{"version":1,"pages":[{"id":"AvgDxffyr6BiGCusSqtg","title":"Welcome to Securescape!","pathname":"/","siteSpaceId":"sitesp_VijvU","emoji":"1f44b","description":"","breadcrumbs":[{"label":"About Us","emoji":"1f52d"}]},{"id":"QFq4lRaE09PL9O1A0ndQ","title":"Operating Systems  (WIP)","pathname":"/fundamentals/operating-systems-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f5a5","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"}]},{"id":"f6O4t9ehWlX03KMcjfH5","title":"Introduction to Operating Systems","pathname":"/fundamentals/operating-systems-wip/introduction-to-operating-systems","siteSpaceId":"sitesp_VijvU","description":"A brief introduction and history into Operating Systems","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"}]},{"id":"ZtX2k4X10b4nl5iHXoVT","title":"Processes and Process Management","pathname":"/fundamentals/operating-systems-wip/processes-and-process-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"}]},{"id":"0jspMVKth61SRD5p2DwE","title":"Processes","pathname":"/fundamentals/operating-systems-wip/processes-and-process-management/processes","siteSpaceId":"sitesp_VijvU","emoji":"1f4e0","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"},{"label":"Processes and Process Management"}]},{"id":"4iEYtmVNshkgmpy736Uj","title":"Threads","pathname":"/fundamentals/operating-systems-wip/processes-and-process-management/threads","siteSpaceId":"sitesp_VijvU","emoji":"1f9f5","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"},{"label":"Processes and Process Management"}]},{"id":"730pYg3e6wZGfEdu0MT6","title":"Scheduling","pathname":"/fundamentals/operating-systems-wip/processes-and-process-management/scheduling","siteSpaceId":"sitesp_VijvU","emoji":"1f4c5","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"},{"label":"Processes and Process Management"}]},{"id":"ogWGO5EqqDK55ZrqWFUW","title":"Memory Management","pathname":"/fundamentals/operating-systems-wip/memory-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"}]},{"id":"BDXzdT6JXOla6w819vZL","title":"Virtual Memory Management","pathname":"/fundamentals/operating-systems-wip/memory-management/virtual-memory-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"},{"label":"Memory Management"}]},{"id":"6DD4VtULOh1DFxFpsMqS","title":"Storage Management","pathname":"/fundamentals/operating-systems-wip/storage-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"}]},{"id":"nlhlv0U6UjnyyKOabWV2","title":"I/O Management","pathname":"/fundamentals/operating-systems-wip/i-o-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Operating Systems  (WIP)","emoji":"1f5a5"}]},{"id":"PUPKJhdD0wKBtIvcIJCA","title":"Linux  (WIP)","pathname":"/fundamentals/linux-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f427","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"}]},{"id":"ze1qeGZ5C85dS9rkbZpR","title":"Introduction to Linux","pathname":"/fundamentals/linux-wip/introduction-to-linux","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Linux  (WIP)","emoji":"1f427"}]},{"id":"xySIJBsjmvnSnu0jFEpz","title":"Linux System Management","pathname":"/fundamentals/linux-wip/linux-system-management","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Linux  (WIP)","emoji":"1f427"}]},{"id":"nRrDsIFK0NjlI7kpFkjd","title":"Programming  (WIP)","pathname":"/fundamentals/programming-wip","siteSpaceId":"sitesp_VijvU","emoji":"26a1","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"}]},{"id":"zjH44K5LQZxFMmi9Xho7","title":"Assembly","pathname":"/fundamentals/programming-wip/assembly","siteSpaceId":"sitesp_VijvU","emoji":"1f517","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"}]},{"id":"EaKbPCdBfmrMgUM0pwKz","title":"C(++/#)","pathname":"/fundamentals/programming-wip/c-++","siteSpaceId":"sitesp_VijvU","emoji":"1f4aa","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"}]},{"id":"TOS9ilAB5ohrzGiIhOY9","title":"Python","pathname":"/fundamentals/programming-wip/python","siteSpaceId":"sitesp_VijvU","emoji":"1f40d","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"}]},{"id":"ZZ8Eu3f7xGeJ3ranFOvi","title":"Nim","pathname":"/fundamentals/programming-wip/nim","siteSpaceId":"sitesp_VijvU","emoji":"1f451","description":"Resources to get started with Nim Programming","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"}]},{"id":"8ysyx31JEJGjv2EiCUi9","title":"Bash","pathname":"/fundamentals/programming-wip/bash","siteSpaceId":"sitesp_VijvU","emoji":"1f528","description":"Bash Scripting","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"}]},{"id":"i29yh0F6Kg98z5oc0iOE","title":"Introduction to Bash Scripting","pathname":"/fundamentals/programming-wip/bash/introduction-to-bash-scripting","siteSpaceId":"sitesp_VijvU","description":"Bash scripting is a powerful tool that allows you to automate tasks, create programs, and perform various operations on your