<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://store.8dot8.org</loc>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/contact</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/88-ilgri-101-implementador-lider-de-gestion-y-respuesta-a-incidentes</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/88-reloaded-2024-copiar</loc>
    <lastmod>2025-10-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/88-tr3ce-2023</loc>
    <lastmod>2025-10-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/academia</loc>
    <lastmod>2026-02-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/amazon-web-services-hardening-de-infraestructuras-cloud-computing</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/arduino-para-hackers-pocs-hacks-just-for-fun-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/arquitectura-de-seguridad-y-patrones-de-diseno-seguro-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/arquitectura-de-seguridad-y-patrones-de-diseno-seguro-copiar-1</loc>
    <lastmod>2026-01-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/ataques-en-redes-de-datos-ipv4-e-ipv6-4a-edicion-revisada-y-ampliada</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/big-data-tecnologias-para-arquitecturas-data-centric</loc>
    <lastmod>2026-01-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/big-data-tecnologias-para-arquitecturas-data-centric-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/bitcoin-la-tecnologia-blockchain-y-su-investigacion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/blog</loc>
    <lastmod>2020-10-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/blog-post</loc>
    <lastmod>2020-10-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/ciberestafas-la-historia-de-nunca-acabar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/ciberestafas-la-historia-de-nunca-acabar-copiar-1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/ciberguerra-tacticas-de-seguridad-para-vivir-en-un-mundo-hiperconectado</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/cifrado-de-las-comunicaciones-digitales-de-la-cifra-clasica-al-algoritmo-rsa-2a-edicion-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/comic-hacker-epico-edicion-deluxe-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/como-protegerse-de-los-peligros-en-internet-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/cuentos-para-minihackers-un-verano-alucinante</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/cuentos-para-minihackers-volumen-i-iniciando-sesion</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/curso-de-cumplimiento-normativo-y-gobernanza</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/de-la-caverna-al-metaverso</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/dni-e-tecnologia-y-usos</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/docker-secdevops</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/docker-secdevops-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/esteganografia-y-estegoanalisis</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/esteganografia-y-estegoanalisis-copiar</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/ethical-hacking-teoria-y-practica-para-la-realizacion-de-un-pentesting-2a-edicion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/forefreont-theat-management-gataway-tmg-2010</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/got-root-el-poder-de-la-mente</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/grafica</loc>
    <lastmod>2021-03-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacker-epico-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-con-buscadores-3-edicion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-con-drones-love-is-in-the-air-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-con-metasploit-advanced-pentesting</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-de-aplicaciones-web-sql-injection-3a-edicion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-de-aplicaciones-web-sql-injection-4a-edicion-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-home-devices-i-pocs-hacks-just-for-fun-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-home-devices-ii-pocs-hacks-just-for-fun</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-ia-jailbreak-prompt-injection-hallucinations-unalignment</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-web-applications-client-side-attacks</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-web-technologies</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-web3-new-challenge-accepted</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-web3-new-challenge-accepted-copiar</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-wifi</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-windows-ataques-a-sistemas-y-redes-microsoft-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hacking-y-seguridad-voip-2a-edicion-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hardening-de-servidores-gnulinux-copiar-1</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/historias-cortas-sobre-fondo-azul</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/hkai-105-hacking-con-inteligencia-artificial</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/implementador-lider-en-auditoria-de-ciberseguridad</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/infraestructuras-criticas-y-sistemas-industriales-auditorias-de-seguridad-y-fortificacion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/jinetes-en-la-tormenta</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/kubernetes-para-profesionales-desde-cero-al-despliegue-de-aplicaciones-seguras-y-resilientes</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/kubernetes-para-profesionales-desde-cero-al-despliegue-de-aplicaciones-seguras-y-resilientes-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/la-chica-del-sombrero-negro</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/libros</loc>
    <lastmod>2020-10-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/libros/0xword</loc>
    <lastmod>2020-10-21</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/libros/compra-con-reserva</loc>
    <lastmod>2022-03-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/linux-exploiting-tecnicas-de-explotacion-de-vulnerabilidades-en-linux-para-la-creacion-de-exploits</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/linux-exploiting-tecnicas-de-explotacion-de-vulnerabilidades-en-linux-para-la-creacion-de-exploits-copiar</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/machine-learning-aplicado-a-ciberseguridad-tecnicas-y-ejemplos-en-la-deteccion-de-amenazas-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/macos-hacking</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/malware-en-android-discovering-reversing-and-forensics-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/malware-moderno-tecnicas-avanzadas-y-su-influencia-en-la-industria</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/maxima-seguridad-en-windows-secretos-tecnicos-5a-edicion-actualizada-con-nuevos-contenidos</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/maxima-seguridad-en-wordpress</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/metasploit-para-pentesters-5a-edicion-revisada-y-ampliada</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/microhistorias-anecdotas-y-curiosidades-de-la-informatica</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/open-source-intelligence-osint-investigar-personas-e-identidades-en-internet</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/pentesting-con-foca-3a-edicion</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/pentesting-con-kali-linux-rolling-release-2017</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/pentesting-con-powershell-copy</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/poleras</loc>
    <lastmod>2020-10-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/poleras/88</loc>
    <lastmod>2020-10-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/poleron</loc>
    <lastmod>2024-10-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/poleron-88-reloaded-2024-copiar</loc>
    <lastmod>2025-10-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/privacy-policy</loc>
    <lastmod>2020-11-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/python-para-pentesters</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/quantum-security-tecnologia-cuantica-ciberseguridad-criptografica-cuantica-y-post-cuantica</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/refund-policy</loc>
    <lastmod>2020-11-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/relatos-para-hackear-el-tiempo</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/show-me-the-e-money-hacking-a-sistemas-de-pagos-digitales-nfc-rfid-mst-y-chips-emv</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/show-me-the-e-money-hacking-a-sistemas-de-pagos-digitales-nfc-rfid-mst-y-chips-emv-copiar</loc>
    <lastmod>2025-12-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/social-hunters-hacking-con-ingenieria-social-en-el-red-team</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/storytelling-para-emprendedores</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/taller-fundamentos-y-seguridad-en-redes-wi-fi</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/tecnicas-de-analisis-forense-informatico-para-peritos-judiciales-profesionales-1</loc>
    <lastmod>2026-01-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/tecnicas-de-analisis-forense-informatico-para-peritos-judiciales-profesionales-copiar</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/terms-and-conditions</loc>
    <lastmod>2020-11-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/whatsapp-int-osint-en-whatsapp</loc>
    <lastmod>2026-05-01</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://store.8dot8.org/workshop-pentest-em-emv</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
</urlset>
