el-hacker.org Downloads
    Name                                                                                                                                                        Last modified      Size
 Name                                                                                                                                                        Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                                                                                                                 -
 Parent Directory                                                                                                                                                                 -   
![[Directorio]](/icons/folder2.png) Software/                                                                                                                                                   2021-12-22 18:35    -
 Software/                                                                                                                                                   2021-12-22 18:35    -   
![[Directorio]](/icons/folder2.png) Cuadernos Hack x Crack/                                                                                                                                     2022-01-03 23:15    -
 Cuadernos Hack x Crack/                                                                                                                                     2022-01-03 23:15    -   
![[Directorio]](/icons/folder2.png) CEH-v10/                                                                                                                                                    2022-02-17 23:22    -
 CEH-v10/                                                                                                                                                    2022-02-17 23:22    -   
![[Directorio]](/icons/folder2.png) CEH v.8 Courseware/                                                                                                                                         2022-02-24 11:36    -
 CEH v.8 Courseware/                                                                                                                                         2022-02-24 11:36    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v8/                                                                                                                 2022-02-24 11:54    -
 EC-Council.Certified.Ethical.Hacker.CEH.v8/                                                                                                                 2022-02-24 11:54    -   
![[Directorio]](/icons/folder2.png) Curso HackerHighSchool/                                                                                                                                     2022-04-12 21:42    -
 Curso HackerHighSchool/                                                                                                                                     2022-04-12 21:42    -   
![[Directorio]](/icons/folder2.png) Curso hacking/                                                                                                                                              2022-04-12 21:43    -
 Curso hacking/                                                                                                                                              2022-04-12 21:43    -   
![[Directorio]](/icons/folder2.png) El.Libro.Negro.del.Hacker.-.Black.Hack/                                                                                                                     2022-04-12 21:46    -
 El.Libro.Negro.del.Hacker.-.Black.Hack/                                                                                                                     2022-04-12 21:46    -   
![[Directorio]](/icons/folder2.png) Hacking desde cero - Rolo/                                                                                                                                  2022-04-12 21:48    -
 Hacking desde cero - Rolo/                                                                                                                                  2022-04-12 21:48    -   
![[Directorio]](/icons/folder2.png) Hacking Exposed  MadHacking/                                                                                                                                2022-04-12 21:49    -
 Hacking Exposed  MadHacking/                                                                                                                                2022-04-12 21:49    -   
![[Directorio]](/icons/folder2.png) Hacking The Art of Exploitation 2nd Edition/                                                                                                                2022-04-12 21:50    -
 Hacking The Art of Exploitation 2nd Edition/                                                                                                                2022-04-12 21:50    -   
![[Directorio]](/icons/folder2.png) HDMagazine/                                                                                                                                                 2022-04-12 21:51    -
 HDMagazine/                                                                                                                                                 2022-04-12 21:51    -   
![[Directorio]](/icons/folder2.png) Mexican hacker mafia/                                                                                                                                       2022-04-12 21:51    -
 Mexican hacker mafia/                                                                                                                                       2022-04-12 21:51    -   
![[Directorio]](/icons/folder2.png) Penetration Testing and Network Analyzer manuals (PDF)/                                                                                                     2022-04-12 21:52    -
 Penetration Testing and Network Analyzer manuals (PDF)/                                                                                                     2022-04-12 21:52    -   
![[Directorio]](/icons/folder2.png) Offensive Security/                                                                                                                                         2022-04-12 21:52    -
 Offensive Security/                                                                                                                                         2022-04-12 21:52    -   
![[Directorio]](/icons/folder2.png) TheOriginalHacker/                                                                                                                                          2022-04-12 21:57    -
 TheOriginalHacker/                                                                                                                                          2022-04-12 21:57    -   
![[Directorio]](/icons/folder2.png) Tutoriales Hakin9/                                                                                                                                          2022-04-12 21:57    -
 Tutoriales Hakin9/                                                                                                                                          2022-04-12 21:57    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v11/                                                                                                                2022-04-12 22:19    -
 EC-Council.Certified.Ethical.Hacker.CEH.v11/                                                                                                                2022-04-12 22:19    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v10/                                                                                                                2022-04-13 00:29    -
 EC-Council.Certified.Ethical.Hacker.CEH.v10/                                                                                                                2022-04-13 00:29    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v7/                                                                                                                 2022-04-13 02:17    -
 EC-Council.Certified.Ethical.Hacker.CEH.v7/                                                                                                                 2022-04-13 02:17    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v9/                                                                                                                 2022-04-13 13:39    -
 EC-Council.Certified.Ethical.Hacker.CEH.v9/                                                                                                                 2022-04-13 13:39    -   
![[Directorio]](/icons/folder2.png) ccna-ceh-CEHv8/                                                                                                                                             2022-12-26 19:14    -
 ccna-ceh-CEHv8/                                                                                                                                             2022-12-26 19:14    -   
![[Directorio]](/icons/folder2.png) EC-Council.Certified.Ethical.Hacker.CEH.v12/                                                                                                                2023-07-23 04:29    -
 EC-Council.Certified.Ethical.Hacker.CEH.v12/                                                                                                                2023-07-23 04:29    -   
![[Directorio]](/icons/folder2.png) Cisco CyberOps/                                                                                                                                             2023-11-08 13:00    -
 Cisco CyberOps/                                                                                                                                             2023-11-08 13:00    -   
![[Directorio]](/icons/folder2.png) Hacking and Pen Testing/                                                                                                                                    2024-01-25 17:09    -
 Hacking and Pen Testing/                                                                                                                                    2024-01-25 17:09    -   
![[Directorio]](/icons/folder2.png) Hacking/                                                                                                                                                    2025-01-13 11:04    -
 Hacking/                                                                                                                                                    2025-01-13 11:04    -   
![[Fichero PDF]](/icons/pdf2.png) 03. Hacking y ciberdelito autor Vicente Miguel Gimenez Solano.pdf                                                                                           2023-10-18 05:08  1.8M
 03. Hacking y ciberdelito autor Vicente Miguel Gimenez Solano.pdf                                                                                           2023-10-18 05:08  1.8M  
![[Fichero PDF]](/icons/pdf2.png) 0197-hacking-con-kali-linux.pdf                                                                                                                             2023-10-18 05:08  2.5M
 0197-hacking-con-kali-linux.pdf                                                                                                                             2023-10-18 05:08  2.5M  
![[Fichero PDF]](/icons/pdf2.png) Cosè e come si crea un hack.pdf                                                                                                                            2023-10-18 05:12  1.4M
 Cosè e come si crea un hack.pdf                                                                                                                            2023-10-18 05:12  1.4M  
![[Fichero PDF]](/icons/pdf2.png) 0174-tutoriales-gnulinux-hacking-para-principiantes.pdf                                                                                                     2023-10-18 05:12  562K
 0174-tutoriales-gnulinux-hacking-para-principiantes.pdf                                                                                                     2023-10-18 05:12  562K  
![[Fichero PDF]](/icons/pdf2.png) 3 - NO-IP.pdf                                                                                                                                               2023-10-18 05:12  1.0M
 3 - NO-IP.pdf                                                                                                                                               2023-10-18 05:12  1.0M  
![[Fichero PDF]](/icons/pdf2.png) Cracking Wifi al completo.pdf                                                                                                                               2023-10-18 05:12  907K
 Cracking Wifi al completo.pdf                                                                                                                               2023-10-18 05:12  907K  
![[Fichero PDF]](/icons/pdf2.png) HACKERS WHITE BOOK- ANGELSECURITYTEAM.pdf                                                                                                                   2023-10-18 05:12   69M
 HACKERS WHITE BOOK- ANGELSECURITYTEAM.pdf                                                                                                                   2023-10-18 05:12   69M  
![[Fichero PDF]](/icons/pdf2.png) El-Sendero-Del-Hacker.pdf                                                                                                                                   2023-10-18 05:12  2.2M
 El-Sendero-Del-Hacker.pdf                                                                                                                                   2023-10-18 05:12  2.2M  
![[Fichero PDF]](/icons/pdf2.png) Beginning Ethical Hacking With Python (2017).pdf                                                                                                            2023-10-18 05:13  3.9M
 Beginning Ethical Hacking With Python (2017).pdf                                                                                                            2023-10-18 05:13  3.9M  
![[Fichero PDF]](/icons/pdf2.png) BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf                                                                                     2023-10-18 05:17  207K
 BHUS10_Slides_Payload_already_inside_data_reuse_for_ROP_exploits_v1.pdf                                                                                     2023-10-18 05:17  207K  
![[Fichero PDF]](/icons/pdf2.png) 246483040-Burp-Suite-Professional.pdf                                                                                                                       2023-10-18 05:17  1.2M
 246483040-Burp-Suite-Professional.pdf                                                                                                                       2023-10-18 05:17  1.2M  
![[Fichero PDF]](/icons/pdf2.png) Computer Viruses - Ralph Roberts;Ed.Compute Pub. - 1988;184pags. - ISBN-0874551781.pdf                                                                      2023-10-18 05:17  4.6M
 Computer Viruses - Ralph Roberts;Ed.Compute Pub. - 1988;184pags. - ISBN-0874551781.pdf                                                                      2023-10-18 05:17  4.6M  
![[Fichero PDF]](/icons/pdf2.png) 07. Basicos de seguridad para un usuario comun (Articulo) autor Juan Daniel Lopez Gomez.pdf                                                                 2023-10-18 06:02  807K
 07. Basicos de seguridad para un usuario comun (Articulo) autor Juan Daniel Lopez Gomez.pdf                                                                 2023-10-18 06:02  807K  
![[   ]](/icons/unknown.gif) Anti-Hacker Tool Kit.chm                                                                                                                                    2023-10-18 06:02   34M
 Anti-Hacker Tool Kit.chm                                                                                                                                    2023-10-18 06:02   34M  
![[Fichero PDF]](/icons/pdf2.png) 5 - Eliminando un Spy de nuestro sistema.pdf                                                                                                                2023-10-18 06:02  558K
 5 - Eliminando un Spy de nuestro sistema.pdf                                                                                                                2023-10-18 06:02  558K  
![[Fichero PDF]](/icons/pdf2.png) Compilacion e interpretacion de Exploits (PHP, Perl, Phyton,C & C++).pdf                                                                                    2023-10-18 06:02  825K
 Compilacion e interpretacion de Exploits (PHP, Perl, Phyton,C & C++).pdf                                                                                    2023-10-18 06:02  825K  
![[Fichero PDF]](/icons/pdf2.png) 14. Hacking Etico. Una herramienta para la seguridad informatica (Articulo) autor Medina Rojas, Edwin Ferney.pdf                                            2023-10-18 06:02  288K
 14. Hacking Etico. Una herramienta para la seguridad informatica (Articulo) autor Medina Rojas, Edwin Ferney.pdf                                            2023-10-18 06:02  288K  
![[Fichero PDF]](/icons/pdf2.png) 28. Hacking And Cybercrime (Ingles) (Articulo) autor Nataliya B. Sukha.pdf                                                                                  2023-10-18 06:02   69K
 28. Hacking And Cybercrime (Ingles) (Articulo) autor Nataliya B. Sukha.pdf                                                                                  2023-10-18 06:02   69K  
![[Fichero PDF]](/icons/pdf2.png) Ataque DDOS wikipedia.org.pdf                                                                                                                               2023-10-18 06:02  101K
 Ataque DDOS wikipedia.org.pdf                                                                                                                               2023-10-18 06:02  101K  
![[Fichero PDF]](/icons/pdf2.png) Sabuesos_Escaneos_en_la_Red.pdf                                                                                                                             2023-10-18 06:02  332K
 Sabuesos_Escaneos_en_la_Red.pdf                                                                                                                             2023-10-18 06:02  332K  
![[Fichero PDF]](/icons/pdf2.png) 12. Consejos para la Proteccion de la Computadora (Articulo) autor DATCP.pdf                                                                                2023-10-18 06:02  159K
 12. Consejos para la Proteccion de la Computadora (Articulo) autor DATCP.pdf                                                                                2023-10-18 06:02  159K  
![[Fichero PDF]](/icons/pdf2.png) Certified Ethical Hacking v10-old.pdf                                                                                                                       2023-10-18 06:02   93M
 Certified Ethical Hacking v10-old.pdf                                                                                                                       2023-10-18 06:02   93M  
![[Fichero PDF]](/icons/pdf2.png) Anonymous - El Manual Super-Secreto - 0.2.1.1 - ES.pdf                                                                                                      2023-10-18 06:02  210K
 Anonymous - El Manual Super-Secreto - 0.2.1.1 - ES.pdf                                                                                                      2023-10-18 06:02  210K  
![[Fichero PDF]](/icons/pdf2.png) AkirA_OverFlow.pdf                                                                                                                                          2023-10-18 06:02  285K