computer or server. In this blog post, we will introduce the basics of bash","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"},{"label":"Bash","emoji":"1f528"}]},{"id":"fI6SvRE1WDbPSpdUBamg","title":"Variables, Loops, and Port Scanner","pathname":"/fundamentals/programming-wip/bash/variables-loops-and-port-scanner","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Programming  (WIP)","emoji":"26a1"},{"label":"Bash","emoji":"1f528"}]},{"id":"P0M8s0Vl2eckMwKgUWMV","title":"Networking  (WIP)","pathname":"/fundamentals/networking-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f6a9","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"}]},{"id":"eS7bs4qUdLmkdlaJAmQd","title":"Networking 101","pathname":"/fundamentals/networking-wip/networking-101","siteSpaceId":"sitesp_VijvU","emoji":"1f4f6","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"}]},{"id":"G5m0kC9CAi6VBAzeBFXS","title":"Networking Basics","pathname":"/fundamentals/networking-wip/networking-101/networking-basics","siteSpaceId":"sitesp_VijvU","emoji":"1f578","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Networking 101","emoji":"1f4f6"}]},{"id":"Wx1MHrYjNNAmG3WTDPCu","title":"Protocols","pathname":"/fundamentals/networking-wip/networking-101/protocols","siteSpaceId":"sitesp_VijvU","emoji":"1f6d1","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Networking 101","emoji":"1f4f6"}]},{"id":"JNgluwNHUFfx9q0pdAA9","title":"IPv4","pathname":"/fundamentals/networking-wip/networking-101/ipv4","siteSpaceId":"sitesp_VijvU","emoji":"1f9d3","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Networking 101","emoji":"1f4f6"}]},{"id":"HwlQF7om9pj1vALJ9H1g","title":"IPv6","pathname":"/fundamentals/networking-wip/networking-101/ipv6","siteSpaceId":"sitesp_VijvU","emoji":"1f9d2","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Networking 101","emoji":"1f4f6"}]},{"id":"feCn4QwnxoGalLU1U0cX","title":"Packet Tracer","pathname":"/fundamentals/networking-wip/packet-tracer","siteSpaceId":"sitesp_VijvU","emoji":"1faa1","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"}]},{"id":"E4qmrXRgJT8a4kDGUiy8","title":"Interface","pathname":"/fundamentals/networking-wip/packet-tracer/interface","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Packet Tracer","emoji":"1faa1"}]},{"id":"ubhAP9ixAbvLECZs6cmT","title":"Connections","pathname":"/fundamentals/networking-wip/packet-tracer/connections","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Packet Tracer","emoji":"1faa1"}]},{"id":"ud9BUtKEXB4gKEgC7Mz2","title":"Creating Networks","pathname":"/fundamentals/networking-wip/packet-tracer/creating-networks","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Packet Tracer","emoji":"1faa1"}]},{"id":"MCwxi5r1mHFnoJVQLGCl","title":"Virtual LANS & Trunks","pathname":"/fundamentals/networking-wip/packet-tracer/virtual-lans-and-trunks","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"},{"label":"Packet Tracer","emoji":"1faa1"}]},{"id":"o6GRY19KDjVZAXKPOj1j","title":"Subnetting","pathname":"/fundamentals/networking-wip/subnetting","siteSpaceId":"sitesp_VijvU","emoji":"1f578","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"}]},{"id":"0sD0CCETiKRkyrA6vrje","title":"Network Security","pathname":"/fundamentals/networking-wip/network-security","siteSpaceId":"sitesp_VijvU","emoji":"1f575","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Networking  (WIP)","emoji":"1f6a9"}]},{"id":"n5ORMibXZWkRo1pJM1NG","title":"Report Writing (WIP)","pathname":"/fundamentals/report-writing-wip","siteSpaceId":"sitesp_VijvU","emoji":"270d","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"}]},{"id":"29acxI0fjGqOXJQZWDwL","title":"Research Skills","pathname":"/fundamentals/report-writing-wip/research-skills","siteSpaceId":"sitesp_VijvU","emoji":"1f50d","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Report Writing (WIP)","emoji":"270d"}]},{"id":"gEQHhCT1zUbSur1vWUI2","title":"Structuring a Report","pathname":"/fundamentals/report-writing-wip/structuring-a-report","siteSpaceId":"sitesp_VijvU","emoji":"1f3d7","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Report Writing (WIP)","emoji":"270d"}]},{"id":"rP5XEo9G2xm4D2dV92tG","title":"Creating Templates","pathname":"/fundamentals/report-writing-wip/creating-templates","siteSpaceId":"sitesp_VijvU","emoji":"1f5c3","description":"","breadcrumbs":[{"label":"Fundamentals","emoji":"1f476"},{"label":"Report Writing (WIP)","emoji":"270d"}]},{"id":"kQ4YlmcvefycvFWan5dr","title":"Methodologies","pathname":"/general-security/methodologies","siteSpaceId":"sitesp_VijvU","emoji":"1f5d2","description":"Penetration Testing and Red Team Methodologies","breadcrumbs":[{"label":"General Security","emoji":"1f982"}]},{"id":"of965x0E61zRkhdURlIe","title":"OSSTMM","pathname":"/general-security/methodologies/osstmm","siteSpaceId":"sitesp_VijvU","emoji":"1f1ed-1f1f0","description":"Open