to protect yourself when online/1. Protection.mp4 143.9 MB
  • 8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.mp4 126.4 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.mp4 121.3 MB
  • 6. Creating Network Scanner/7. Nmap in golang.mp4 105.9 MB
  • 15. Trojan - packaging a malware/1. Introduction to trojan.mp4 99.8 MB
  • 8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.mp4 91.6 MB
  • 6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.mp4 87.6 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.mp4 77.6 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.mp4 68.8 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.mp4 59.2 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.mp4 58.5 MB
  • 16. Keylogger/1. Creating a keylogger using go-keylogger package.mp4 56.7 MB
  • 5. Changing MAC/4. Creating executable and parsing flags.mp4 53.8 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.mp4 53.3 MB
  • 12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.mp4 53.2 MB
  • 9. Intercepting Packets/8. Stealing Credentials.mp4 52.4 MB
  • 11. Malware - File System Navigation/6. Reading User Command.mp4 51.4 MB
  • 14. Malware - Stealing Folders from victim/8. Zip file continued.mp4 50.1 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.mp4 47.8 MB
  • 12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.mp4 46.4 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.mp4 45.9 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.mp4 45.4 MB
  • 2. What is Hacking/1. Hacking Introduction.mp4 44.7 MB
  • 8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.mp4 43.5 MB
  • 6. Creating Network Scanner/4. TCP scanner Concurrent.mp4 43.2 MB
  • 4. Executing System Commands/1. How to execute commands.mp4 41.9 MB
  • 15. Trojan - packaging a malware/6. Batch file.mp4 41.4 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.mp4 40.3 MB
  • 1. Introduction to course/3. Introduction to Networking.mp4 40.2 MB
  • 12. Malware - Uploading Viruses to victim/4. Reading file contents.mp4 39.7 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.mp4 38.0 MB
  • 15. Trojan - packaging a malware/8. Adding icon to executable.mp4 37.7 MB
  • 5. Changing MAC/1. Running ifconfig command on PC.mp4 37.6 MB
  • 13. Malware - Downloading Files from Victim/8. Reading file content from victim.mp4 37.6 MB
  • 12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.mp4 37.6 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.mp4 36.6 MB
  • 9. Intercepting Packets/6. Intercepting traffic from source.mp4 36.0 MB
  • 14. Malware - Stealing Folders from victim/7. Creating Zip file.mp4 35.6 MB
  • 17. Stegnography/3. Encoding Data.mp4 35.6 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.mp4 34.1 MB
  • 9. Intercepting Packets/5. intercepting live traffic.mp4 32.3 MB
  • 13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.mp4 31.3 MB
  • 11. Malware - File System Navigation/4. Receiving initial pwd in server.mp4 31.0 MB
  • 12. Malware - Uploading Viruses to victim/5. Creating buffer.mp4 30.3 MB
  • 1. Introduction to course/1. Welcome to this course.mp4 30.2 MB
  • 6. Creating Network Scanner/1. Creating a TCP scanner basic.mp4 30.2 MB
  • 9. Intercepting Packets/2. Finding devices.mp4 30.1 MB
  • 6. Creating Network Scanner/8. Creating an nmap program in golang.mp4 30.0 MB
  • 3. Installation/1. Tools required.mp4 29.8 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.mp4 29.7 MB
  • 9. Intercepting Packets/7. Spoofed packets.mp4 29.6 MB
  • 14. Malware - Stealing Folders from victim/10. Running Program.mp4 29.5 MB
  • 6. Creating Network Scanner/2. Scanning Multiple ports.mp4 29.5 MB
  • 8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.mp4 28.9 MB
  • 3. Installation/4. Linux Installation.mp4 28.9 MB
  • 12. Malware - Uploading Viruses to victim/2. Setting main function.mp4 26.1 MB
  • 3. Installation/3. IDE to use.mp4 24.8 MB
  • 14. Malware - Stealing Folders from victim/3. getting folders.mp4 23.6 MB
  • 11. Malware - File System Navigation/7. Getting Back results.mp4 23.6 MB
  • 15. Trojan - packaging a malware/5. Hiding console on victim.mp4 23.1 MB
  • 14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.mp4 23.1 MB