 AkirA_OverFlow.pdf                                                                                                                                          2023-10-18 06:02  285K  
![[Fichero PDF]](/icons/pdf2.png) 05. ¿Que es (y que no) un hacker (Articulo) autor EGov UFSC.pdf                                                                                            2023-10-18 06:02  219K
 05. ¿Que es (y que no) un hacker (Articulo) autor EGov UFSC.pdf                                                                                            2023-10-18 06:02  219K  
![[Fichero PDF]](/icons/pdf2.png) 23. Hacking etico. impacto en la sociedad (Articulo) autor Miguel Angel Sanchez Avila.pdf                                                                   2023-10-18 06:03  292K
 23. Hacking etico. impacto en la sociedad (Articulo) autor Miguel Angel Sanchez Avila.pdf                                                                   2023-10-18 06:03  292K  
![[Fichero PDF]](/icons/pdf2.png) Agregar EOF.pdf                                                                                                                                             2023-10-18 06:03  507K
 Agregar EOF.pdf                                                                                                                                             2023-10-18 06:03  507K  
![[Fichero PDF]](/icons/pdf2.png) 24. Las revelaciones de hacking team autor Gisela Perez de Acha.pdf                                                                                         2023-10-18 06:03  443K
 24. Las revelaciones de hacking team autor Gisela Perez de Acha.pdf                                                                                         2023-10-18 06:03  443K  
![[   ]](/icons/pdf2.png) Ethical Hacking 2.0, USERS - Héctor Jara, Federico Pacheco.PDF                                                                                             2023-10-18 06:03  106M
 Ethical Hacking 2.0, USERS - Héctor Jara, Federico Pacheco.PDF                                                                                             2023-10-18 06:03  106M  
![[Fichero PDF]](/icons/pdf2.png) 01. Hackers. Los piratas del chip y de internet autor Claudio Hernandez .pdf                                                                                2023-10-18 06:03  1.0M
 01. Hackers. Los piratas del chip y de internet autor Claudio Hernandez .pdf                                                                                2023-10-18 06:03  1.0M  
![[Fichero PDF]](/icons/pdf2.png) 10. Hackers y ciberseguridad autor CPPM.pdf                                                                                                                 2023-10-18 06:03  1.3M
 10. Hackers y ciberseguridad autor CPPM.pdf                                                                                                                 2023-10-18 06:03  1.3M  
![[Fichero PDF]](/icons/pdf2.png) 2. Seguridad - USERS.pdf                                                                                                                                    2023-10-18 06:03   64M
 2. Seguridad - USERS.pdf                                                                                                                                    2023-10-18 06:03   64M  
![[Fichero PDF]](/icons/pdf2.png) 64104491-Curso-Hacker-2010.pdf                                                                                                                              2023-10-18 06:03  288K
 64104491-Curso-Hacker-2010.pdf                                                                                                                              2023-10-18 06:03  288K  
![[TXT]](/icons/text.gif) Como Esconder tu IP.txt                                                                                                                                     2023-10-18 06:06   13K
 Como Esconder tu IP.txt                                                                                                                                     2023-10-18 06:06   13K  
![[Fichero PDF]](/icons/pdf2.png) 02. Etica hacker, seguridad y vigilancia autor Universidad del Claustro de Sor Juana.pdf                                                                    2023-10-18 06:06   13M
 02. Etica hacker, seguridad y vigilancia autor Universidad del Claustro de Sor Juana.pdf                                                                    2023-10-18 06:06   13M  
![[IMG]](/icons/image2.gif) 11288-mistic100-PiratesdesCaraibes.png                                                                                                                      2023-10-18 06:06   81K
 11288-mistic100-PiratesdesCaraibes.png                                                                                                                      2023-10-18 06:06   81K  
![[Fichero PDF]](/icons/pdf2.png) Advanced Penetration Testing. Hacking the World’s Most Secure Networks.pdf                                                                                2023-10-18 06:06  6.3M
 Advanced Penetration Testing. Hacking the World’s Most Secure Networks.pdf                                                                                2023-10-18 06:06  6.3M  
![[Fichero PDF]](/icons/pdf2.png) Anonymous_v2.pdf                                                                                                                                            2023-10-18 06:06  211K
 Anonymous_v2.pdf                                                                                                                                            2023-10-18 06:06  211K  
![[Fichero PDF]](/icons/pdf2.png) 1 - Introduccion.pdf                                                                                                                                        2023-10-18 06:06  195K
 1 - Introduccion.pdf                                                                                                                                        2023-10-18 06:06  195K  
![[Fichero comrpimido]](/icons/system-file-manager.png) CompleteWorkOfHasherezadeVXUG.7z                                                                                                                            2023-10-18 06:06   83M
 CompleteWorkOfHasherezadeVXUG.7z                                                                                                                            2023-10-18 06:06   83M  
![[Fichero PDF]](/icons/pdf2.png) El_Arte_del_Engaño.pdf                                                                                                                                    2023-10-18 06:06  963K
 El_Arte_del_Engaño.pdf                                                                                                                                    2023-10-18 06:06  963K  
![[Fichero PDF]](/icons/pdf2.png) Buffer_Overflow_Windows_por_Ikary.pdf                                                                                                                       2023-10-18 06:06  2.9M
 Buffer_Overflow_Windows_por_Ikary.pdf                                                                                                                       2023-10-18 06:06  2.9M  
![[Fichero PDF]](/icons/pdf2.png) Desbordamiento de la Pila Linux en x86 - Piotr Sobolewski (Extracto revista Hackin9 del 2004).pdf                                                           2023-10-18 06:06  1.2M
 Desbordamiento de la Pila Linux en x86 - Piotr Sobolewski (Extracto revista Hackin9 del 2004).pdf                                                           2023-10-18 06:06  1.2M  
![[Fichero PDF]](/icons/pdf2.png) Hacker-Hoaxer-Whistleblower-Spy-The-Story-of-Anonymous.pdf                                                                                                  2023-10-18 06:06  1.5M
 Hacker-Hoaxer-Whistleblower-Spy-The-Story-of-Anonymous.pdf                                                                                                  2023-10-18 06:06  1.5M  
![[Fichero PDF]](/icons/pdf2.png) CEH v8 Español.pdf                                                                                                                                         2023-10-18 06:06  119M
 CEH v8 Español.pdf                                                                                                                                         2023-10-18 06:06  119M  
![[Fichero PDF]](/icons/pdf2.png) Black_Hat_Hacker.pdf                                                                                                                                        2023-10-18 06:06  1.2M
 Black_Hat_Hacker.pdf                                                                                                                                        2023-10-18 06:06  1.2M  
![[Fichero PDF]](/icons/pdf2.png) BHUSA09-Dzulfakar-MySQLExploit-PAPER.pdf                                                                                                                    2023-10-18 06:06   30K
 BHUSA09-Dzulfakar-MySQLExploit-PAPER.pdf                                                                                                                    2023-10-18 06:06   30K  
![[Fichero PDF]](/icons/pdf2.png) breaking80211-by-Aetsu.pdf                                                                                                                                  2023-10-18 06:07  3.7M
 breaking80211-by-Aetsu.pdf                                                                                                                                  2023-10-18 06:07  3.7M  
![[Fichero PDF]](/icons/pdf2.png) BeEF Fake Browser Update Exploitation.pdf                                                                                                                   2023-10-18 06:07  697K
 BeEF Fake Browser Update Exploitation.pdf                                                                                                                   2023-10-18 06:07  697K  
![[Fichero PDF]](/icons/pdf2.png) backdooring con PHP.pdf                                                                                                                                     2023-10-18 06:07   47K
 backdooring con PHP.pdf                                                                                                                                     2023-10-18 06:07   47K  
![[Fichero PDF]](/icons/pdf2.png) Crea tu propio proxy para navegar desde la escuela o el trabajo - Sozter!.pdf                                                                               2023-10-18 06:07  697K
 Crea tu propio proxy para navegar desde la escuela o el trabajo - Sozter!.pdf                                                                               2023-10-18 06:07  697K  
![[Fichero PDF]](/icons/pdf2.png) 04. La filosofia hacking and cracking - Benjamin Martinez Alarcon.pdf                                                                                       2023-10-18 06:07  899K
 04. La filosofia hacking and cracking - Benjamin Martinez Alarcon.pdf                                                                                       2023-10-18 06:07  899K  
![[Fichero PDF]](/icons/pdf2.png) Ingenieria Social; El Arte del Hacking Personal - Christopher Hadnagy;Ed.Anaya - 2011;400págs. - ISBN-9788441529656.pdf                                    2023-10-18 06:07   74M
 Ingenieria Social; El Arte del Hacking Personal - Christopher Hadnagy;Ed.Anaya - 2011;400págs. - ISBN-9788441529656.pdf                                    2023-10-18 06:07   74M  
![[Fichero PDF]](/icons/pdf2.png) 25. Ethical Hacking (Ingles) autor Alana Maurushat.pdf                                                                                                      2023-10-18 06:07  7.1M
 25. Ethical Hacking (Ingles) autor Alana Maurushat.pdf                                                                                                      2023-10-18 06:07  7.1M  
![[Fichero PDF]](/icons/pdf2.png) 08. Hacker y hacking (Articulo) autor ENCB - IPN.pdf                                                                                                        2023-10-18 06:07  613K
 08. Hacker y hacking (Articulo) autor ENCB - IPN.pdf                                                                                                        2023-10-18 06:07  613K  
![[Fichero PDF]](/icons/pdf2.png) 13. Sobre el hacking (Articulo) autor Richard Stallman.pdf                                                                                                  2023-10-18 06:10   38K
 13. Sobre el hacking (Articulo) autor Richard Stallman.pdf                                                                                                  2023-10-18 06:10   38K  
![[Fichero PDF]](/icons/pdf2.png) 22. Tipos de hacking (Articulo) autor Luis Eduardo Contreras Aguilar y Angel Osvaldo Garcia Padilla.pdf                                                     2023-10-18 06:10  174K
 22. Tipos de hacking (Articulo) autor Luis Eduardo Contreras Aguilar y Angel Osvaldo Garcia Padilla.pdf                                                     2023-10-18 06:10  174K  
![[Fichero PDF]](/icons/pdf2.png) 29. Modern Era Hacking (Ingles) (Articulo) autor Dr Amarendra K, Venkata Naresh Mandhala and SaiSri Damecharla.pdf                                          2023-10-18 06:12  182K
 29. Modern Era Hacking (Ingles) (Articulo) autor Dr Amarendra K, Venkata Naresh Mandhala and SaiSri Damecharla.pdf                                          2023-10-18 06:12  182K  
![[Fichero PDF]](/icons/pdf2.png) 4 - Configuracion de los Troyanos.pdf                                                                                                                       2023-10-18 06:12  2.1M
 4 - Configuracion de los Troyanos.pdf                                                                                                                       2023-10-18 06:12  2.1M  
![[Fichero PDF]](/icons/pdf2.png) 20. Un viaje en la historia del hacking (Articulo) autor David Puente Castro.pdf                                                                            2023-10-18 06:12  778K
 20. Un viaje en la historia del hacking (Articulo) autor David Puente Castro.pdf                                                                            2023-10-18 06:12  778K  
![[Fichero PDF]](/icons/pdf2.png) 17334.pdf                                                                                                                                                   2023-10-18 06:12  542K
 17334.pdf                                                                                                                                                   2023-10-18 06:12  542K  
![[Fichero PDF]](/icons/pdf2.png) 18. Ataques informaticos, ethical hacking y conciencia de seguridad informatica en ninos (Articulo) autor Lady Johana Canon Parada.pdf                      2023-10-18 06:12  345K
 18. Ataques informaticos, ethical hacking y conciencia de seguridad informatica en ninos (Articulo) autor Lady Johana Canon Parada.pdf                      2023-10-18 06:12  345K  
![[Fichero PDF]](/icons/pdf2.png) 6 - Routers y Puertos.pdf                                                                                                                                   2023-10-18 06:12  172K
 6 - Routers y Puertos.pdf                                                                                                                                   2023-10-18 06:12  172K  
![[Fichero PDF]](/icons/pdf2.png) Buscando Vulnerabilidades en Windows [Tenable Nessus].pdf                                                                                                   2023-10-18 06:12  457K
 Buscando Vulnerabilidades en Windows [Tenable Nessus].pdf                                                                                                   2023-10-18 06:12  457K  
![[Fichero PDF]](/icons/pdf2.png) Kali_Linux_v3_Alonso_ReYDeS.pdf                                                                                                                             2023-10-18 06:12  9.9M
 Kali_Linux_v3_Alonso_ReYDeS.pdf                                                                                                                             2023-10-18 06:12  9.9M  
![[Fichero PDF]](/icons/pdf2.png) 09. Analisis comparativo de las principales tecnicas de hacking empresarial (Articulo) autor Jhon F Duque B, Larry Andres Silva y Edys Daliza Renteria.pdf  2023-10-18 06:12   73K
 09. Analisis comparativo de las principales tecnicas de hacking empresarial (Articulo) autor Jhon F Duque B, Larry Andres Silva y Edys Daliza Renteria.pdf  2023-10-18 06:12   73K  
![[Fichero PDF]](/icons/pdf2.png) BHUSA09-Blunden-AntiForensics-PAPER.pdf                                                                                                                     2023-10-18 06:13  596K
 BHUSA09-Blunden-AntiForensics-PAPER.pdf                                                                                                                     2023-10-18 06:13  596K  
![[Fichero PDF]](/icons/pdf2.png) 17. La historia completa del hacking autor Ariel Cruz y Vladimir Hernandez.pdf                                                                              2023-10-18 06:13  442K
 17. La historia completa del hacking autor Ariel Cruz y Vladimir Hernandez.pdf                                                                              2023-10-18 06:13  442K  
![[   ]](/icons/pdf2.png) ANON - El Libro Hacker.PDF                                                                                                                                  2023-10-18 06:13  489K
 ANON - El Libro Hacker.PDF                                                                                                                                  2023-10-18 06:13  489K  
![[Fichero PDF]](/icons/pdf2.png) (Ebook Pdf) Computers - Hacking - Hack Proofing Your Network 2Ed.pdf                                                                                        2023-10-18 06:13  8.8M
 (Ebook Pdf) Computers - Hacking - Hack Proofing Your Network 2Ed.pdf                                                                                        2023-10-18 06:13  8.8M  
![[Fichero PDF]](/icons/pdf2.png) Clustering.pdf                                                                                                                                              2023-10-18 06:13   61K
 Clustering.pdf                                                                                                                                              2023-10-18 06:13   61K  
![[Fichero PDF]](/icons/pdf2.png) Como iniciarse en hacking c0d3r17.pdf                                                                                                                       2023-10-18 06:13  7.5M
 Como iniciarse en hacking c0d3r17.pdf                                                                                                                       2023-10-18 06:13  7.5M  
![[Fichero PDF]](/icons/pdf2.png) 19. Delitos Informaticos autor Rene de Sola Quintero.pdf                                                                                                    2023-10-18 06:13   93K
 19. Delitos Informaticos autor Rene de Sola Quintero.pdf                                                                                                    2023-10-18 06:13   93K  
![[Fichero PDF]](/icons/pdf2.png) 287514932-Burp-Suite.pdf                                                                                                                                    2023-10-18 06:13  1.1M
 287514932-Burp-Suite.pdf                                                                                                                                    2023-10-18 06:13  1.1M  