Source Testing Methodology Manual","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"}]},{"id":"PMftKpUaEOC9tC9Xqvnn","title":"OWASP","pathname":"/general-security/methodologies/owasp","siteSpaceId":"sitesp_VijvU","emoji":"1f41d","description":"Open Web Application Security Project","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"}]},{"id":"XGz2QwiBPzpqANpe6Tr4","title":"Web Security Testing Guide","pathname":"/general-security/methodologies/owasp/web-security-testing-guide","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"},{"label":"OWASP","emoji":"1f41d"}]},{"id":"MWbzcz93DA4BnQ2IhSeK","title":"Mobile Security Testing Guide","pathname":"/general-security/methodologies/owasp/mobile-security-testing-guide","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"},{"label":"OWASP","emoji":"1f41d"}]},{"id":"WmIceSLd9XXA1OULCq1Q","title":"NIST","pathname":"/general-security/methodologies/nist","siteSpaceId":"sitesp_VijvU","emoji":"1f985","description":"National Institute of Standards and Technology","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"}]},{"id":"wliJDEyaEY4rho28rifz","title":"PTES","pathname":"/general-security/methodologies/ptes","siteSpaceId":"sitesp_VijvU","emoji":"1f962","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"}]},{"id":"nrbZiWkfs6V2ydAiYTSa","title":"Cyber Killchain","pathname":"/general-security/methodologies/cyber-killchain","siteSpaceId":"sitesp_VijvU","emoji":"26d3","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Methodologies","emoji":"1f5d2"}]},{"id":"CKpOMDO9cxtAIoiy4rj2","title":"Binary Exploitation","pathname":"/general-security/binary-exploitation","siteSpaceId":"sitesp_VijvU","emoji":"1f354","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"}]},{"id":"9pYRsRAsM1xIzYcVLTAu","title":"Cheat Sheets","pathname":"/general-security/cheat-sheets","siteSpaceId":"sitesp_VijvU","emoji":"1f3a9","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"}]},{"id":"mgb2tF5jma52hhDQjGXp","title":"Enumeration","pathname":"/general-security/cheat-sheets/enumeration","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"}]},{"id":"VFxmsNp0WyIjgliC7KG9","title":"Network Scan","pathname":"/general-security/cheat-sheets/enumeration/network-scan","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Enumeration"}]},{"id":"lKWcCZBPcQuNIEoE3xuf","title":"Vulnerability Scan","pathname":"/general-security/cheat-sheets/enumeration/vulnerability-scan","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Enumeration"}]},{"id":"7DgE0gCN7MSiMrmqmFie","title":"Web Scan","pathname":"/general-security/cheat-sheets/enumeration/web-scan","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Enumeration"}]},{"id":"xgNo1BtqetDfnCwnr2BT","title":"Exploitation","pathname":"/general-security/cheat-sheets/exploitation","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"}]},{"id":"32ahzkqWngGcLibukNyn","title":"Page 1","pathname":"/general-security/cheat-sheets/exploitation/page-1","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Exploitation"}]},{"id":"XERVoPwQ1CUZXQ1ZixBh","title":"Payloads & Shells","pathname":"/general-security/cheat-sheets/exploitation/payloads-and-shells","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Exploitation"}]},{"id":"brQ7u69va0MJ6lCmKNHt","title":"Post Exploitation","pathname":"/general-security/cheat-sheets/post-exploitation","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"}]},{"id":"Dm0HbHlFPtDJHPf20Ktn","title":"Lay of The Land","pathname":"/general-security/cheat-sheets/post-exploitation/lay-of-the-land","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Post Exploitation"}]},{"id":"XCKkqiXtK1xoVGEXk8Yq","title":"Persistence","pathname":"/general-security/cheat-sheets/post-exploitation/persistence","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Post Exploitation"}]},{"id":"opxieDBlVIlKB9LEdIJ2","title":"Data Exfiltration","pathname":"/general-security/cheat-sheets/post-exploitation/data-exfiltration","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Post Exploitation"}]},{"id":"qASZ4pf5rZHPYx0MdTby","title":"Pivoting","pathname":"/general-security/cheat-sheets/post-exploitation/pivoting","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Post Exploitation"}]},{"id":"z9n90XcS8T65LIQxavw7","title":"Command & Control","pathname":"/general-security/cheat-sheets/command-and-control","siteSpaceId":"sitesp_VijvU","description":"C2 or C&C","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"}]},{"id":"23Zr5ezgVDfkomPa3DRC","title":"Disassembly","pathname":"/general-security/cheat-sheets/disassembly","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"}]},{"id":"8q8pNJrOTOlrqwFfvAAq","title":"Radare2","pathname":"/general-security/cheat-sheets/disassembly/radare2","siteSpaceId":"sitesp_VijvU","emoji":"2622","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Disassembly"}]},{"id":"AB5KIEMDtSNjvp7dcb0x","title":"GDB","pathname":"/general-security/cheat-sheets/disassembly/gdb","siteSpaceId":"sitesp_VijvU","emoji":"1f95c","description":"","breadcrumbs":[{"label":"General