⭕️⭕️⭕️
*✖PYTHON*
https://mega.nz/#F!eMUXVDhL!BYrd93m3y7xXaMP6kCyHDA
*✖SQL*
https://mega.nz/#F!mwJ3AZLK!_F3ecy2ikMmMBL9aveKHpQ
https://mega.nz/#F!FCAWxCgI!ORrqmfAxyjzq6jGZAA60eA
*✖Some books on shellcoding and exploit development*
https://mega.nz/#F!SR9iSTxK!YnzXhZVEkdQSGSPK-Toijg
*✖C++*
https://mega.nz/#F!6UdmgKIa!fMWfyydRxGxm22-2-xNSyQ
*✖LINUX*
https://mega.nz/#F!OIUgAY6K!j-vF0PfiBjvXdxYg2_9dKQ
*✖NETWORKING*
https://mega.nz/#F!rY1DxR7B!dQpViUN9UR5u7iAbTlXRqQ
*✖PYTHON*
https://mega.nz/#F!eMUXVDhL!BYrd93m3y7xXaMP6kCyHDA
*✖AAA_SMITARE*
https://mega.nz/#F!rY9CXISI!VuZ_PiTgicYVT3-f0KIW-w
*✖ANTIVIRUS*
https://mega.nz/#F!rUd13AwL!Q-Xs4myJFFpfHCGh8U2scA
*✖APT*
https://mega.nz/#F!3UNGmRYI!JZ0ZFV6Scp0Whs6V4RRgfg
*✖BIG DATA*
https://mega.nz/#F!7Jt2mABQ!glIMLwpY5DU8902ud3cd-g
*✖CEHV 7&8 PDF Y VIDEOS*
https://mega.nz/#F!vB1k2RrA!eMiaJbCzgB1ZxooeV4arIg
*✖COMPUTER SECURYTY*
https://mega.nz/#F!GENySKRb!C9Q-7h48_TfJMmeMMgPhUQ
*✖CRIPTO VIROLOGY*
https://mega.nz/#F!rYMhiAoK!V7iPaEZ5O0SqGFOIulW1sg
*✖ETHICAL HACKING*
https://mega.nz/#F!nAFmRRLB!IsTNkuDsubipB7CE7S_4Yw
*✖ETHICAL HACKING EN MODULES*
https://mega.nz/#F!WVlDHaZA!DsAnjaPY-81gG0PZu4UwQQ
*✖EXPLOITS*
https://mega.nz/#F!SR9iSTxK!YnzXhZVEkdQSGSPK-Toijg
*✖FORENSICS*
https://mega.nz/#F!3ENSFQ4T!su6Ni3lvQuBiWQr6y3BHfg
*✖HADOOP*
https://mega.nz/#F!qJsXzJ7Y!tgVyc-K_mEJ8TeND4xCt-Q
*✖JAVASCRIP*
https://mega.nz/#F!KZVhlYIT!ukXSgFj66jnLQJFGQWC8eg