![[Fichero PDF]](/icons/pdf2.png) 06. Tipos de hackers (Articulo) autor Carlos Alberto Flores Quispe.pdf                                                                                      2023-10-18 06:13  1.3M
 06. Tipos de hackers (Articulo) autor Carlos Alberto Flores Quispe.pdf                                                                                      2023-10-18 06:13  1.3M  
![[Fichero PDF]](/icons/pdf2.png) 1780_27c3_console_hacking_2010.pdf                                                                                                                          2023-10-18 06:13  8.7M
 1780_27c3_console_hacking_2010.pdf                                                                                                                          2023-10-18 06:13  8.7M  
![[Fichero PDF]](/icons/pdf2.png) advancedpenetrationtesting.pdf                                                                                                                              2023-10-18 06:13   10M
 advancedpenetrationtesting.pdf                                                                                                                              2023-10-18 06:13   10M  
![[Fichero PDF]](/icons/pdf2.png) ALVARO CHIROU - SEGURIDAD INFORMÁTICA.pdf                                                                                                                  2023-10-18 06:14  3.6M
 ALVARO CHIROU - SEGURIDAD INFORMÁTICA.pdf                                                                                                                  2023-10-18 06:14  3.6M  
![[Fichero PDF]](/icons/pdf2.png) 21. Delitos informaticos. su clasificacion y una vision general de las medidas de accion para combatirlo (Articulo) autor Jesus Alberto Loredo Gonzalez.pdf 2023-10-18 06:14  356K
 21. Delitos informaticos. su clasificacion y una vision general de las medidas de accion para combatirlo (Articulo) autor Jesus Alberto Loredo Gonzalez.pdf 2023-10-18 06:14  356K  
![[Fichero PDF]](/icons/pdf2.png) Gestión_de_la_Seguridad_Informática,_USERS_Fabián_Portantier.pdf                                                                                         2023-10-18 06:14  115M
 Gestión_de_la_Seguridad_Informática,_USERS_Fabián_Portantier.pdf                                                                                         2023-10-18 06:14  115M  
![[Fichero PDF]](/icons/pdf2.png) Hacking_the_Hacker.pdf                                                                                                                                      2023-10-18 06:14  3.1M
 Hacking_the_Hacker.pdf                                                                                                                                      2023-10-18 06:14  3.1M  
![[TXT]](/icons/text.gif) Cerrar puertos 135,137,etc.txt                                                                                                                              2023-10-18 06:14  528
 Cerrar puertos 135,137,etc.txt                                                                                                                              2023-10-18 06:14  528   
![[Fichero PDF]](/icons/pdf2.png) 3 - Analisis de malwares.pdf                                                                                                                                2023-10-18 06:14  1.5M
 3 - Analisis de malwares.pdf                                                                                                                                2023-10-18 06:14  1.5M  
![[Fichero PDF]](/icons/pdf2.png) Crackear WPA-WPA2-PSK BY ANTRAX.pdf                                                                                                                         2023-10-18 06:14  519K
 Crackear WPA-WPA2-PSK BY ANTRAX.pdf                                                                                                                         2023-10-18 06:14  519K  
![[Fichero PDF]](/icons/pdf2.png) bypassing-av.pdf                                                                                                                                            2023-10-18 06:14  1.0M
 bypassing-av.pdf                                                                                                                                            2023-10-18 06:14  1.0M  
![[Fichero PDF]](/icons/pdf2.png) Cookies.pdf                                                                                                                                                 2023-10-18 06:14  280K
 Cookies.pdf                                                                                                                                                 2023-10-18 06:14  280K  
![[Fichero PDF]](/icons/pdf2.png) cocon_paper.pdf                                                                                                                                             2023-10-18 06:14  352K
 cocon_paper.pdf                                                                                                                                             2023-10-18 06:14  352K  
![[Fichero PDF]](/icons/pdf2.png) Attack-Surfaces-Tools-and-Techniques.pdf                                                                                                                    2023-10-18 06:15  4.9M
 Attack-Surfaces-Tools-and-Techniques.pdf                                                                                                                    2023-10-18 06:15  4.9M  
![[Fichero PDF]](/icons/pdf2.png) Antivirus hackers handbook.pdf                                                                                                                              2023-10-18 06:15  5.6M
 Antivirus hackers handbook.pdf                                                                                                                              2023-10-18 06:15  5.6M  
![[IMG]](/icons/image2.gif) PowerShell Cheat Sheet.jpg                                                                                                                                  2023-10-18 06:15  325K
 PowerShell Cheat Sheet.jpg                                                                                                                                  2023-10-18 06:15  325K  
![[Fichero PDF]](/icons/pdf2.png) 16. Ethical Hacking. La Importancia de una intrusion controlada (Articulo) autor Manuel Henry Sanchez Carvajal.pdf                                          2023-10-18 06:18  1.3M
 16. Ethical Hacking. La Importancia de una intrusion controlada (Articulo) autor Manuel Henry Sanchez Carvajal.pdf                                          2023-10-18 06:18  1.3M  
![[TXT]](/icons/text.gif) Cerrar Puertos 135 – 137 – 138 – 139 – 445 – 5000 – 1900.txt                                                                                    2023-10-18 06:21  8.5K
 Cerrar Puertos 135 – 137 – 138 – 139 – 445 – 5000 – 1900.txt                                                                                    2023-10-18 06:21  8.5K  
![[Fichero PDF]](/icons/pdf2.png) 86171562-Pen-Testing-With-Burp-Suite.pdf                                                                                                                    2023-10-18 06:21  738K
 86171562-Pen-Testing-With-Burp-Suite.pdf                                                                                                                    2023-10-18 06:21  738K  
![[TXT]](/icons/text.gif) COMO CONSEGUIR SAM Y HASHES.txt                                                                                                                             2023-10-18 06:21  4.9K
 COMO CONSEGUIR SAM Y HASHES.txt                                                                                                                             2023-10-18 06:21  4.9K  
![[Fichero PDF]](/icons/pdf2.png) backdoor-via-injeccion-2.pdf                                                                                                                                2023-10-18 06:21  537K
 backdoor-via-injeccion-2.pdf                                                                                                                                2023-10-18 06:21  537K  
![[Fichero PDF]](/icons/pdf2.png) 0xWord-Ataque-en-Redes-de-Datos-IPv4-e-IPv6-2da-Edicion_v6.pdf                                                                                              2023-10-18 06:22   41M
 0xWord-Ataque-en-Redes-de-Datos-IPv4-e-IPv6-2da-Edicion_v6.pdf                                                                                              2023-10-18 06:22   41M  
![[Fichero PDF]](/icons/pdf2.png) 11. Herramientas fundamentales para el hacking etico autor Alain Eduardo Rodriguez Llerena.pdf                                                              2023-10-18 06:22  534K
 11. Herramientas fundamentales para el hacking etico autor Alain Eduardo Rodriguez Llerena.pdf                                                              2023-10-18 06:22  534K  
![[Fichero PDF]](/icons/pdf2.png) El Arte de la Intrusion - Kevin D.Mitnick,Willian L.Simon;Ed.Ra-Ma - 2007-371pags - ISBN-8478977481, 9789701512609.pdf                                      2023-10-18 06:22  2.2M
 El Arte de la Intrusion - Kevin D.Mitnick,Willian L.Simon;Ed.Ra-Ma - 2007-371pags - ISBN-8478977481, 9789701512609.pdf                                      2023-10-18 06:22  2.2M  
![[Fichero PDF]](/icons/pdf2.png) BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf                                                                                                                  2023-10-18 06:22  164K
 BHUSA09-Ortega-DeactivateRootkit-PAPER.pdf                                                                                                                  2023-10-18 06:22  164K  
![[   ]](/icons/unknown.gif) ataques_XSS_CSRF.ppt                                                                                                                                        2023-10-18 06:22   68K
 ataques_XSS_CSRF.ppt                                                                                                                                        2023-10-18 06:22   68K  
![[Fichero PDF]](/icons/pdf2.png) EXP-301_Windows_User_Mode_Exploit_Development.pdf                                                                                                           2023-10-18 06:23   97M
 EXP-301_Windows_User_Mode_Exploit_Development.pdf                                                                                                           2023-10-18 06:23   97M  
![[TXT]](/icons/text.gif) Cambiando firmas con Procdump.txt                                                                                                                           2023-10-18 06:23  561
 Cambiando firmas con Procdump.txt                                                                                                                           2023-10-18 06:23  561   
![[Fichero PDF]](/icons/pdf2.png) (Informatica Seguridad Analisis) Hacking - Hacking For Dummies, How To Learn To Hack In Easy Steps (English).pdf                                            2023-10-18 06:23  182K
 (Informatica Seguridad Analisis) Hacking - Hacking For Dummies, How To Learn To Hack In Easy Steps (English).pdf                                            2023-10-18 06:23  182K  
![[TXT]](/icons/text.gif) bypassDEP.txt                                                                                                                                               2023-10-18 06:23  665
 bypassDEP.txt                                                                                                                                               2023-10-18 06:23  665   
![[TXT]](/icons/text.gif) Backdoor reverse shell con netcat.txt                                                                                                                       2023-10-18 06:23  1.3K
 Backdoor reverse shell con netcat.txt                                                                                                                       2023-10-18 06:23  1.3K  
![[Fichero PDF]](/icons/pdf2.png) La-etica-del-hacker-y-el-espiritu-de-la-era-de-la-informacion-Pekka-Himanen.pdf                                                                             2023-10-18 06:23  838K
 La-etica-del-hacker-y-el-espiritu-de-la-era-de-la-informacion-Pekka-Himanen.pdf                                                                             2023-10-18 06:23  838K  
![[   ]](/icons/tar.gif) Cuadernos de Hack x Crack [completo las 30 revistas en pdf].tar                                                                                             2023-10-18 06:24  406M
 Cuadernos de Hack x Crack [completo las 30 revistas en pdf].tar                                                                                             2023-10-18 06:24  406M  
![[Fichero PDF]](/icons/pdf2.png) BHUSA09-Williams-EnterpriseJavaRootkits-PAPER.pdf                                                                                                           2023-10-18 06:24  3.3M
 BHUSA09-Williams-EnterpriseJavaRootkits-PAPER.pdf                                                                                                           2023-10-18 06:24  3.3M  
![[Fichero PDF]](/icons/pdf2.png) apihooking.pdf                                                                                                                                              2023-10-18 06:24  120K
 apihooking.pdf                                                                                                                                              2023-10-18 06:24  120K  
![[Fichero PDF]](/icons/pdf2.png) Los_piratas_son_los_padres.pdf                                                                                                                              2023-10-18 06:24  1.8M
 Los_piratas_son_los_padres.pdf                                                                                                                              2023-10-18 06:24  1.8M  
![[Fichero PDF]](/icons/pdf2.png) Reality_Hackers.pdf                                                                                                                                         2023-10-18 06:24  5.6M
 Reality_Hackers.pdf                                                                                                                                         2023-10-18 06:24  5.6M  
![[   ]](/icons/unknown.gif) Accediendo a Windows XP desde BackTrack 5 utilizando Metasploit.docx                                                                                        2023-10-18 06:24  1.3M
 Accediendo a Windows XP desde BackTrack 5 utilizando Metasploit.docx                                                                                        2023-10-18 06:24  1.3M  
![[Fichero PDF]](/icons/pdf2.png) La_Caza_De_Hackers.pdf                                                                                                                                      2023-10-18 06:24  569K
 La_Caza_De_Hackers.pdf                                                                                                                                      2023-10-18 06:24  569K  
![[Fichero PDF]](/icons/pdf2.png) 00414_libro_blanco.pdf                                                                                                                                      2023-10-18 06:24  163M
 00414_libro_blanco.pdf                                                                                                                                      2023-10-18 06:24  163M  
![[Fichero PDF]](/icons/pdf2.png) 26. Types of Hacking Attack and their Counter Measure (Ingles) autor Minakshi Bhardwaj and G.P. Singh.pdf                                                   2023-10-18 06:24   64K
 26. Types of Hacking Attack and their Counter Measure (Ingles) autor Minakshi Bhardwaj and G.P. Singh.pdf                                                   2023-10-18 06:24   64K  
![[Fichero PDF]](/icons/pdf2.png) 15. Introduccion al hacker etico (Articulo) autor Betancourt, Jhonny.pdf                                                                                    2023-10-18 06:24  281K
 15. Introduccion al hacker etico (Articulo) autor Betancourt, Jhonny.pdf                                                                                    2023-10-18 06:24  281K  
![[Fichero PDF]](/icons/pdf2.png) Bypassing SQUID Proxy with SSH Tunneling.pdf                                                                                                                2023-10-18 06:27  167K
 Bypassing SQUID Proxy with SSH Tunneling.pdf                                                                                                                2023-10-18 06:27  167K  
![[Fichero PDF]](/icons/pdf2.png) Beginning Ethical Hacking with Python (2019).pdf                                                                                                            2023-10-18 06:27  3.8M
 Beginning Ethical Hacking with Python (2019).pdf                                                                                                            2023-10-18 06:27  3.8M  
![[Fichero PDF]](/icons/pdf2.png) Offensive Countermeasures - The Art Of Active Defense.pdf                                                                                                   2023-11-09 19:09  1.7M
 Offensive Countermeasures - The Art Of Active Defense.pdf                                                                                                   2023-11-09 19:09  1.7M  
![[Fichero PDF]](/icons/pdf2.png) The Art of Windows Persistence.pdf                                                                                                                          2024-07-08 13:07  9.8M
 The Art of Windows Persistence.pdf                                                                                                                          2024-07-08 13:07  9.8M  
![[Fichero PDF]](/icons/pdf2.png) Windows & Active Directory Exploitation Cheat Sheet.pdf                                                                                                     2024-07-08 13:07  841K
 Windows & Active Directory Exploitation Cheat Sheet.pdf                                                                                                     2024-07-08 13:07  841K  
![[Fichero PDF]](/icons/pdf2.png) Active Directory Exploitation .pdf                                                                                                                          2024-07-08 13:08  362K
 Active Directory Exploitation .pdf                                                                                                                          2024-07-08 13:08  362K  
![[Fichero PDF]](/icons/pdf2.png) Active_Directory.pdf                                                                                                                                        2024-07-08 13:08   33M
 Active_Directory.pdf                                                                                                                                        2024-07-08 13:08   33M  
![[Fichero PDF]](/icons/pdf2.png) AD Security Checklist.pdf.pdf                                                                                                                               2024-07-08 13:08  208K
 AD Security Checklist.pdf.pdf                                                                                                                               2024-07-08 13:08  208K  
![[Fichero PDF]](/icons/pdf2.png) Pentesting APIs And Cloud Applications @library_Sec.pdf                                                                                                     2024-07-08 13:16  3.5M
 Pentesting APIs And Cloud Applications @library_Sec.pdf                                                                                                     2024-07-08 13:16  3.5M  