Security","emoji":"1f982"},{"label":"Cheat Sheets","emoji":"1f3a9"},{"label":"Disassembly"}]},{"id":"3Z1zZw0CxjaRwg4jHtY6","title":"Hardware Exploitation","pathname":"/offensive-security/hardware-exploitation","siteSpaceId":"sitesp_VijvU","emoji":"1f4a1","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"}]},{"id":"PXhM1XoT1l5YYRpc2DvO","title":"Intro to Hardware","pathname":"/offensive-security/hardware-exploitation/intro-to-hardware","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Hardware Exploitation","emoji":"1f4a1"}]},{"id":"UoS27LNYF4dzNXojQJMJ","title":"Red Team","pathname":"/offensive-security/red-team","siteSpaceId":"sitesp_VijvU","emoji":"1f977","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"}]},{"id":"CoJtis8vQ1pD5HlqMveb","title":"Malware Development","pathname":"/offensive-security/red-team/malware-development","siteSpaceId":"sitesp_VijvU","emoji":"1f9a0","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"}]},{"id":"nGGI3le6veYRAkDSYKLU","title":"C# Malware","pathname":"/offensive-security/red-team/malware-development/c-malware","siteSpaceId":"sitesp_VijvU","emoji":"1faa1","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Malware Development","emoji":"1f9a0"}]},{"id":"WTlWuXPyFi1BnswNRQlN","title":"Offensive Development","pathname":"/offensive-security/red-team/offensive-development","siteSpaceId":"sitesp_VijvU","emoji":"1f3ed","description":"Building resilient infrastructure, and automating offensive development","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"}]},{"id":"WW5K4mMtWh2pDeEYSdCL","title":"Offensive DevOps","pathname":"/offensive-security/red-team/offensive-development/offensive-devops","siteSpaceId":"sitesp_VijvU","emoji":"1f527","description":"About Offensive DevOps","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"}]},{"id":"ZpnK2uoO104k2jylrS39","title":"GitLab","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/gitlab","siteSpaceId":"sitesp_VijvU","emoji":"1f3f7","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"}]},{"id":"VstpRLFnZctXRIlygGiI","title":"GitLab Setup","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/gitlab/gitlab-setup","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"GitLab","emoji":"1f3f7"}]},{"id":"V6p6M0BocqOormHBI1hK","title":"Simple Calculator Project","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/gitlab/simple-calculator-project","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"GitLab","emoji":"1f3f7"}]},{"id":"YDe23NFGvoTlfLpqSo3L","title":"Making our CI/CD Pipeline","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/gitlab/making-our-ci-cd-pipeline","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"GitLab","emoji":"1f3f7"}]},{"id":"PlveSJli9bM4MOYIbcaD","title":"Build Artifacts","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/gitlab/build-artifacts","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"GitLab","emoji":"1f3f7"}]},{"id":"7t7tZfBTNpdwbTYVYNLJ","title":"TeamCity","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/teamcity","siteSpaceId":"sitesp_VijvU","emoji":"1f306","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"}]},{"id":"EXZPgczHkNaQv7RkIVNU","title":"TeamCity Setup","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/teamcity/teamcity-setup","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"TeamCity","emoji":"1f306"}]},{"id":"IOABDY1mxPTWGTfBQXvd","title":"Creating TeamCity Projects","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/teamcity/creating-teamcity-projects","siteSpaceId":"sitesp_VijvU","description":"Short module on how to pull repositories from different sources","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"TeamCity","emoji":"1f306"}]},{"id":"QyyUKVlQIDeP89bWAMIv","title":"Obfuscating Payloads","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/teamcity/obfuscating-payloads","siteSpaceId":"sitesp_VijvU","description":"the fun part 😊","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"TeamCity","emoji":"1f306"}]},{"id":"CT2N7M1NW6zQ8S1oTtk4","title":"Jenkins (WIP)","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/jenkins-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f377","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"}]},{"id":"nioTXzx7ldSCaIWquJlN","title":"Jenkins Setup","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/jenkins-wip/jenkins-setup","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"Jenkins (WIP)","emoji":"1f377"}]},{"id":"Irp9AedoXBVzgr19RSKu","title":"Creating