Академический Документы
Профессиональный Документы
Культура Документы
m=1
http://www.welivesecurity.com/la-es/2016/11/29/sabes-de-hacking/
https://actualidad.rt.com/actualidad/225151-click-sitio-web-comportamiento-usuarios
http://www.blackploit.com/2016/11/crack-md5-sha1-mysql-ntlm-free-online.html?m=1
aqui essean
libros python
https://mega.nz/#!6NJ0VZKC!aHXJ62_4r8mh0CJf1S_pxaTIhvAtVOfQn7zVxBxX-7c
nose
http://shink.in/GIZuJ
pag
https://www.facebook.com/TeamghsDeveloper/?fref=nf
descargarrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
https://mega.nz/#F!EZ4i0RoB!F6ZZ6h1Ehlt0GuuLUMQbcg!lEAgSbJC
https://mega.nz/#F!VhkF3LJR!agI0El7U2QzHVvKvvKwCKw
https://mega.nz/#F!DdtmVaKZ!ItEPLJTqok9dNFfX8dtt6w
https://mega.nz/#!TYFjEBzb!NFIHW1KnTCD3NHzNW_UU1hR6-NXQi7ybmN8S-Hbq1hI
https://mega.nz/#!MEkXjDxY!miWFFdnSR_EEtUdDAsFF6Zg7Azs8MXEvp48C0xOmdPw
http://totaki.com/poesiabinaria/2016/01/consejor-endurecer-servidor-ssh-hacerlo-
seguro/
https://hipertextual.com/2016/09/algoritmo-fotos-pixeledas
https://drive.google.com/file/d/0ByTbx85qERzKTjYzNjZrd0dnenc/view
https://www.youtube.com/watch?
v=KTviiHSsr6Q&feature=youtu.be&ab_channel=ProgramadoresChile
http://shink.in/GIZuJ
http://totaki.com/poesiabinaria/2012/02/navegando-a-traves-de-un-tunel-ssh/
https://www.hacking.cl/leer/enruta-tus-scripts-python-con-tor
https://www.google.cl/search?
q=violent+python+pdf&oq=violent+p&aqs=chrome.5.69i57j0l5.9516j0j4&sourceid=chrome&i
e=UTF-8
https://mega.nz/#F!Ts8EDSxI!pbCNEA1c07aKE_rySgVRow
http://www.sectorx.com.ar/curso-en-video-de-python-para-hackers/
https://mega.nz/#F!tJIkiQjJ!vPSM9j1kKVjFMRn_emBFcg
http://0xword.com/es/libros/66-libro-python-pentesters.html
http://www.redeszone.net/2016/10/30/multivpn-conoce-este-script-conectarte-varios-
servidores-openvpn-simultaneamente/
http://www.1000tipsinformaticos.com/2016/06/todo-lo-que-debes-saber-sobre-el-
Internet-de-las-Cosas.html
http://www.redeszone.net/2016/10/29/dracnmap-conoce-esta-herramienta-que-usa-nmap-
para-descubrir-redes-y-obtener-informacion/
ocultar fotos
https://www.youtube.com/watch?
v=AB79JCAC0b8&feature=youtu.be&ab_channel=T34MGHZZ0FTW4R3
hidden wiki
http://thehiddenwiki.org/
proteger memocrias usb
http://www.redeszone.net/2016/10/29/proteger-cifrar-los-datos-nuestras-memorias-
usb/
explotacion web
https://securityhacklabs.blogspot.cl/2016/10/conoce-nuestra-herramienta-de.html?
utm_source=twitterfeed&utm_medium=twitter&m=1
http://www.elladodelmal.com/2014/05/usb-rubber-ducky-un-teclado-malicioso.html?m=1
https://luisiblogdeinformatica.com/como-hacer-un-bad-usb-un-rubber-ducky/
http://www.welivesecurity.com/la-es/2016/10/07/10-gadgets-hacker-etico/
cursos
pwm y valor eficaz
https://www.youtube.com/watch?v=pN8qT4mLOO8&ab_channel=electgpl
https://www.google.cl/search?
q=ampollas+de+lorensini&oq=ampollas+de+lorensini&aqs=chrome..69i57.6268j0j4&sourcei
d=chrome&ie=UTF-8