![[Fichero PDF]](/icons/pdf2.png) Cyberjutsu_Cybersecurity_for_the_Modern_Ninja_Ben_McCarty_Z_Library.pdf                                                                                     2024-07-08 13:16  7.1M
 Cyberjutsu_Cybersecurity_for_the_Modern_Ninja_Ben_McCarty_Z_Library.pdf                                                                                     2024-07-08 13:16  7.1M  
![[Fichero PDF]](/icons/pdf2.png) Port Forwarding and Tunnelling Cheatsheet.pdf                                                                                                               2024-07-08 13:16  5.2M
 Port Forwarding and Tunnelling Cheatsheet.pdf                                                                                                               2024-07-08 13:16  5.2M  
![[Fichero PDF]](/icons/pdf2.png) Nmap Cook Book - Free Network Scanning Guide.pdf                                                                                                            2024-07-08 13:16  6.3M
 Nmap Cook Book - Free Network Scanning Guide.pdf                                                                                                            2024-07-08 13:16  6.3M  
![[Fichero PDF]](/icons/pdf2.png) Professional_Red_Teaming_Conducting_Successful_Cybersecurity_Eng.pdf                                                                                        2024-07-08 13:16  5.6M
 Professional_Red_Teaming_Conducting_Successful_Cybersecurity_Eng.pdf                                                                                        2024-07-08 13:16  5.6M  
![[Fichero PDF]](/icons/pdf2.png) Metasploit_The_Penetration_Tester s_Guide_PDFDrive_com_.pdf                                                                                                 2024-07-08 13:16  6.9M
 Metasploit_The_Penetration_Tester s_Guide_PDFDrive_com_.pdf                                                                                                 2024-07-08 13:16  6.9M  
![[Fichero PDF]](/icons/pdf2.png) Black Book of Viruses and Hacking.pdf                                                                                                                       2024-07-08 13:16  1.4M
 Black Book of Viruses and Hacking.pdf                                                                                                                       2024-07-08 13:16  1.4M  
![[Fichero PDF]](/icons/pdf2.png) Password Cracking Techniques.pdf                                                                                                                            2024-07-08 13:16  433K
 Password Cracking Techniques.pdf                                                                                                                            2024-07-08 13:16  433K  
![[Fichero PDF]](/icons/pdf2.png) Penetration Testing with the Bash shell ( PDFDrive ).pdf                                                                                                    2024-07-08 13:16  3.4M
 Penetration Testing with the Bash shell ( PDFDrive ).pdf                                                                                                    2024-07-08 13:16  3.4M  
![[   ]](/icons/unknown.gif) [Bookflare.net] - Learning Kali Linux Security Testing, Penetration Testing, and Ethical Hacking.epub                                                       2025-01-13 11:21  6.8M
 [Bookflare.net] - Learning Kali Linux Security Testing, Penetration Testing, and Ethical Hacking.epub                                                       2025-01-13 11:21  6.8M  
![[Fichero PDF]](/icons/pdf2.png) ◢ ◤ Hackear claves wifi desde Android ◢ ◤-1.pdf                                                                                                     2025-01-13 11:21  441K
 ◢ ◤ Hackear claves wifi desde Android ◢ ◤-1.pdf                                                                                                     2025-01-13 11:21  441K  
![[Fichero PDF]](/icons/pdf2.png) 01_Ataques_informaticos-1.pdf                                                                                                                               2025-01-13 11:21  158K
 01_Ataques_informaticos-1.pdf                                                                                                                               2025-01-13 11:21  158K  
![[Fichero PDF]](/icons/pdf2.png) 1.pdf                                                                                                                                                       2025-01-13 11:21  8.2M
 1.pdf                                                                                                                                                       2025-01-13 11:21  8.2M  
![[Fichero PDF]](/icons/pdf2.png) 02_INGENIERÍA_SOCIAL-1.pdf                                                                                                                                 2025-01-13 11:21  7.2M
 02_INGENIERÍA_SOCIAL-1.pdf                                                                                                                                 2025-01-13 11:21  7.2M  
![[Fichero PDF]](/icons/pdf2.png) 08 - Virus Informaticos.pdf                                                                                                                                 2025-01-13 11:21  503K
 08 - Virus Informaticos.pdf                                                                                                                                 2025-01-13 11:21  503K  
![[Fichero PDF]](/icons/pdf2.png) 100_ anonymous.pdf                                                                                                                                          2025-01-13 11:21  143K
 100_ anonymous.pdf                                                                                                                                          2025-01-13 11:21  143K  
![[Fichero PDF]](/icons/pdf2.png) 00112_la_biblia_del_hacker.pdf                                                                                                                              2025-01-13 11:21  3.8M
 00112_la_biblia_del_hacker.pdf                                                                                                                              2025-01-13 11:21  3.8M  
![[Fichero PDF]](/icons/pdf2.png) 00186_R3v3rsing_Ingenieria_nversa.pdf                                                                                                                       2025-01-13 11:21   31M
 00186_R3v3rsing_Ingenieria_nversa.pdf                                                                                                                       2025-01-13 11:21   31M  
![[Fichero PDF]](/icons/pdf2.png) 00211_hacking-y-seguridad-en-internet.pdf                                                                                                                   2025-01-13 11:21   40M
 00211_hacking-y-seguridad-en-internet.pdf                                                                                                                   2025-01-13 11:21   40M  
![[Fichero PDF]](/icons/pdf2.png) 00219_hacker_.pdf                                                                                                                                           2025-01-13 11:21   48M
 00219_hacker_.pdf                                                                                                                                           2025-01-13 11:21   48M  
![[Fichero PDF]](/icons/pdf2.png) 00259_hacking_cracking.pdf                                                                                                                                  2025-01-13 11:21   41M
 00259_hacking_cracking.pdf                                                                                                                                  2025-01-13 11:21   41M  
![[Fichero PDF]](/icons/pdf2.png) 9249f6e4-ef2c-4f30-9b02-7c2bf241cd2f.pdf                                                                                                                    2025-01-13 11:21  2.2M
 9249f6e4-ef2c-4f30-9b02-7c2bf241cd2f.pdf                                                                                                                    2025-01-13 11:21  2.2M  
![[Fichero PDF]](/icons/pdf2.png) 15182bda2da72e900fcb531c7224d9f141cc.pdf                                                                                                                    2025-01-13 11:21  401K
 15182bda2da72e900fcb531c7224d9f141cc.pdf                                                                                                                    2025-01-13 11:21  401K  
![[Fichero PDF]](/icons/pdf2.png) 17701-social-engineering-toolkit.pdf                                                                                                                        2025-01-13 11:21  1.0M
 17701-social-engineering-toolkit.pdf                                                                                                                        2025-01-13 11:21  1.0M  
![[Fichero PDF]](/icons/pdf2.png) 30960_Internet_Negro.pdf                                                                                                                                    2025-01-13 11:21  1.1M
 30960_Internet_Negro.pdf                                                                                                                                    2025-01-13 11:21  1.1M  
![[Fichero PDF]](/icons/pdf2.png) 20171130_Proceso-Implementacion-SGSI-SGCN-dagonzalez.pdf                                                                                                    2025-01-13 11:21  520K
 20171130_Proceso-Implementacion-SGSI-SGCN-dagonzalez.pdf                                                                                                    2025-01-13 11:21  520K  
![[Fichero PDF]](/icons/pdf2.png) 349807879-0xword-Hacker-Epico-V2 (1).pdf                                                                                                                    2025-01-13 11:21   13M
 349807879-0xword-Hacker-Epico-V2 (1).pdf                                                                                                                    2025-01-13 11:21   13M  
![[Fichero PDF]](/icons/pdf2.png) 9788499647678.pdf                                                                                                                                           2025-01-13 11:21  3.0M
 9788499647678.pdf                                                                                                                                           2025-01-13 11:21  3.0M  
![[Fichero PDF]](/icons/pdf2.png) Advanced Penetration Testing for Highly Secured Environments.pdf                                                                                            2025-01-13 11:22   16M
 Advanced Penetration Testing for Highly Secured Environments.pdf                                                                                            2025-01-13 11:22   16M  
![[Fichero PDF]](/icons/pdf2.png) Advanced Persistent Threat Hacking, The Art & Science...pdf                                                                                                 2025-01-13 11:22   11M
 Advanced Persistent Threat Hacking, The Art & Science...pdf                                                                                                 2025-01-13 11:22   11M  
![[   ]](/icons/unknown.gif) Agile Information Security - Using Scrum To Survive In And Secure A Rapidly Changing Environment.epub                                                       2025-01-13 11:22  502K
 Agile Information Security - Using Scrum To Survive In And Secure A Rapidly Changing Environment.epub                                                       2025-01-13 11:22  502K  
![[Fichero PDF]](/icons/pdf2.png) Analisis forense Pro Actualizado.pdf                                                                                                                        2025-01-13 11:22  5.0M
 Analisis forense Pro Actualizado.pdf                                                                                                                        2025-01-13 11:22  5.0M  
![[Fichero PDF]](/icons/pdf2.png) Análisis seguridad IOT.pdf                                                                                                                                 2025-01-13 11:22  809K
 Análisis seguridad IOT.pdf                                                                                                                                 2025-01-13 11:22  809K  
![[Fichero PDF]](/icons/pdf2.png) Android Hacker_s Handbook.pdf                                                                                                                               2025-01-13 11:22  9.0M
 Android Hacker_s Handbook.pdf                                                                                                                               2025-01-13 11:22  9.0M  
![[Fichero PDF]](/icons/pdf2.png) Anonymus manual.pdf                                                                                                                                         2025-01-13 11:22  210K
 Anonymus manual.pdf                                                                                                                                         2025-01-13 11:22  210K  
![[Fichero PDF]](/icons/pdf2.png) Arma Infalible - Ingeniería Social.pdf                                                                                                                     2025-01-13 11:22  160K
 Arma Infalible - Ingeniería Social.pdf                                                                                                                     2025-01-13 11:22  160K  
![[Fichero PDF]](/icons/pdf2.png) ARTOFEXPLOITATION.pdf                                                                                                                                       2025-01-13 11:22  4.8M
 ARTOFEXPLOITATION.pdf                                                                                                                                       2025-01-13 11:22  4.8M  
![[Fichero PDF]](/icons/pdf2.png) Ataque modelo I.pdf                                                                                                                                         2025-01-13 11:22  622K
 Ataque modelo I.pdf                                                                                                                                         2025-01-13 11:22  622K  
![[Fichero PDF]](/icons/pdf2.png) Ataques basados en DNS Spoofing.pdf                                                                                                                         2025-01-13 11:22  791K
 Ataques basados en DNS Spoofing.pdf                                                                                                                         2025-01-13 11:22  791K  
![[Fichero PDF]](/icons/pdf2.png) Ataquesaplicacionesweb.pdf                                                                                                                                  2025-01-13 11:22  2.3M
 Ataquesaplicacionesweb.pdf                                                                                                                                  2025-01-13 11:22  2.3M  
![[Fichero PDF]](/icons/pdf2.png) Attacking_Network_Protocols_A_Hacker___s_Guide_to_Capture__Analysis_UserUpload.Net.pdf                                                                      2025-01-13 11:22  7.1M
 Attacking_Network_Protocols_A_Hacker___s_Guide_to_Capture__Analysis_UserUpload.Net.pdf                                                                      2025-01-13 11:22  7.1M  
![[Fichero PDF]](/icons/pdf2.png) BackdoorKali.pdf                                                                                                                                            2025-01-13 11:22  2.8M
 BackdoorKali.pdf                                                                                                                                            2025-01-13 11:22  2.8M  
![[Fichero PDF]](/icons/pdf2.png) Backtrack 5 Claves WEP Gerix.pdf                                                                                                                            2025-01-13 11:22  1.4M
 Backtrack 5 Claves WEP Gerix.pdf                                                                                                                            2025-01-13 11:22  1.4M  
![[Fichero PDF]](/icons/pdf2.png) Backtrack 5 Metasploit penetration testing.pdf                                                                                                              2025-01-13 11:22  4.5M
 Backtrack 5 Metasploit penetration testing.pdf                                                                                                              2025-01-13 11:22  4.5M  
![[Fichero PDF]](/icons/pdf2.png) Backtrack 5 Wireless Penetration Testing_Castellano.pdf                                                                                                     2025-01-13 11:22   13M
 Backtrack 5 Wireless Penetration Testing_Castellano.pdf                                                                                                     2025-01-13 11:22   13M  
![[Fichero PDF]](/icons/pdf2.png) Backtrack(1).pdf                                                                                                                                            2025-01-13 11:22  3.8M
 Backtrack(1).pdf                                                                                                                                            2025-01-13 11:22  3.8M  
![[Fichero PDF]](/icons/pdf2.png) Backtracking(1).pdf                                                                                                                                         2025-01-13 11:22  511K
 Backtracking(1).pdf                                                                                                                                         2025-01-13 11:22  511K  
![[Fichero PDF]](/icons/pdf2.png) Basics-of-backtrac.pdf                                                                                                                                      2025-01-13 11:22  473K
 Basics-of-backtrac.pdf                                                                                                                                      2025-01-13 11:22  473K  
![[Fichero PDF]](/icons/pdf2.png) BEAdmin_en.pdf                                                                                                                                              2025-01-13 11:22   13M
 BEAdmin_en.pdf                                                                                                                                              2025-01-13 11:22   13M  
![[Fichero PDF]](/icons/pdf2.png) Building a HIPAA-Compliant Cybersecurity Program.pdf                                                                                                        2025-01-13 11:22  4.5M
 Building a HIPAA-Compliant Cybersecurity Program.pdf                                                                                                        2025-01-13 11:22  4.5M  
![[Fichero PDF]](/icons/pdf2.png) Burp Suite Essentials.pdf                                                                                                                                   2025-01-13 11:22  2.8M
 Burp Suite Essentials.pdf                                                                                                                                   2025-01-13 11:22  2.8M  
![[Fichero PDF]](/icons/pdf2.png) Carding desde 0.pdf                                                                                                                                         2025-01-13 11:22   74K
 Carding desde 0.pdf                                                                                                                                         2025-01-13 11:22   74K  