Pipelines","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/jenkins-wip/creating-pipelines","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"Jenkins (WIP)","emoji":"1f377"}]},{"id":"35gsqLQQH0OthNTe1GUA","title":"Managing Projects","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/jenkins-wip/managing-projects","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"Jenkins (WIP)","emoji":"1f377"}]},{"id":"ReWfANUKEArS1fZKsRmN","title":"API Interaction","pathname":"/offensive-security/red-team/offensive-development/offensive-devops/jenkins-wip/api-interaction","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Offensive DevOps","emoji":"1f527"},{"label":"Jenkins (WIP)","emoji":"1f377"}]},{"id":"DuoWEEH4VZgbpp4kKDeB","title":"Infrastructure Development (WIP)","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f3d7","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"}]},{"id":"0lbHUhHDgn1KlKyjPlTU","title":"Command & Control Infrastructure","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure","siteSpaceId":"sitesp_VijvU","emoji":"1f3ae","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"}]},{"id":"kVdJGKvwkaDUTDzTpp7g","title":"Command & Control Anatomy","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy","siteSpaceId":"sitesp_VijvU","emoji":"1f916","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"}]},{"id":"nPH8AqBM4irhhB4moGfW","title":"Command & Control Frameworks","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/command-and-control-frameworks","siteSpaceId":"sitesp_VijvU","description":"Common Command & Control Frameworks used by Professionals and Threat Actors","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"}]},{"id":"8AotZcB4ttyfdw1QMkKq","title":"Metasploit Framework","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/metasploit-framework","siteSpaceId":"sitesp_VijvU","emoji":"24c2","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"}]},{"id":"XkPbUl1ntcApdAaTrmj9","title":"Installing Metasploit","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/metasploit-framework/installing-metasploit","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Metasploit Framework","emoji":"24c2"}]},{"id":"bdWz9xZJJOwpHcz4LQwV","title":"Metasploit Basics","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/metasploit-framework/metasploit-basics","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Metasploit Framework","emoji":"24c2"}]},{"id":"jFitiAFgcbLZE8gf2rxd","title":"Advanced Features","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/metasploit-framework/advanced-features","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Metasploit Framework","emoji":"24c2"}]},{"id":"7RFfRXzgu6WKnasUFLYd","title":"Mythic Framework","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/mythic-framework","siteSpaceId":"sitesp_VijvU","emoji":"1f432","description":"Mythic Command & Control Framework","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"}]},{"id":"v0BwhfPrVs1uLrpB9fZd","title":"Installing Mythic","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/mythic-framework/installing-mythic","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Mythic Framework","emoji":"1f432"}]},{"id":"07O5YwGiyJp4BPH1ljuy","title":"Malleable Command & Control","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/mythic-framework/malleable-command-and-control","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Mythic Framework","emoji":"1f432"}]},{"id":"Pgsg28bUtV9xsD9gN8Xo","title":"All About Agents","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/mythic-framework/all-about-agents","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Mythic Framework","emoji":"1f432"}]},{"id":"L6IpaWdw5sEkFHZRWCLS","title":"Services","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/command-and-control-anatomy/mythic-framework/services","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Command & Control Anatomy","emoji":"1f916"},{"label":"Mythic Framework","emoji":"1f432"}]},{"id":"pBgbbcRO5zGzuCl3lLew","title":"Traffic Redirection","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection","siteSpaceId":"sitesp_VijvU","emoji":"1f6a5","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"}]},{"id":"TX0bUz3ObCEigmuu5MN2","title":"Nginx","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection/nginx","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Traffic Redirection","emoji":"1f6a5"}]},{"id":"fM9WuALQxQLGBtwXYg1x","title":"Amazon Web Services","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection/amazon-web-services","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Traffic Redirection","emoji":"1f6a5"}]},{"id":"douUJYlWfcuCy6rbrxtK","title":"Microsoft Azure","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection/microsoft-azure","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Traffic