  • 14. Malware - Stealing Folders from victim/1. Downloading folder from victim.mp4 22.0 MB
  • 5. Changing MAC/3. Creating a program to automatically change MAC.mp4 21.5 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.mp4 21.3 MB
  • 13. Malware - Downloading Files from Victim/5. Getting user input.mp4 21.2 MB
  • 9. Intercepting Packets/4. Capturing Packets.mp4 21.2 MB
  • 4. Executing System Commands/2. Refactoring code.mp4 20.7 MB
  • 13. Malware - Downloading Files from Victim/9. Writing File content hacker.mp4 20.7 MB
  • 15. Trojan - packaging a malware/2. Packaging.mp4 20.2 MB
  • 15. Trojan - packaging a malware/3. Running executables.mp4 20.2 MB
  • 8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.mp4 20.1 MB
  • 11. Malware - File System Navigation/5. Getting user input.mp4 19.5 MB
  • 11. Malware - File System Navigation/8. Loop Navigation on server side.mp4 19.3 MB
  • 9. Intercepting Packets/9. Stealing Logins over HTTP.mp4 18.4 MB
  • 11. Malware - File System Navigation/11. Running the program.mp4 18.3 MB
  • 14. Malware - Stealing Folders from victim/2. Setting main function.mp4 17.9 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.mp4 17.7 MB
  • 13. Malware - Downloading Files from Victim/4. Receiving list at hacker.mp4 17.5 MB
  • 6. Creating Network Scanner/5. TCP scanner Concurrent continued.mp4 17.1 MB
  • 11. Malware - File System Navigation/2. setting up victim machine's main program.mp4 16.9 MB
  • 15. Trojan - packaging a malware/7. Batch to exe.mp4 16.9 MB
  • 11. Malware - File System Navigation/3. Sending initial current directory to Hacker.mp4 16.9 MB
  • 13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.mp4 16.7 MB
  • 13. Malware - Downloading Files from Victim/3. Sending list to hacker.mp4 16.3 MB
  • 15. Trojan - packaging a malware/10. How to perform attack over public internet.mp4 16.3 MB
  • 12. Malware - Uploading Viruses to victim/3. Check File's existence.mp4 15.9 MB
  • 11. Malware - File System Navigation/10. Loop navigation on victim side.mp4 15.8 MB
  • 15. Trojan - packaging a malware/4. Running our malware.mp4 14.9 MB
  • 3. Installation/5. Setting up golang.mp4 13.5 MB
  • 13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.mp4 13.3 MB
  • 12. Malware - Uploading Viruses to victim/9. Getting back write status.mp4 13.3 MB
  • 12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.mp4 13.1 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.mp4 13.0 MB
  • 12. Malware - Uploading Viruses to victim/10. Uploading a file.mp4 12.5 MB
  • 17. Stegnography/4. Decoding Data.mp4 12.1 MB
  • 11. Malware - File System Navigation/9. Exit Condition on server.mp4 11.7 MB
  • 13. Malware - Downloading Files from Victim/7. Sending file names to victim.mp4 11.7 MB
  • 3. Installation/2. Installing go in windows.mp4 11.5 MB
  • 15. Trojan - packaging a malware/9. Running exe.mp4 10.5 MB
  • 14. Malware - Stealing Folders from victim/6. getting folder name on victim.mp4 10.3 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.mp4 10.3 MB
  • 17. Stegnography/2. Installing Package.mp4 10.3 MB
  • 17. Stegnography/1. Stegnography Introduction.mp4 9.2 MB
  • 9. Intercepting Packets/1. Installing gopacket package in golang.mp4 9.1 MB
  • 8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.mp4 9.1 MB
  • 6. Creating Network Scanner/3. Scanning Multiple ports continued.mp4 8.4 MB
  • 5. Changing MAC/2. Changing MAC using ifconfig.mp4 7.7 MB
  • 9. Intercepting Packets/3. searching for devices over a machine.mp4 7.4 MB
  • 14. Malware - Stealing Folders from victim/4. sending folder list to hacker.mp4 7.3 MB
  • 16. Keylogger/2. Starting keylogger.mp4 6.9 MB
  • 13. Malware - Downloading Files from Victim/6. Converting user input to integer.mp4 6.9 MB
  • 11. Malware - File System Navigation/1. Introduction.mp4 4.9 MB
  • 10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.mp4 3.3 MB
  • 14. Malware - Stealing Folders from victim/9. Connection.mp4 3.0 MB
  • 1. Introduction to course/2. Note announcement.mp4 843.9 kB
  • 2. What is Hacking/1. Hacking Introduction.srt 16.3 kB
  • 6. Creating Network Scanner/7. Nmap in golang.srt 14.5 kB