![[   ]](/icons/unknown.gif) CASP+ CompTIA Advanced Security Practitioner Study Guide CAS-003 3rd Edition.Pdf                                                                            2025-01-13 11:22   24M
 CASP+ CompTIA Advanced Security Practitioner Study Guide CAS-003 3rd Edition.Pdf                                                                            2025-01-13 11:22   24M  
![[Fichero PDF]](/icons/pdf2.png) CEH (v8)Practice Exam with Key.pdf                                                                                                                          2025-01-13 11:22   69K
 CEH (v8)Practice Exam with Key.pdf                                                                                                                          2025-01-13 11:22   69K  
![[Fichero PDF]](/icons/pdf2.png) CEH v9 - Certified Ethical Hacker Version 9 Study Guide - 3E (2016).pdf                                                                                     2025-01-13 11:22   31M
 CEH v9 - Certified Ethical Hacker Version 9 Study Guide - 3E (2016).pdf                                                                                     2025-01-13 11:22   31M  
![[Fichero PDF]](/icons/pdf2.png) CEH v9 Certified Ethical Hacker Version 9.pdf                                                                                                               2025-01-13 11:22   13M
 CEH v9 Certified Ethical Hacker Version 9.pdf                                                                                                               2025-01-13 11:22   13M  
![[Fichero PDF]](/icons/pdf2.png) CEH.v10.Certified.Ethical.Hacker.Study.Guide.pdf                                                                                                            2025-01-13 11:22   11M
 CEH.v10.Certified.Ethical.Hacker.Study.Guide.pdf                                                                                                            2025-01-13 11:22   11M  
![[Fichero PDF]](/icons/pdf2.png) CEHv8.pdf                                                                                                                                                   2025-01-13 11:22  8.5M
 CEHv8.pdf                                                                                                                                                   2025-01-13 11:22  8.5M  
![[Fichero PDF]](/icons/pdf2.png) Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition.pdf                                                                                     2025-01-13 11:22   34M
 Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition.pdf                                                                                     2025-01-13 11:22   34M  
![[Fichero PDF]](/icons/pdf2.png) CISA Certified Information Systems Auditor Study Guide, 4th Edition.pdf                                                                                     2025-01-13 11:22   23M
 CISA Certified Information Systems Auditor Study Guide, 4th Edition.pdf                                                                                     2025-01-13 11:22   23M  
![[Fichero PDF]](/icons/pdf2.png) cissp-all-in-one-exam-guide-seventh-edition.pdf                                                                                                             2025-01-13 11:23   61M
 cissp-all-in-one-exam-guide-seventh-edition.pdf                                                                                                             2025-01-13 11:23   61M  
![[Fichero PDF]](/icons/pdf2.png) Cloud Computing and Security.pdf                                                                                                                            2025-01-13 11:23   25M
 Cloud Computing and Security.pdf                                                                                                                            2025-01-13 11:23   25M  
![[Fichero PDF]](/icons/pdf2.png) CMD-v2.0.pdf                                                                                                                                                2025-01-13 11:23  4.9M
 CMD-v2.0.pdf                                                                                                                                                2025-01-13 11:23  4.9M  
![[Fichero PDF]](/icons/pdf2.png) Comandos Básicos de Termux-.pdf                                                                                                                            2025-01-13 11:23  526K
 Comandos Básicos de Termux-.pdf                                                                                                                            2025-01-13 11:23  526K  
![[Fichero PDF]](/icons/pdf2.png) Como jugar en termux-1-1-1.pdf                                                                                                                              2025-01-13 11:23   13K
 Como jugar en termux-1-1-1.pdf                                                                                                                              2025-01-13 11:23   13K  
![[   ]](/icons/unknown.gif) Como Liberarse de un Troyano.doc                                                                                                                            2025-01-13 11:23   56K
 Como Liberarse de un Troyano.doc                                                                                                                            2025-01-13 11:23   56K  
![[   ]](/icons/unknown.gif) Como sacar la IP en IRC.DOC                                                                                                                                 2025-01-13 11:23   11K
 Como sacar la IP en IRC.DOC                                                                                                                                 2025-01-13 11:23   11K  
![[Fichero PDF]](/icons/pdf2.png) Cómo usar Termux.pdf                                                                                                                                       2025-01-13 11:23  743K
 Cómo usar Termux.pdf                                                                                                                                       2025-01-13 11:23  743K  
![[Fichero PDF]](/icons/pdf2.png) Complete Guide to CISM Certification.pdf                                                                                                                    2025-01-13 11:23   17M
 Complete Guide to CISM Certification.pdf                                                                                                                    2025-01-13 11:23   17M  
![[Fichero PDF]](/icons/pdf2.png) Complete Guide to Shodan Collect. Analyze. Visualize. Make Internet Intelligence Work for You. - John Matherly.pdf                                          2025-01-13 11:23  4.3M
 Complete Guide to Shodan Collect. Analyze. Visualize. Make Internet Intelligence Work for You. - John Matherly.pdf                                          2025-01-13 11:23  4.3M  
![[Fichero PDF]](/icons/pdf2.png) Comptia A+ Complete Study Guide Exams Exams 220-901 and 220-902 ( PDFDrive.com ).pdf                                                                        2025-01-13 11:23   39M
 Comptia A+ Complete Study Guide Exams Exams 220-901 and 220-902 ( PDFDrive.com ).pdf                                                                        2025-01-13 11:23   39M  
![[Fichero PDF]](/icons/pdf2.png) comptianetworkplusstudyguide_examn10006_3rded.pdf                                                                                                           2025-01-13 11:23   22M
 comptianetworkplusstudyguide_examn10006_3rded.pdf                                                                                                           2025-01-13 11:23   22M  
![[   ]](/icons/unknown.gif) Computer Hacking - Matt Benton.azw3                                                                                                                         2025-01-13 11:23  1.1M
 Computer Hacking - Matt Benton.azw3                                                                                                                         2025-01-13 11:23  1.1M  
![[   ]](/icons/unknown.gif) Computer Hacking - Matt Benton.epub                                                                                                                         2025-01-13 11:23  1.0M
 Computer Hacking - Matt Benton.epub                                                                                                                         2025-01-13 11:23  1.0M  
![[   ]](/icons/unknown.gif) Computer Hacking - Matt Benton.mobi                                                                                                                         2025-01-13 11:23  1.4M
 Computer Hacking - Matt Benton.mobi                                                                                                                         2025-01-13 11:23  1.4M  
![[Fichero PDF]](/icons/pdf2.png) Computer Hacking - Matt Benton.pdf                                                                                                                          2025-01-13 11:23  1.3M
 Computer Hacking - Matt Benton.pdf                                                                                                                          2025-01-13 11:23  1.3M  
![[Fichero PDF]](/icons/pdf2.png) Crackear WPA-WPA2-PSK.pdf                                                                                                                                   2025-01-13 11:23  519K
 Crackear WPA-WPA2-PSK.pdf                                                                                                                                   2025-01-13 11:23  519K  
![[Fichero PDF]](/icons/pdf2.png) Cracking sin secretos.pdf                                                                                                                                   2025-01-13 11:23   60M
 Cracking sin secretos.pdf                                                                                                                                   2025-01-13 11:23   60M  
![[   ]](/icons/pdf2.png) CRACKING.PDF                                                                                                                                                2025-01-13 11:23   74K
 CRACKING.PDF                                                                                                                                                2025-01-13 11:23   74K  
![[Fichero PDF]](/icons/pdf2.png) Cracking.Wifi.al.Completo.-.David.Puente.Castro.pdf                                                                                                         2025-01-13 11:23  907K
 Cracking.Wifi.al.Completo.-.David.Puente.Castro.pdf                                                                                                         2025-01-13 11:23  907K  
![[Fichero PDF]](/icons/pdf2.png) Cracking_Passwords_Guide.pdf                                                                                                                                2025-01-13 11:23  272K
 Cracking_Passwords_Guide.pdf                                                                                                                                2025-01-13 11:23  272K  
![[Fichero PDF]](/icons/pdf2.png) crackupc.pdf                                                                                                                                                2025-01-13 11:23   43K
 crackupc.pdf                                                                                                                                                2025-01-13 11:23   43K  
![[   ]](/icons/unknown.gif) Creando un Troyano de conexion inversa.doc                                                                                                                  2025-01-13 11:23  126K
 Creando un Troyano de conexion inversa.doc                                                                                                                  2025-01-13 11:23  126K  
![[Fichero PDF]](/icons/pdf2.png) Criptosistemas Informaticos.pdf                                                                                                                             2025-01-13 11:23  382K
 Criptosistemas Informaticos.pdf                                                                                                                             2025-01-13 11:23  382K  
![[Fichero PDF]](/icons/pdf2.png) Crypto101.pdf                                                                                                                                               2025-01-13 11:23   15M
 Crypto101.pdf                                                                                                                                               2025-01-13 11:23   15M  
![[Fichero PDF]](/icons/pdf2.png) Cryptography and Network Security, 6th Edition.pdf                                                                                                          2025-01-13 11:23   12M
 Cryptography and Network Security, 6th Edition.pdf                                                                                                          2025-01-13 11:23   12M  
![[Fichero PDF]](/icons/pdf2.png) Cryptography_and_Network_Security_FOURTH.pdf                                                                                                                2025-01-13 11:23   14M
 Cryptography_and_Network_Security_FOURTH.pdf                                                                                                                2025-01-13 11:23   14M  
![[   ]](/icons/unknown.gif) Curso Metasploit en Espa├▒ol.doc                                                                                                                        2025-01-13 11:23  3.6M
 Curso Metasploit en Espa├▒ol.doc                                                                                                                        2025-01-13 11:23  3.6M  
![[Fichero PDF]](/icons/pdf2.png) Curso Seguridad Informatica.pdf                                                                                                                             2025-01-13 11:23  497K
 Curso Seguridad Informatica.pdf                                                                                                                             2025-01-13 11:23  497K  
![[Fichero PDF]](/icons/pdf2.png) Curso_de_programación_de_virus.pdf                                                                                                                         2025-01-13 11:23  1.9M
 Curso_de_programación_de_virus.pdf                                                                                                                         2025-01-13 11:23  1.9M  
![[Fichero PDF]](/icons/pdf2.png) Curso-Batch-desde-0.pdf                                                                                                                                     2025-01-13 11:23  616K
 Curso-Batch-desde-0.pdf                                                                                                                                     2025-01-13 11:23  616K  
![[Fichero PDF]](/icons/pdf2.png) CursoDeHackersParaPrincipiantes_Tahum_2001.pdf                                                                                                              2025-01-13 11:23  1.1M
 CursoDeHackersParaPrincipiantes_Tahum_2001.pdf                                                                                                              2025-01-13 11:23  1.1M  
![[   ]](/icons/unknown.gif) CursoHackers1.doc                                                                                                                                           2025-01-13 11:23  419K
 CursoHackers1.doc                                                                                                                                           2025-01-13 11:23  419K  
![[Fichero PDF]](/icons/pdf2.png) Dangerours Google Hacking Database and Attacks.pdf                                                                                                          2025-01-13 11:23  2.1M
 Dangerours Google Hacking Database and Attacks.pdf                                                                                                          2025-01-13 11:23  2.1M  
![[   ]](/icons/unknown.gif) DebianServer-DVWA-ModSec.ova                                                                                                                                2025-01-13 11:26  742M
 DebianServer-DVWA-ModSec.ova                                                                                                                                2025-01-13 11:26  742M  
![[Fichero PDF]](/icons/pdf2.png) DECT Sniffing Dedected - BackTrack Linux(1).pdf                                                                                                             2025-01-13 11:26  1.9M
 DECT Sniffing Dedected - BackTrack Linux(1).pdf                                                                                                             2025-01-13 11:26  1.9M  
![[Fichero PDF]](/icons/pdf2.png) DefinitiveGuidetoContinuousNetworkMonitoring-1.pdf                                                                                                          2025-01-13 11:26  6.1M
 DefinitiveGuidetoContinuousNetworkMonitoring-1.pdf                                                                                                          2025-01-13 11:26  6.1M  
![[Fichero PDF]](/icons/pdf2.png) descarga.pdf                                                                                                                                                2025-01-13 11:26   98K
 descarga.pdf                                                                                                                                                2025-01-13 11:26   98K  
![[Fichero PDF]](/icons/pdf2.png) dlscrib.com_mastering-modern-web-penetration-testing.pdf                                                                                                    2025-01-13 11:26   15M
 dlscrib.com_mastering-modern-web-penetration-testing.pdf                                                                                                    2025-01-13 11:26   15M  
![[Fichero PDF]](/icons/pdf2.png) dossier.pdf                                                                                                                                                 2025-01-13 11:26  2.3M
 dossier.pdf                                                                                                                                                 2025-01-13 11:26  2.3M  
![[Fichero PDF]](/icons/pdf2.png) EC-CiberseguridadCiberdefensa-plan-de-estudios.pdf                                                                                                          2025-01-13 11:26  711K
 EC-CiberseguridadCiberdefensa-plan-de-estudios.pdf                                                                                                          2025-01-13 11:26  711K  
![[Fichero PDF]](/icons/pdf2.png) El libro blanco del hacker - Pablo Gutiérrez Salazar.pdf                                                                                                   2025-01-13 11:27  163M
 El libro blanco del hacker - Pablo Gutiérrez Salazar.pdf                                                                                                   2025-01-13 11:27  163M  
![[Fichero PDF]](/icons/pdf2.png) El Sendero del Hacker.pdf                                                                                                                                   2025-01-13 11:27  2.2M
 El Sendero del Hacker.pdf                                                                                                                                   2025-01-13 11:27  2.2M  