Redirection","emoji":"1f6a5"}]},{"id":"kaWPHOeSKZvKptgcsMJ9","title":"Google Cloud Platform","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection/google-cloud-platform","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Traffic Redirection","emoji":"1f6a5"}]},{"id":"jCLgX3NcxtvPqbYCMWBX","title":"Cloudflare Workers","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/traffic-redirection/cloudflare-workers","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Traffic Redirection","emoji":"1f6a5"}]},{"id":"AqPpDrIv2O30PfbuE8Nv","title":"Covert Infrastructure","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/covert-infrastructure","siteSpaceId":"sitesp_VijvU","emoji":"1f977","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"}]},{"id":"MoKEmo9ROoabHTxNUfw9","title":"Ensuring Resiliency","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/covert-infrastructure/ensuring-resiliency","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Covert Infrastructure","emoji":"1f977"}]},{"id":"JO5LUNH0FUYjPciwrK76","title":"Traffic Masking","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/covert-infrastructure/traffic-masking","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Covert Infrastructure","emoji":"1f977"}]},{"id":"LclKcarBRlwgpYiAgeVq","title":"Network Rules","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/command-and-control-infrastructure/covert-infrastructure/network-rules","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Command & Control Infrastructure","emoji":"1f3ae"},{"label":"Covert Infrastructure","emoji":"1f977"}]},{"id":"a1bxgwQdSUcdeEp7tgM3","title":"Phishing Infrastructure","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/phishing-infrastructure","siteSpaceId":"sitesp_VijvU","emoji":"1f3a3","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"}]},{"id":"emrbH9iR5IdRz7oHI4t0","title":"Email Anatomy","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/phishing-infrastructure/email-anatomy","siteSpaceId":"sitesp_VijvU","emoji":"1f4e7","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Phishing Infrastructure","emoji":"1f3a3"}]},{"id":"re7ErCJDTD770L7YGAxD","title":"Phishing Infrastructure Setup","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/phishing-infrastructure/phishing-infrastructure-setup","siteSpaceId":"sitesp_VijvU","emoji":"1f41f","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Phishing Infrastructure","emoji":"1f3a3"}]},{"id":"SpLVWhNwVAyFkeqXd3oS","title":"Payload Delivery","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/phishing-infrastructure/payload-delivery","siteSpaceId":"sitesp_VijvU","emoji":"1f69a","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Phishing Infrastructure","emoji":"1f3a3"}]},{"id":"HkowUTFDYWNdFTmBJhUp","title":"Removing Red Flags","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/phishing-infrastructure/removing-red-flags","siteSpaceId":"sitesp_VijvU","emoji":"1f6a9","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Phishing Infrastructure","emoji":"1f3a3"}]},{"id":"HYCKesGRMhrKPm0nGIAi","title":"Infrastructure as Code","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code","siteSpaceId":"sitesp_VijvU","emoji":"1fa84","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"}]},{"id":"jzi5itcWIrKGL3wc1ZTo","title":"Terraform","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/terraform","siteSpaceId":"sitesp_VijvU","emoji":"1f3dd","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"}]},{"id":"4SQg32d6G7emvD0SOOAy","title":"Interacting with Docker","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/terraform/interacting-with-docker","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"},{"label":"Terraform","emoji":"1f3dd"}]},{"id":"m4pjJcr5MZaOnN2lSncd","title":"Going to the Cloud","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/terraform/going-to-the-cloud","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"},{"label":"Terraform","emoji":"1f3dd"}]},{"id":"E32FIibbB8CzcKXwEv0O","title":"Hybrid Deployment","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/terraform/hybrid-deployment","siteSpaceId":"sitesp_VijvU","description":"On-Prem + Cloud Deployment","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"},{"label":"Terraform","emoji":"1f3dd"}]},{"id":"2YhQD1VaiJUGtzAIU4xO","title":"Pulumi","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/pulumi","siteSpaceId":"sitesp_VijvU","emoji":"1f9ca","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"}]},{"id":"Pueh7IUMc0s5lgVp7qfO","title":"Ansible","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-as-code/ansible","siteSpaceId":"sitesp_VijvU","emoji":"1f3bc","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure as Code","emoji":"1fa84"}]},{"id":"vOtC0kJoOjDFuaSL0CbG","title":"Infrastructure