  • 1. Introduction to course/3. Introduction to Networking.srt 14.3 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.srt 12.8 kB
  • 6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.srt 12.6 kB
  • 4. Executing System Commands/1. How to execute commands.srt 12.1 kB
  • 1. Introduction to course/1. Welcome to this course.srt 10.8 kB
  • 16. Keylogger/1. Creating a keylogger using go-keylogger package.srt 10.4 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.srt 9.6 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.srt 9.6 kB
  • 18. Protection - How to protect yourself when online/1. Protection.srt 9.4 kB
  • 5. Changing MAC/4. Creating executable and parsing flags.srt 9.3 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.srt 9.1 kB
  • 9. Intercepting Packets/8. Stealing Credentials.srt 9.0 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.srt 8.4 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.srt 8.3 kB
  • 8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.srt 8.1 kB
  • 5. Changing MAC/1. Running ifconfig command on PC.srt 8.0 kB
  • 11. Malware - File System Navigation/6. Reading User Command.srt 7.7 kB
  • 14. Malware - Stealing Folders from victim/8. Zip file continued.srt 7.4 kB
  • 6. Creating Network Scanner/4. TCP scanner Concurrent.srt 7.4 kB
  • 6. Creating Network Scanner/1. Creating a TCP scanner basic.srt 7.3 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.srt 7.0 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.srt 6.8 kB
  • 13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.srt 6.7 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.srt 6.6 kB
  • 15. Trojan - packaging a malware/1. Introduction to trojan.srt 6.6 kB
  • 9. Intercepting Packets/5. intercepting live traffic.srt 6.5 kB
  • 9. Intercepting Packets/2. Finding devices.srt 6.2 kB
  • 3. Installation/4. Linux Installation.srt 6.0 kB
  • 12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.srt 6.0 kB
  • 8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.srt 5.9 kB
  • 8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.srt 5.9 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.srt 5.8 kB
  • 14. Malware - Stealing Folders from victim/7. Creating Zip file.srt 5.7 kB
  • 15. Trojan - packaging a malware/6. Batch file.srt 5.7 kB
  • 8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.srt 5.6 kB
  • 17. Stegnography/3. Encoding Data.srt 5.5 kB
  • 9. Intercepting Packets/6. Intercepting traffic from source.srt 5.4 kB
  • 3. Installation/1. Tools required.srt 5.4 kB
  • 11. Malware - File System Navigation/4. Receiving initial pwd in server.srt 5.1 kB
  • 4. Executing System Commands/2. Refactoring code.srt 4.9 kB
  • 14. Malware - Stealing Folders from victim/10. Running Program.srt 4.8 kB
  • 15. Trojan - packaging a malware/8. Adding icon to executable.srt 4.7 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.srt 4.6 kB
  • 6. Creating Network Scanner/2. Scanning Multiple ports.srt 4.6 kB
  • 12. Malware - Uploading Viruses to victim/4. Reading file contents.srt 4.6 kB
  • 15. Trojan - packaging a malware/5. Hiding console on victim.srt 4.5 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.srt 4.4 kB
  • 3. Installation/5. Setting up golang.srt 4.4 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.srt 4.3 kB
  • 12. Malware - Uploading Viruses to victim/2. Setting main function.srt 4.2 kB
  • 12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.srt 4.2 kB
  • 15. Trojan - packaging a malware/3. Running executables.srt 4.2 kB
  • 13. Malware - Downloading Files from Victim/8. Reading file content from victim.srt 4.2 kB
  • 6. Creating Network Scanner/8. Creating an nmap program in golang.srt 4.0 kB
  • 15. Trojan - packaging a malware/2. Packaging.srt 3.9 kB
  • 14. Malware - Stealing Folders from victim/3. getting folders.srt 3.8 kB
  • 3. Installation/3. IDE to use.srt 3.8 kB
  • 5. Changing MAC/3. Creating a program to automatically change MAC.srt 3.8 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.srt 3.7 kB
  • 13. Malware - Downloading Files from Victim/5. Getting user input.srt 3.6 kB
  • 12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.srt 3.6 kB