![[Fichero PDF]](/icons/pdf2.png) El_servidor_Web.pdf                                                                                                                                         2025-01-13 11:27   82K
 El_servidor_Web.pdf                                                                                                                                         2025-01-13 11:27   82K  
![[Fichero PDF]](/icons/pdf2.png) EN-Hacking_The_Art_of_Exploitation 1.pdf                                                                                                                    2025-01-13 11:27  2.3M
 EN-Hacking_The_Art_of_Exploitation 1.pdf                                                                                                                    2025-01-13 11:27  2.3M  
![[Fichero PDF]](/icons/pdf2.png) Escaneo.pdf                                                                                                                                                 2025-01-13 11:27  673K
 Escaneo.pdf                                                                                                                                                 2025-01-13 11:27  673K  
![[   ]](/icons/pdf2.png) Ethical Hacking 2.0.PDF                                                                                                                                     2025-01-13 11:27  106M
 Ethical Hacking 2.0.PDF                                                                                                                                     2025-01-13 11:27  106M  
![[Fichero PDF]](/icons/pdf2.png) Ethical Hacking and Penetration Testing Guide.pdf                                                                                                           2025-01-13 11:27   22M
 Ethical Hacking and Penetration Testing Guide.pdf                                                                                                           2025-01-13 11:27   22M  
![[   ]](/icons/unknown.gif) Ethical hacking_ Basic Hacking - Russell P.epub                                                                                                             2025-01-13 11:27  223K
 Ethical hacking_ Basic Hacking - Russell P.epub                                                                                                             2025-01-13 11:27  223K  
![[Fichero PDF]](/icons/pdf2.png) Ethical-Hacking.pdf                                                                                                                                         2025-01-13 11:27  692K
 Ethical-Hacking.pdf                                                                                                                                         2025-01-13 11:27  692K  
![[Fichero PDF]](/icons/pdf2.png) Eugenia Bahit_DebianHackers-Elementals.pdf                                                                                                                  2025-01-13 11:27  1.5M
 Eugenia Bahit_DebianHackers-Elementals.pdf                                                                                                                  2025-01-13 11:27  1.5M  
![[Fichero PDF]](/icons/pdf2.png) Explotación con Metasploit.pdf                                                                                                                             2025-01-13 11:27  1.1M
 Explotación con Metasploit.pdf                                                                                                                             2025-01-13 11:27  1.1M  
![[Fichero PDF]](/icons/pdf2.png) Generando script malicioso con Metasploit.pdf                                                                                                               2025-01-13 11:27  1.5M
 Generando script malicioso con Metasploit.pdf                                                                                                               2025-01-13 11:27  1.5M  
![[Fichero PDF]](/icons/pdf2.png) goodspeed_recon10.pdf                                                                                                                                       2025-01-13 11:28   38M
 goodspeed_recon10.pdf                                                                                                                                       2025-01-13 11:28   38M  
![[Fichero PDF]](/icons/pdf2.png) Google-Hacking-para-Pentesters-1.pdf                                                                                                                        2025-01-13 11:28  1.0M
 Google-Hacking-para-Pentesters-1.pdf                                                                                                                        2025-01-13 11:28  1.0M  
![[Fichero PDF]](/icons/pdf2.png) Gray_Hat_Hacking_4th_Edition.pdf                                                                                                                            2025-01-13 11:28   17M
 Gray_Hat_Hacking_4th_Edition.pdf                                                                                                                            2025-01-13 11:28   17M  
![[TXT]](/icons/text.gif) Gu├нa ligera del Hacker.txt                                                                                                                              2025-01-13 11:28  3.5K
 Gu├нa ligera del Hacker.txt                                                                                                                              2025-01-13 11:28  3.5K  
![[Fichero PDF]](/icons/pdf2.png) gray-hat-hacking (1).pdf                                                                                                                                    2025-01-13 11:28   12M
 gray-hat-hacking (1).pdf                                                                                                                                    2025-01-13 11:28   12M  
![[Fichero PDF]](/icons/pdf2.png) Guia de iniciacion al hacking.pdf                                                                                                                           2025-01-13 11:28   54K
 Guia de iniciacion al hacking.pdf                                                                                                                           2025-01-13 11:28   54K  
![[   ]](/icons/unknown.gif) Guia para crackear Websites.doc                                                                                                                             2025-01-13 11:28   47K
 Guia para crackear Websites.doc                                                                                                                             2025-01-13 11:28   47K  
![[Fichero PDF]](/icons/pdf2.png) Guia_apoyo_SGSI.pdf                                                                                                                                         2025-01-13 11:28  349K
 Guia_apoyo_SGSI.pdf                                                                                                                                         2025-01-13 11:28  349K  
![[Fichero PDF]](/icons/pdf2.png) Hack_x_Crack_batch2.pdf                                                                                                                                     2025-01-13 11:28  2.5M
 Hack_x_Crack_batch2.pdf                                                                                                                                     2025-01-13 11:28  2.5M  
![[Fichero PDF]](/icons/pdf2.png) Hack_x_Crack_Hacking_Buscadores.pdf                                                                                                                         2025-01-13 11:28  709K
 Hack_x_Crack_Hacking_Buscadores.pdf                                                                                                                         2025-01-13 11:28  709K  
![[Fichero PDF]](/icons/pdf2.png) Hack_X_Crack_Malware_parte1.pdf                                                                                                                             2025-01-13 11:28  2.5M
 Hack_X_Crack_Malware_parte1.pdf                                                                                                                             2025-01-13 11:28  2.5M  
![[Fichero PDF]](/icons/pdf2.png) Hack_x_Crack_SQLinjection.pdf                                                                                                                               2025-01-13 11:28  1.1M
 Hack_x_Crack_SQLinjection.pdf                                                                                                                               2025-01-13 11:28  1.1M  
![[Fichero PDF]](/icons/pdf2.png) HACKEAR PATRON ANDROID.pdf                                                                                                                                  2025-01-13 11:28  390K
 HACKEAR PATRON ANDROID.pdf                                                                                                                                  2025-01-13 11:28  390K  
![[Fichero PDF]](/icons/pdf2.png) Hackers.bat_ Virus Mortales Pa - Alejandro Ruiz Reyes.pdf                                                                                                   2025-01-13 11:28  2.6M
 Hackers.bat_ Virus Mortales Pa - Alejandro Ruiz Reyes.pdf                                                                                                   2025-01-13 11:28  2.6M  
![[Fichero PDF]](/icons/pdf2.png) HackerSeunodeellos.pdf                                                                                                                                      2025-01-13 11:28  1.5M
 HackerSeunodeellos.pdf                                                                                                                                      2025-01-13 11:28  1.5M  
![[Fichero PDF]](/icons/pdf2.png) HACKIN ETICO_VS_DEFENSA_PROFUNDIDAD_JUANBERRIO.pdf                                                                                                          2025-01-13 11:28  2.6M
 HACKIN ETICO_VS_DEFENSA_PROFUNDIDAD_JUANBERRIO.pdf                                                                                                          2025-01-13 11:28  2.6M  
![[Fichero PDF]](/icons/pdf2.png) hacking & cracking.pdf                                                                                                                                      2025-01-13 11:28   41M
 hacking & cracking.pdf                                                                                                                                      2025-01-13 11:28   41M  
![[Fichero PDF]](/icons/pdf2.png) Hacking Etico - Carlos Tori(1).pdf                                                                                                                          2025-01-13 11:28   59M
 Hacking Etico - Carlos Tori(1).pdf                                                                                                                          2025-01-13 11:28   59M  
![[Fichero PDF]](/icons/pdf2.png) Hacking Etico - Carlos Tori.pdf                                                                                                                             2025-01-13 11:28   59M
 Hacking Etico - Carlos Tori.pdf                                                                                                                             2025-01-13 11:28   59M  
![[Fichero PDF]](/icons/pdf2.png) Hacking Etico.pdf                                                                                                                                           2025-01-13 11:28   24M
 Hacking Etico.pdf                                                                                                                                           2025-01-13 11:28   24M  
![[Fichero PDF]](/icons/pdf2.png) Hacking for Beginners The Ultimate Guide For Newbie Hackers.pdf                                                                                             2025-01-13 11:28  318K
 Hacking for Beginners The Ultimate Guide For Newbie Hackers.pdf                                                                                             2025-01-13 11:28  318K  
![[Fichero PDF]](/icons/pdf2.png) Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf                                                                                              2025-01-13 11:29  4.0M
 Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf                                                                                              2025-01-13 11:29  4.0M  
![[Fichero PDF]](/icons/pdf2.png) Hacking the Hacker.pdf                                                                                                                                      2025-01-13 11:29  1.8M
 Hacking the Hacker.pdf                                                                                                                                      2025-01-13 11:29  1.8M  
![[Fichero PDF]](/icons/pdf2.png) Hacking_An_unofficial_anonymous_guide.pdf                                                                                                                   2025-01-13 11:29  4.0M
 Hacking_An_unofficial_anonymous_guide.pdf                                                                                                                   2025-01-13 11:29  4.0M  
![[Fichero PDF]](/icons/pdf2.png) hacking_avanzado.pdf                                                                                                                                        2025-01-13 11:29  1.7M
 hacking_avanzado.pdf                                                                                                                                        2025-01-13 11:29  1.7M  
![[Fichero PDF]](/icons/pdf2.png) Hacking_Gmail.pdf                                                                                                                                           2025-01-13 11:29  4.1M
 Hacking_Gmail.pdf                                                                                                                                           2025-01-13 11:29  4.1M  
![[Fichero PDF]](/icons/pdf2.png) HACKING_WIRELESS_101_Cómo_hackear_redes_inalámbricas_fácilmente!aINFAMY.pdf                                                                              2025-01-13 11:29   15M
 HACKING_WIRELESS_101_Cómo_hackear_redes_inalámbricas_fácilmente!aINFAMY.pdf                                                                              2025-01-13 11:29   15M  
![[Fichero PDF]](/icons/pdf2.png) HackingMéxico - Libro Certificacion de Seguridad Ofensiva nivel 1.pdf                                                                                      2025-01-13 11:29   26M
 HackingMéxico - Libro Certificacion de Seguridad Ofensiva nivel 1.pdf                                                                                      2025-01-13 11:29   26M  
![[Fichero PDF]](/icons/pdf2.png) Hacking-Windows-Ataques-a-Sistemas-y-Redes-Microsoft - 0xWord.pdf                                                                                           2025-01-13 11:29   35M
 Hacking-Windows-Ataques-a-Sistemas-y-Redes-Microsoft - 0xWord.pdf                                                                                           2025-01-13 11:29   35M  
![[Fichero PDF]](/icons/pdf2.png) Hack-x-Crack-Cuaderno-Arduino-ElSaber21.pdf                                                                                                                 2025-01-13 11:29  823K
 Hack-x-Crack-Cuaderno-Arduino-ElSaber21.pdf                                                                                                                 2025-01-13 11:29  823K  
![[Fichero PDF]](/icons/pdf2.png) Hack-x-Crack-Introducion-a-los-punteros-en-C-ElSaber21-1.pdf                                                                                                2025-01-13 11:29  1.1M
 Hack-x-Crack-Introducion-a-los-punteros-en-C-ElSaber21-1.pdf                                                                                                2025-01-13 11:29  1.1M  
![[Fichero PDF]](/icons/pdf2.png) HakingCero.pdf                                                                                                                                              2025-01-13 11:29   13M
 HakingCero.pdf                                                                                                                                              2025-01-13 11:29   13M  
![[Fichero PDF]](/icons/pdf2.png) Herramientas-anti-malware-y-anti-rootkit.pdf                                                                                                                2025-01-13 11:29  433K
 Herramientas-anti-malware-y-anti-rootkit.pdf                                                                                                                2025-01-13 11:29  433K  
![[Fichero PDF]](/icons/pdf2.png) HONEYPOTS, MONITORIZANDO A LOS ATACANTES.pdf                                                                                                                2025-01-13 11:29  1.4M
 HONEYPOTS, MONITORIZANDO A LOS ATACANTES.pdf                                                                                                                2025-01-13 11:29  1.4M  
![[Fichero PDF]](/icons/pdf2.png) Information Security, 2nd Edition.pdf                                                                                                                       2025-01-13 11:29   27M
 Information Security, 2nd Edition.pdf                                                                                                                       2025-01-13 11:29   27M  
![[Fichero PDF]](/icons/pdf2.png) Ingenieria_social.pdf                                                                                                                                       2025-01-13 11:29  704K
 Ingenieria_social.pdf                                                                                                                                       2025-01-13 11:29  704K  
![[Fichero PDF]](/icons/pdf2.png) Instalacion metasploit Post Exploitation Using MeterpreterApple TV.pdf                                                                                      2025-01-13 11:29  2.0M
 Instalacion metasploit Post Exploitation Using MeterpreterApple TV.pdf                                                                                      2025-01-13 11:29  2.0M  
![[Fichero PDF]](/icons/pdf2.png) Internet, hackers y software libre (Carlos Gradin).pdf                                                                                                      2025-01-13 11:29  843K
 Internet, hackers y software libre (Carlos Gradin).pdf                                                                                                      2025-01-13 11:29  843K  
![[Fichero PDF]](/icons/pdf2.png) Introducción a la informática forense en entornos Windows.pdf                                                                                             2025-01-13 11:29  601K
 Introducción a la informática forense en entornos Windows.pdf                                                                                             2025-01-13 11:29  601K  
![[Fichero PDF]](/icons/pdf2.png) iOS Application Security.pdf                                                                                                                                2025-01-13 11:29   16M
 iOS Application Security.pdf                                                                                                                                2025-01-13 11:29   16M  
![[   ]](/icons/unknown.gif) IP.DOC                                                                                                                                                      2025-01-13 11:29   54K
 IP.DOC                                                                                                                                                      2025-01-13 11:29   54K  