Automation","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-automation","siteSpaceId":"sitesp_VijvU","emoji":"2699","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"}]},{"id":"tNDC67EvlnHWS68Vo9aD","title":"Structuring our Project","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-automation/structuring-our-project","siteSpaceId":"sitesp_VijvU","emoji":"1f9b4","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure Automation","emoji":"2699"}]},{"id":"nWAEjDUCdD0oq8duPJrX","title":"Automating Server Setups","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-automation/automating-server-setups","siteSpaceId":"sitesp_VijvU","emoji":"1f3ed","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure Automation","emoji":"2699"}]},{"id":"z9QOVsBqhznYt6kPAnjt","title":"Orchestrating our Infrastructure","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-automation/orchestrating-our-infrastructure","siteSpaceId":"sitesp_VijvU","emoji":"1f3bc","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure Automation","emoji":"2699"}]},{"id":"oy9NnWC9LFVqRKgN1C9r","title":"CI/CD Integration","pathname":"/offensive-security/red-team/offensive-development/infrastructure-development-wip/infrastructure-automation/ci-cd-integration","siteSpaceId":"sitesp_VijvU","emoji":"1f527","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Offensive Development","emoji":"1f3ed"},{"label":"Infrastructure Development (WIP)","emoji":"1f3d7"},{"label":"Infrastructure Automation","emoji":"2699"}]},{"id":"LSnBBcgNRCmRg2IrchAj","title":"Active Directory (WIP)","pathname":"/offensive-security/red-team/active-directory-wip","siteSpaceId":"sitesp_VijvU","emoji":"1f3d9","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"}]},{"id":"4ORJYFeyBeBgVxV0Cbej","title":"Active Directory Overview","pathname":"/offensive-security/red-team/active-directory-wip/active-directory-overview","siteSpaceId":"sitesp_VijvU","description":"A short summary on the different terminologies and technologies that exist in Active Directory","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Active Directory (WIP)","emoji":"1f3d9"}]},{"id":"yf5A3yLSRSyUG6chIJI3","title":"Authentication","pathname":"/offensive-security/red-team/active-directory-wip/authentication","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Active Directory (WIP)","emoji":"1f3d9"}]},{"id":"10BKjjVDxpXqqAswXpDy","title":"AD Lab","pathname":"/offensive-security/red-team/active-directory-wip/ad-lab","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"Offensive Security","emoji":"2694"},{"label":"Red Team","emoji":"1f977"},{"label":"Active Directory (WIP)","emoji":"1f3d9"}]},{"id":"X4RDC34ONehrAVD3JwRH","title":"Disclaimer","pathname":"/software-defined-radios/disclaimer","siteSpaceId":"sitesp_VijvU","emoji":"26a0","description":"","breadcrumbs":[{"label":"Software Defined Radios","emoji":"1f4fb"}]},{"id":"s8XDYLGhX9rPqJvB87RJ","title":"Baofeng","pathname":"/software-defined-radios/baofeng","siteSpaceId":"sitesp_VijvU","emoji":"1f4e1","description":"","breadcrumbs":[{"label":"Software Defined Radios","emoji":"1f4fb"}]},{"id":"pT6dqd7mGrfeFkVoP6Qs","title":"Programming","pathname":"/software-defined-radios/baofeng/programming","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Software Defined Radios","emoji":"1f4fb"},{"label":"Baofeng","emoji":"1f4e1"}]},{"id":"NAY4BTdc6yooDnXESTzk","title":"Virtualisation","pathname":"/home-lab/virtualisation","siteSpaceId":"sitesp_VijvU","emoji":"1f4a8","description":"","breadcrumbs":[{"label":"Home Lab","emoji":"1f9d1-1f52c"}]},{"id":"NDfVZVe3mg4kJT0c9fda","title":"Proxmox","pathname":"/home-lab/virtualisation/proxmox","siteSpaceId":"sitesp_VijvU","emoji":"1f538","description":"Couple of resources to help you out with Proxmox","breadcrumbs":[{"label":"Home Lab","emoji":"1f9d1-1f52c"},{"label":"Virtualisation","emoji":"1f4a8"}]},{"id":"tt4e0euZwKhKbRDy5PHv","title":"HackTheBox","pathname":"/capture-the-flag/hackthebox","siteSpaceId":"sitesp_VijvU","emoji":"1f9ca","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"}]},{"id":"BU3BKelrR6XtvILW8kFi","title":"Cyber Apocalypse","pathname":"/capture-the-flag/hackthebox/cyber-apocalypse","siteSpaceId":"sitesp_VijvU","emoji":"1f47e","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"HackTheBox","emoji":"1f9ca"}]},{"id":"sJtHrPK61Fa1fswwvPpk","title":"Cyber Apocalypse 2023","pathname":"/capture-the-flag/hackthebox/cyber-apocalypse/cyber-apocalypse-2023","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"HackTheBox","emoji":"1f9ca"},{"label":"Cyber Apocalypse","emoji":"1f47e"}]},{"id":"28bThXVND7cS7FtFhcKl","title":"TryHackMe","pathname":"/capture-the-flag/tryhackme","siteSpaceId":"sitesp_VijvU","emoji":"1f424","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"}]},{"id":"IMfiNgmatdbHt13gYdnG","title":"Advent of