  • 9. Intercepting Packets/4. Capturing Packets.srt 3.6 kB
  • 15. Trojan - packaging a malware/10. How to perform attack over public internet.srt 3.4 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.srt 3.2 kB
  • 11. Malware - File System Navigation/7. Getting Back results.srt 3.2 kB
  • 11. Malware - File System Navigation/8. Loop Navigation on server side.srt 3.0 kB
  • 11. Malware - File System Navigation/5. Getting user input.srt 2.9 kB
  • 9. Intercepting Packets/7. Spoofed packets.srt 2.9 kB
  • 11. Malware - File System Navigation/11. Running the program.srt 2.9 kB
  • 15. Trojan - packaging a malware/7. Batch to exe.srt 2.8 kB
  • 13. Malware - Downloading Files from Victim/4. Receiving list at hacker.srt 2.8 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.srt 2.8 kB
  • 11. Malware - File System Navigation/3. Sending initial current directory to Hacker.srt 2.8 kB
  • 13. Malware - Downloading Files from Victim/9. Writing File content hacker.srt 2.7 kB
  • 15. Trojan - packaging a malware/4. Running our malware.srt 2.7 kB
  • 9. Intercepting Packets/9. Stealing Logins over HTTP.srt 2.7 kB
  • 13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.srt 2.6 kB
  • 8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.srt 2.6 kB
  • 17. Stegnography/1. Stegnography Introduction.srt 2.6 kB
  • 5. Changing MAC/2. Changing MAC using ifconfig.srt 2.5 kB
  • 14. Malware - Stealing Folders from victim/1. Downloading folder from victim.srt 2.5 kB
  • 17. Stegnography/4. Decoding Data.srt 2.5 kB
  • 12. Malware - Uploading Viruses to victim/5. Creating buffer.srt 2.5 kB
  • 14. Malware - Stealing Folders from victim/2. Setting main function.srt 2.4 kB
  • 14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.srt 2.4 kB
  • 13. Malware - Downloading Files from Victim/3. Sending list to hacker.srt 2.4 kB
  • 11. Malware - File System Navigation/2. setting up victim machine's main program.srt 2.4 kB
  • 8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.srt 2.3 kB
  • 12. Malware - Uploading Viruses to victim/3. Check File's existence.srt 2.3 kB
  • 12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.srt 2.2 kB
  • 3. Installation/2. Installing go in windows.srt 2.1 kB
  • 9. Intercepting Packets/1. Installing gopacket package in golang.srt 2.1 kB
  • 12. Malware - Uploading Viruses to victim/10. Uploading a file.srt 2.1 kB
  • 11. Malware - File System Navigation/10. Loop navigation on victim side.srt 2.0 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.srt 1.9 kB
  • 11. Malware - File System Navigation/9. Exit Condition on server.srt 1.9 kB
  • 12. Malware - Uploading Viruses to victim/9. Getting back write status.srt 1.8 kB
  • 13. Malware - Downloading Files from Victim/7. Sending file names to victim.srt 1.7 kB
  • 17. Stegnography/2. Installing Package.srt 1.7 kB
  • 14. Malware - Stealing Folders from victim/6. getting folder name on victim.srt 1.6 kB
  • 15. Trojan - packaging a malware/9. Running exe.srt 1.6 kB
  • 9. Intercepting Packets/3. searching for devices over a machine.srt 1.6 kB
  • 10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.srt 1.4 kB
  • 14. Malware - Stealing Folders from victim/4. sending folder list to hacker.srt 1.4 kB
  • 16. Keylogger/2. Starting keylogger.srt 1.3 kB
  • 6. Creating Network Scanner/3. Scanning Multiple ports continued.srt 1.2 kB
  • 13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.srt 1.2 kB
  • 13. Malware - Downloading Files from Victim/6. Converting user input to integer.srt 1.1 kB
  • 11. Malware - File System Navigation/1. Introduction.srt 839 Bytes
  • 14. Malware - Stealing Folders from victim/9. Connection.srt 620 Bytes
  • 1. Introduction to course/2. Note announcement.srt 496 Bytes
  • 10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.srt 440 Bytes
  • 7. Source Code/1. Source code.html 257 Bytes
  • 15. Trojan - packaging a malware/6.1 batch file.txt 210 Bytes
  • 3. Installation/1.1 kali linux.html 143 Bytes
  • 3. Installation/1.2 kali linux.html 143 Bytes
  • 3. Installation/1.1 Windows 10.html 134 Bytes
  • 3. Installation/1.2 Windows 10.html 134 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!