![[Fichero PDF]](/icons/pdf2.png) -James-Smith--Tor-and-The-Dark-Net_-Remain-Anonymo(z-lib.org).pdf                                                                                           2025-01-13 11:29  682K
 -James-Smith--Tor-and-The-Dark-Net_-Remain-Anonymo(z-lib.org).pdf                                                                                           2025-01-13 11:29  682K  
![[Fichero PDF]](/icons/pdf2.png) -Jeff-Simon--Hacking--Hacking-Practical-Guide-for-(z-lib.org).pdf                                                                                           2025-01-13 11:29   11M
 -Jeff-Simon--Hacking--Hacking-Practical-Guide-for-(z-lib.org).pdf                                                                                           2025-01-13 11:29   11M  
![[Fichero PDF]](/icons/pdf2.png) Julian Assange et al. - Los archivos Wikileaks _ El mundo según el imperio estadounidense (2015) - libgen.lc.pdf                                           2025-01-13 11:29  1.8M
 Julian Assange et al. - Los archivos Wikileaks _ El mundo según el imperio estadounidense (2015) - libgen.lc.pdf                                           2025-01-13 11:29  1.8M  
![[Fichero PDF]](/icons/pdf2.png) Kali Linux ir a la carpeta. Go to folder kali linux.pdf                                                                                                     2025-01-13 11:29   21K
 Kali Linux ir a la carpeta. Go to folder kali linux.pdf                                                                                                     2025-01-13 11:29   21K  
![[Fichero PDF]](/icons/pdf2.png) Kevin D Mitnick_ William L Simon - El arte de la intrusión_ cómo ser un hacker o evitarlos (2008, Alfaomega_ Ra - Ma) - libgen.lc.pdf                     2025-01-13 11:29  2.8M
 Kevin D Mitnick_ William L Simon - El arte de la intrusión_ cómo ser un hacker o evitarlos (2008, Alfaomega_ Ra - Ma) - libgen.lc.pdf                     2025-01-13 11:29  2.8M  
![[Fichero PDF]](/icons/pdf2.png) kupdf.net_ethical-hacking-20.pdf                                                                                                                            2025-01-13 11:29   32M
 kupdf.net_ethical-hacking-20.pdf                                                                                                                            2025-01-13 11:29   32M  
![[Fichero PDF]](/icons/pdf2.png) la biblia del hacker.pdf                                                                                                                                    2025-01-13 11:29  3.8M
 la biblia del hacker.pdf                                                                                                                                    2025-01-13 11:29  3.8M  
![[Fichero PDF]](/icons/pdf2.png) Learning Metasploit Exploitation and Development.pdf                                                                                                        2025-01-13 11:29  9.1M
 Learning Metasploit Exploitation and Development.pdf                                                                                                        2025-01-13 11:29  9.1M  
![[Fichero PDF]](/icons/pdf2.png) libro sobre Hackers.pdf                                                                                                                                     2025-01-13 11:29  1.0M
 libro sobre Hackers.pdf                                                                                                                                     2025-01-13 11:29  1.0M  
![[Fichero PDF]](/icons/pdf2.png) Linux.Maxima.Seguridad.-.Edicion.Especial.pdf                                                                                                               2025-01-13 11:29   36M
 Linux.Maxima.Seguridad.-.Edicion.Especial.pdf                                                                                                               2025-01-13 11:29   36M  
![[Fichero PDF]](/icons/pdf2.png) lpbro 1.pdf                                                                                                                                                 2025-01-13 11:29  330K
 lpbro 1.pdf                                                                                                                                                 2025-01-13 11:29  330K  
![[Fichero PDF]](/icons/pdf2.png) Malware Analyst_s Cookbook.pdf                                                                                                                              2025-01-13 11:29  8.9M
 Malware Analyst_s Cookbook.pdf                                                                                                                              2025-01-13 11:29  8.9M  
![[Fichero PDF]](/icons/pdf2.png) Manual Basico Metasploit].pdf                                                                                                                               2025-01-13 11:29   96K
 Manual Basico Metasploit].pdf                                                                                                                               2025-01-13 11:29   96K  
![[Fichero PDF]](/icons/pdf2.png) Manual de Acunetix Web Vulnerability Scanner 10.0.pdf                                                                                                       2025-01-13 11:29  3.9M
 Manual de Acunetix Web Vulnerability Scanner 10.0.pdf                                                                                                       2025-01-13 11:29  3.9M  
![[Fichero PDF]](/icons/pdf2.png) Manual de informatica forense I - Maria Elena Darahuge.pdf                                                                                                  2025-01-13 11:30  6.1M
 Manual de informatica forense I - Maria Elena Darahuge.pdf                                                                                                  2025-01-13 11:30  6.1M  
![[Fichero PDF]](/icons/pdf2.png) Manual de Metasploit Unleashed de offensive-security offcial.pdf                                                                                            2025-01-13 11:30   15M
 Manual de Metasploit Unleashed de offensive-security offcial.pdf                                                                                            2025-01-13 11:30   15M  
![[Fichero PDF]](/icons/pdf2.png) Manual_de_informatica_forense_I.pdf                                                                                                                         2025-01-13 11:30  5.5M
 Manual_de_informatica_forense_I.pdf                                                                                                                         2025-01-13 11:30  5.5M  
![[TXT]](/icons/text.gif) MANUAL-BlackOfficev1.2.TXT                                                                                                                                  2025-01-13 11:30   27K
 MANUAL-BlackOfficev1.2.TXT                                                                                                                                  2025-01-13 11:30   27K  
![[   ]](/icons/unknown.gif) Medidas de Seguridad.doc                                                                                                                                    2025-01-13 11:30   37K
 Medidas de Seguridad.doc                                                                                                                                    2025-01-13 11:30   37K  
![[Fichero PDF]](/icons/pdf2.png) Metasploit Arquitectura - Metasploit Desatado.pdf                                                                                                           2025-01-13 11:30  188K
 Metasploit Arquitectura - Metasploit Desatado.pdf                                                                                                           2025-01-13 11:30  188K  
![[Fichero PDF]](/icons/pdf2.png) Metasploit Framework - Introduccion - Offensive Security.pdf                                                                                                2025-01-13 11:30  181K
 Metasploit Framework - Introduccion - Offensive Security.pdf                                                                                                2025-01-13 11:30  181K  
![[Fichero PDF]](/icons/pdf2.png) Metasploit Frameworks.pdf                                                                                                                                   2025-01-13 11:30  2.5M
 Metasploit Frameworks.pdf                                                                                                                                   2025-01-13 11:30  2.5M  
![[Fichero PDF]](/icons/pdf2.png) Metasploit Unleashed (Español).pdf                                                                                                                         2025-01-13 11:30  2.3M
 Metasploit Unleashed (Español).pdf                                                                                                                         2025-01-13 11:30  2.3M  
![[Fichero PDF]](/icons/pdf2.png) Metasploitable_07_2010_ES.pdf                                                                                                                               2025-01-13 11:30  6.1M
 Metasploitable_07_2010_ES.pdf                                                                                                                               2025-01-13 11:30  6.1M  
![[Fichero PDF]](/icons/pdf2.png) Metasploit-y-Pentesting.pdf                                                                                                                                 2025-01-13 11:30  1.0M
 Metasploit-y-Pentesting.pdf                                                                                                                                 2025-01-13 11:30  1.0M  
![[Fichero PDF]](/icons/pdf2.png) Metodo Carding Derinitivo.pdf                                                                                                                               2025-01-13 11:30   75K
 Metodo Carding Derinitivo.pdf                                                                                                                               2025-01-13 11:30   75K  
![[Fichero PDF]](/icons/pdf2.png) metodología-analisis-forense.pdf                                                                                                                           2025-01-13 11:30  1.7M
 metodología-analisis-forense.pdf                                                                                                                           2025-01-13 11:30  1.7M  
![[   ]](/icons/unknown.gif) MGH.CEH.Certified.Ethical.Hacker.All-in-One.Exam.Guide.3rd.Edition.125983655X.epub                                                                          2025-01-13 11:30   11M
 MGH.CEH.Certified.Ethical.Hacker.All-in-One.Exam.Guide.3rd.Edition.125983655X.epub                                                                          2025-01-13 11:30   11M  
![[Fichero PDF]](/icons/pdf2.png) MGH_CEH_Certified_Ethical_Hacker_All-in-One_Exam_G.pdf                                                                                                      2025-01-13 11:30   10M
 MGH_CEH_Certified_Ethical_Hacker_All-in-One_Exam_G.pdf                                                                                                      2025-01-13 11:30   10M  
![[Fichero PDF]](/icons/pdf2.png) Modulo_0.pdf                                                                                                                                                2025-01-13 11:30  903K
 Modulo_0.pdf                                                                                                                                                2025-01-13 11:30  903K  
![[TXT]](/icons/text.gif) navegacion anonima utilizando servidores proxies.txt                                                                                                        2025-01-13 11:30  8.9K
 navegacion anonima utilizando servidores proxies.txt                                                                                                        2025-01-13 11:30  8.9K  
![[Fichero PDF]](/icons/pdf2.png) Network Forensics. Just a FUCKING free sample of the complete book.pdf                                                                                      2025-01-13 11:30  1.5M
 Network Forensics. Just a FUCKING free sample of the complete book.pdf                                                                                      2025-01-13 11:30  1.5M  
![[Fichero PDF]](/icons/pdf2.png) Nicklabs тАУ Curso de seguridad y hacking тАУ Parte 2 тАУ Instalar Backtrack en un pendrive.pdf                                                    2025-01-13 11:30  581K
 Nicklabs тАУ Curso de seguridad y hacking тАУ Parte 2 тАУ Instalar Backtrack en un pendrive.pdf                                                    2025-01-13 11:30  581K  
![[   ]](/icons/unknown.gif) NMAP Command Guide Sheet.docx                                                                                                                               2025-01-13 11:30  512K
 NMAP Command Guide Sheet.docx                                                                                                                               2025-01-13 11:30  512K  
![[Fichero PDF]](/icons/pdf2.png) NMAP Command Guide Sheet.pdf                                                                                                                                2025-01-13 11:30  355K
 NMAP Command Guide Sheet.pdf                                                                                                                                2025-01-13 11:30  355K  
![[Fichero PDF]](/icons/pdf2.png) nmap cookbook - the fat free guide.pdf                                                                                                                      2025-01-13 11:30  6.3M
 nmap cookbook - the fat free guide.pdf                                                                                                                      2025-01-13 11:30  6.3M  
![[Fichero PDF]](/icons/pdf2.png) O_Reilly Big Book of Windows Hacks.pdf                                                                                                                      2025-01-13 11:30   74M
 O_Reilly Big Book of Windows Hacks.pdf                                                                                                                      2025-01-13 11:30   74M  
![[Fichero PDF]](/icons/pdf2.png) Offensive.Security.PWB.v3.0.pdf                                                                                                                             2025-01-13 11:30  9.3M
 Offensive.Security.PWB.v3.0.pdf                                                                                                                             2025-01-13 11:30  9.3M  
![[Fichero PDF]](/icons/pdf2.png) Offensive.Security.PWB.v3.2.pdf                                                                                                                             2025-01-13 11:30   10M
 Offensive.Security.PWB.v3.2.pdf                                                                                                                             2025-01-13 11:30   10M  
![[Fichero PDF]](/icons/pdf2.png) offensive-security - Metasploit Unleashed.pdf                                                                                                               2025-01-13 11:30  4.6M
 offensive-security - Metasploit Unleashed.pdf                                                                                                               2025-01-13 11:30  4.6M  
![[Fichero PDF]](/icons/pdf2.png) Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second Edition.pdf                                                                                            2025-01-13 11:30  6.3M
 Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second Edition.pdf                                                                                            2025-01-13 11:30  6.3M  
![[Fichero PDF]](/icons/pdf2.png) Official (ISC)2 Guide to the CSSLP CBK, Second Edition.pdf                                                                                                  2025-01-13 11:30   17M
 Official (ISC)2 Guide to the CSSLP CBK, Second Edition.pdf                                                                                                  2025-01-13 11:30   17M  
![[Fichero PDF]](/icons/pdf2.png) OSSTMM.3.pdf                                                                                                                                                2025-01-13 11:30   16M
 OSSTMM.3.pdf                                                                                                                                                2025-01-13 11:30   16M  
![[Fichero PDF]](/icons/pdf2.png) OWASP_Backend_Security_Project_1.0beta.pdf                                                                                                                  2025-01-13 11:30  1.1M
 OWASP_Backend_Security_Project_1.0beta.pdf                                                                                                                  2025-01-13 11:30  1.1M  
![[Fichero PDF]](/icons/pdf2.png) OWASP_Code_Review_Guide-V1_1.pdf                                                                                                                            2025-01-13 11:30  1.5M
 OWASP_Code_Review_Guide-V1_1.pdf                                                                                                                            2025-01-13 11:30  1.5M  
![[Fichero PDF]](/icons/pdf2.png) Patrick Engebretson The Basics of Hacking and Penetration Testing, Second Edition (2013).pdf                                                                2025-01-13 11:30  4.5M
 Patrick Engebretson The Basics of Hacking and Penetration Testing, Second Edition (2013).pdf                                                                2025-01-13 11:30  4.5M  
![[Fichero PDF]](/icons/pdf2.png) Penetration Testing - A hands-on introduction to Hacking.pdf                                                                                                2025-01-13 11:30   12M
 Penetration Testing - A hands-on introduction to Hacking.pdf                                                                                                2025-01-13 11:30   12M  
![[Fichero PDF]](/icons/pdf2.png) Penetration Testing with BackTrack.pdf                                                                                                                      2025-01-13 11:30  6.3M
 Penetration Testing with BackTrack.pdf                                                                                                                      2025-01-13 11:30  6.3M  
![[Fichero PDF]](/icons/pdf2.png) Practical Reverse Engineering.pdf                                                                                                                           2025-01-13 11:30  5.2M
 Practical Reverse Engineering.pdf                                                                                                                           2025-01-13 11:30  5.2M  
![[TXT]](/icons/text.gif) PWLCRACK.TXT                                                                                                                                                2025-01-13 11:30  242
 PWLCRACK.TXT                                                                                                                                                2025-01-13 11:30  242   
![[Fichero PDF]](/icons/pdf2.png) Primer curso de cracking de Ricardo Narvaja completo.pdf                                                                                                    2025-01-13 11:30  3.2M
 Primer curso de cracking de Ricardo Narvaja completo.pdf                                                                                                    2025-01-13 11:30  3.2M  
![[Fichero PDF]](/icons/pdf2.png) Redes De Anonimato Estudio.pdf                                                                                                                              2025-01-13 11:31  750K
 Redes De Anonimato Estudio.pdf                                                                                                                              2025-01-13 11:31  750K  
![[Fichero PDF]](/icons/pdf2.png) Reverse Engineering.pdf                                                                                                                                     2025-01-13 11:31  8.6M
 Reverse Engineering.pdf                                                                                                                                     2025-01-13 11:31  8.6M  
![[Fichero PDF]](/icons/pdf2.png) ReverseEngineeringForBeginners.en.pdf                                                                                                                       2025-01-13 11:31  8.4M
 ReverseEngineeringForBeginners.en.pdf                                                                                                                       2025-01-13 11:31  8.4M  
![[Fichero PDF]](/icons/pdf2.png) Robar WiFi.pdf                                                                                                                                              2025-01-13 11:31  2.3M
 Robar WiFi.pdf                                                                                                                                              2025-01-13 11:31  2.3M  
![[Fichero PDF]](/icons/pdf2.png) scuervoTFM0617presentación.pdf                                                                                                                             2025-01-13 11:31  402K
 scuervoTFM0617presentación.pdf                                                                                                                             2025-01-13 11:31  402K  
![[Fichero PDF]](/icons/pdf2.png) Seguridad en Redes IP.pdf                                                                                                                                   2025-01-13 11:31  3.0M
 Seguridad en Redes IP.pdf                                                                                                                                   2025-01-13 11:31  3.0M  
![[Fichero PDF]](/icons/pdf2.png) Seguridad Informatica.pdf                                                                                                                                   2025-01-13 11:31   39M
 Seguridad Informatica.pdf                                                                                                                                   2025-01-13 11:31   39M  
![[Fichero PDF]](/icons/pdf2.png) Seguridad Y Contravigilancia.pdf                                                                                                                            2025-01-13 11:31  2.2M
 Seguridad Y Contravigilancia.pdf                                                                                                                            2025-01-13 11:31  2.2M  
![[   ]](/icons/pdf2.png) Seguridad_Informatica-HEPH.PDF                                                                                                                              2025-01-13 11:31   59M
 Seguridad_Informatica-HEPH.PDF                                                                                                                              2025-01-13 11:31   59M  
![[Fichero PDF]](/icons/pdf2.png) sgms_intro.pdf                                                                                                                                              2025-01-13 11:31  1.0M
 sgms_intro.pdf                                                                                                                                              2025-01-13 11:31  1.0M  
![[   ]](/icons/unknown.gif) SNIFFING.DOC                                                                                                                                                2025-01-13 11:31   51K
 SNIFFING.DOC                                                                                                                                                2025-01-13 11:31   51K  
![[Fichero PDF]](/icons/pdf2.png) Snort_Cookbook.pdf                                                                                                                                          2025-01-13 11:31  4.7M
 Snort_Cookbook.pdf                                                                                                                                          2025-01-13 11:31  4.7M  
![[   ]](/icons/unknown.gif) SolarWinds-Server-Application-Monitor-2013.epub                                                                                                             2025-01-13 11:31  5.5M
 SolarWinds-Server-Application-Monitor-2013.epub                                                                                                             2025-01-13 11:31  5.5M  
![[Fichero PDF]](/icons/pdf2.png) SolarWinds-Server-Application-Monitor-2013.pdf                                                                                                              2025-01-13 11:31  3.2M
 SolarWinds-Server-Application-Monitor-2013.pdf                                                                                                              2025-01-13 11:31  3.2M  
![[Fichero PDF]](/icons/pdf2.png) SonicOS_Enhanced_AdminGuide.pdf                                                                                                                             2025-01-13 11:31   11M
 SonicOS_Enhanced_AdminGuide.pdf                                                                                                                             2025-01-13 11:31   11M  
![[Fichero PDF]](/icons/pdf2.png) SonicWALL_CDP_2.2_1440_2440_GSG_Espanol.pdf                                                                                                                 2025-01-13 11:31  1.7M
 SonicWALL_CDP_2.2_1440_2440_GSG_Espanol.pdf                                                                                                                 2025-01-13 11:31  1.7M  
![[   ]](/icons/unknown.gif) SPOOFING.DOC                                                                                                                                                2025-01-13 11:31   41K
 SPOOFING.DOC                                                                                                                                                2025-01-13 11:31   41K  
![[Fichero PDF]](/icons/pdf2.png) Stallings_Cryptography_and_Network_Security.pdf                                                                                                             2025-01-13 11:31   14M
 Stallings_Cryptography_and_Network_Security.pdf                                                                                                             2025-01-13 11:31   14M  
![[Fichero PDF]](/icons/pdf2.png) Sybex-The-Official-ISC2®-CISSP®-CBK®-Reference-5nd-Edition.pdf                                                                                           2025-01-13 11:31  7.3M
 Sybex-The-Official-ISC2®-CISSP®-CBK®-Reference-5nd-Edition.pdf                                                                                           2025-01-13 11:31  7.3M  
![[Fichero PDF]](/icons/pdf2.png) termino hacker.pdf                                                                                                                                          2025-01-13 11:31  190K
 termino hacker.pdf                                                                                                                                          2025-01-13 11:31  190K  
![[Fichero PDF]](/icons/pdf2.png) TERMUX COMMAND-1.pdf                                                                                                                                        2025-01-13 11:31  167K
 TERMUX COMMAND-1.pdf                                                                                                                                        2025-01-13 11:31  167K  
![[Fichero PDF]](/icons/pdf2.png) The Art of Deception.pdf                                                                                                                                    2025-01-13 11:31  1.5M
 The Art of Deception.pdf                                                                                                                                    2025-01-13 11:31  1.5M  
![[Fichero PDF]](/icons/pdf2.png) The Complete Cyber Security Course, Hacking Exposed.pdf                                                                                                     2025-01-13 11:31   41M
 The Complete Cyber Security Course, Hacking Exposed.pdf                                                                                                     2025-01-13 11:31   41M  
![[Fichero PDF]](/icons/pdf2.png) The Hacker Playbook - Practical Guide To Penetration Testing.pdf                                                                                            2025-01-13 11:31  9.0M
 The Hacker Playbook - Practical Guide To Penetration Testing.pdf                                                                                            2025-01-13 11:31  9.0M  
![[Fichero PDF]](/icons/pdf2.png) --The Hacker Playbook (2).pdf                                                                                                                               2025-01-13 11:31   23M
 --The Hacker Playbook (2).pdf                                                                                                                               2025-01-13 11:31   23M  
![[Fichero PDF]](/icons/pdf2.png) The Hacker Playbook 2_ Practical Guide To Penetration Testing ( PDFDrive.com ).pdf                                                                          2025-01-13 11:31   23M
 The Hacker Playbook 2_ Practical Guide To Penetration Testing ( PDFDrive.com ).pdf                                                                          2025-01-13 11:31   23M  
![[Fichero PDF]](/icons/pdf2.png) The Hacker_s Manual (2015).pdf                                                                                                                              2025-01-13 11:32   80M
 The Hacker_s Manual (2015).pdf                                                                                                                              2025-01-13 11:32   80M  
![[Fichero PDF]](/icons/pdf2.png) The Hacker-Powered Security Report 2018.pdf                                                                                                                 2025-01-13 11:32   13M
 The Hacker-Powered Security Report 2018.pdf                                                                                                                 2025-01-13 11:32   13M  
![[Fichero PDF]](/icons/pdf2.png) The Hackers Handbook.pdf                                                                                                                                    2025-01-13 11:32   18M
 The Hackers Handbook.pdf                                                                                                                                    2025-01-13 11:32   18M  
![[Fichero PDF]](/icons/pdf2.png) The Privacy Engineers Manifesto.pdf                                                                                                                         2025-01-13 11:32  7.2M
 The Privacy Engineers Manifesto.pdf                                                                                                                         2025-01-13 11:32  7.2M  
![[Fichero PDF]](/icons/pdf2.png) The Shellcoder’s Handbook.pdf                                                                                                                             2025-01-13 11:32  8.7M
 The Shellcoder’s Handbook.pdf                                                                                                                             2025-01-13 11:32  8.7M  
![[Fichero PDF]](/icons/pdf2.png) The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf                                                                                         2025-01-13 11:32   26M
 The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf                                                                                         2025-01-13 11:32   26M  
![[Fichero PDF]](/icons/pdf2.png) todosloscomandosquehayquesaberparaconfigurarunrouter.pdf                                                                                                    2025-01-13 11:32  333K
 todosloscomandosquehayquesaberparaconfigurarunrouter.pdf                                                                                                    2025-01-13 11:32  333K  
![[Fichero PDF]](/icons/pdf2.png) Tomcat-Pentest.pdf                                                                                                                                          2025-06-10 10:37  3.3M
 Tomcat-Pentest.pdf                                                                                                                                          2025-06-10 10:37  3.3M  
![[Fichero PDF]](/icons/pdf2.png) The Signal Clone the Trump Admin Uses Was Hacked.pdf                                                                                                        2025-06-10 10:37  1.2M
 The Signal Clone the Trump Admin Uses Was Hacked.pdf                                                                                                        2025-06-10 10:37  1.2M  
![[Fichero PDF]](/icons/pdf2.png) socat.pdf                                                                                                                                                   2025-06-10 10:38  1.9M
 socat.pdf                                                                                                                                                   2025-06-10 10:38  1.9M  
![[Fichero PDF]](/icons/pdf2.png) SMTP Pentest .pdf                                                                                                                                           2025-06-10 10:38  1.3M
 SMTP Pentest .pdf                                                                                                                                           2025-06-10 10:38  1.3M  
![[Fichero PDF]](/icons/pdf2.png) shodan.pdf                                                                                                                                                  2025-06-10 10:38   13M
 shodan.pdf                                                                                                                                                  2025-06-10 10:38   13M  
![[Fichero PDF]](/icons/pdf2.png) revshell.pdf                                                                                                                                                2025-06-10 10:38  2.8M
 revshell.pdf                                                                                                                                                2025-06-10 10:38  2.8M  
![[Fichero PDF]](/icons/pdf2.png) Physical_Fault_Injection_and_Side_Channel_Attacks_on_Mobile_Devices.pdf                                                                                     2025-06-10 10:38  6.9M
 Physical_Fault_Injection_and_Side_Channel_Attacks_on_Mobile_Devices.pdf                                                                                     2025-06-10 10:38  6.9M  
![[Fichero PDF]](/icons/pdf2.png) OSCP Roadmap .pdf                                                                                                                                           2025-06-10 10:38  1.2M
 OSCP Roadmap .pdf                                                                                                                                           2025-06-10 10:38  1.2M  
![[Fichero PDF]](/icons/pdf2.png) Mimikatz Comprehensive Book.pdf                                                                                                                          2025-06-10 10:38  7.4M
 Mimikatz Comprehensive Book.pdf                                                                                                                          2025-06-10 10:38  7.4M  
![[Fichero PDF]](/icons/pdf2.png) jenkins.pdf                                                                                                                                                 2025-06-10 10:38  2.7M
 jenkins.pdf                                                                                                                                                 2025-06-10 10:38  2.7M  
![[Fichero PDF]](/icons/pdf2.png) Hacking the Narco Backbone.pdf                                                                                                                              2025-06-10 10:38  6.9M
 Hacking the Narco Backbone.pdf                                                                                                                              2025-06-10 10:38  6.9M  
![[Fichero PDF]](/icons/pdf2.png) feroxbuster.pdf                                                                                                                                             2025-06-10 10:38  7.1M
 feroxbuster.pdf                                                                                                                                             2025-06-10 10:38  7.1M  
![[Fichero PDF]](/icons/pdf2.png) DNS & DHCP Penetration Testing.pdf                                                                                                                          2025-06-10 10:38  2.1M
 DNS & DHCP Penetration Testing.pdf                                                                                                                          2025-06-10 10:38  2.1M  
![[Fichero PDF]](/icons/pdf2.png) ChatGPT For Offensive Security.pdf                                                                                                                          2025-06-10 10:38  852K
 ChatGPT For Offensive Security.pdf                                                                                                                          2025-06-10 10:38  852K  
![[Fichero PDF]](/icons/pdf2.png) Best Alternative of Netcat.pdf                                                                                                                              2025-06-10 10:38  4.1M
 Best Alternative of Netcat.pdf                                                                                                                              2025-06-10 10:38  4.1M  
![[Fichero PDF]](/icons/pdf2.png) Advanced Windows Post-Exploitation.pdf                                                                                                                      2025-06-10 10:38  3.6M
 Advanced Windows Post-Exploitation.pdf                                                                                                                      2025-06-10 10:38  3.6M  
![[Fichero PDF]](/icons/pdf2.png) IntelTechniques - OSINT 11 2025.04.02 .pdf                                                                                                                  2025-06-11 12:10   29M
 IntelTechniques - OSINT 11 2025.04.02 .pdf                                                                                                                  2025-06-11 12:10   29M  
![[Fichero PDF]](/icons/pdf2.png) IntelTechniques - Extreme Privacy 5 2025.04.02  .pdf                                                                                                        2025-06-11 12:10   12M
 IntelTechniques - Extreme Privacy 5 2025.04.02  .pdf                                                                                                        2025-06-11 12:10   12M