Code","pathname":"/capture-the-flag/tryhackme/advent-of-code","siteSpaceId":"sitesp_VijvU","emoji":"1f384","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"TryHackMe","emoji":"1f424"}]},{"id":"cCAfCpLrQP9W018M2cQB","title":"Rooms","pathname":"/capture-the-flag/tryhackme/rooms","siteSpaceId":"sitesp_VijvU","emoji":"1f6aa","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"TryHackMe","emoji":"1f424"}]},{"id":"PcWOfSGxq8na6Z291ABh","title":"Basic Pentesting","pathname":"/capture-the-flag/tryhackme/rooms/basic-pentesting","siteSpaceId":"sitesp_VijvU","emoji":"1f425","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"TryHackMe","emoji":"1f424"},{"label":"Rooms","emoji":"1f6aa"}]},{"id":"03RrJDowGfqyZlclGBC1","title":"Blog","pathname":"/capture-the-flag/tryhackme/rooms/blog","siteSpaceId":"sitesp_VijvU","emoji":"1f468-1f4bb","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"TryHackMe","emoji":"1f424"},{"label":"Rooms","emoji":"1f6aa"}]},{"id":"OvWqc5MvUQ3cyIo49c7u","title":"Paths","pathname":"/capture-the-flag/tryhackme/paths","siteSpaceId":"sitesp_VijvU","emoji":"1f45f","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"TryHackMe","emoji":"1f424"}]},{"id":"uPJDEZCB7DNufstv4yB7","title":"Competitions","pathname":"/capture-the-flag/competitions","siteSpaceId":"sitesp_VijvU","emoji":"1f3f3","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"}]},{"id":"vXdOidf96PGamlnCitKD","title":"Nahamcon","pathname":"/capture-the-flag/competitions/nahamcon","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"Competitions","emoji":"1f3f3"}]},{"id":"vf3SLOlHYR1ehBZb4ViQ","title":"Nahamcon 2023","pathname":"/capture-the-flag/competitions/nahamcon/nahamcon-2023","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"Competitions","emoji":"1f3f3"},{"label":"Nahamcon"}]},{"id":"vCIPnhBVGokY62uCHTrn","title":"Binary Exploitation","pathname":"/capture-the-flag/competitions/nahamcon/nahamcon-2023/binary-exploitation","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"Competitions","emoji":"1f3f3"},{"label":"Nahamcon"},{"label":"Nahamcon 2023"}]},{"id":"LBw6qPfHLpMIJU94ZHNI","title":"Open Sesame","pathname":"/capture-the-flag/competitions/nahamcon/nahamcon-2023/binary-exploitation/open-sesame","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"Competitions","emoji":"1f3f3"},{"label":"Nahamcon"},{"label":"Nahamcon 2023"},{"label":"Binary Exploitation"}]},{"id":"bgHxLzGwb2a3lnJwZzJ6","title":"Iris CTF","pathname":"/capture-the-flag/competitions/iris-ctf","siteSpaceId":"sitesp_VijvU","emoji":"1f441","description":"","breadcrumbs":[{"label":"Capture The Flag","emoji":"1f3c1"},{"label":"Competitions","emoji":"1f3f3"}]},{"id":"Cup1T7WFelrJxeB7iC9Q","title":"GS","pathname":"/drafts/gs","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"}]},{"id":"flYosMtc3bW83MlfRVue","title":"Mobile Application Security","pathname":"/drafts/gs/mobile-application-security","siteSpaceId":"sitesp_VijvU","emoji":"1f4f1","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"3oq5hnR2vxu52uqjsvBs","title":"Reverse Engineering","pathname":"/drafts/gs/reverse-engineering","siteSpaceId":"sitesp_VijvU","emoji":"1f468-1f52c","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"ABzvuwRiF4vVrmelFeaC","title":"Web Application Security","pathname":"/drafts/gs/web-application-security","siteSpaceId":"sitesp_VijvU","emoji":"1f310","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"q4rpIO6kgKNEXXapuvPH","title":"Information Security","pathname":"/drafts/gs/information-security","siteSpaceId":"sitesp_VijvU","emoji":"1f4cc","description":"Introduction to Information security and all the boring stuff","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"2JKTBr3UKyI0xOl1w7Fy","title":"Cryptography","pathname":"/drafts/gs/cryptography","siteSpaceId":"sitesp_VijvU","emoji":"1f512","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"uEjjnAiQDNgIBhjclqTA","title":"Operational Security","pathname":"/drafts/gs/operational-security","siteSpaceId":"sitesp_VijvU","emoji":"1f92b","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"GS"}]},{"id":"ioQXEW8lnNKeh5oI0SCl","title":"DS","pathname":"/drafts/ds","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"}]},{"id":"gxtPtNho2RhbHx9DpiZ0","title":"Threat Intelligence","pathname":"/drafts/ds/threat-intelligence","siteSpaceId":"sitesp_VijvU","emoji":"1f9e0","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"}]},{"id":"MTv6LwreKdZ5mh6aXyi2","title":"ELK Stack","pathname":"/drafts/ds/threat-intelligence/elk-stack","siteSpaceId":"sitesp_VijvU","emoji":"1f98c","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Threat Intelligence","emoji":"1f9e0"}]},{"id":"q296mZOMu8KPgFls2pcp","title":"Elasticsearch","pathname":"/drafts/ds/threat-intelligence/elk-stack/elasticsearch","siteSpaceId":"sitesp_VijvU","emoji":"1f938","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Threat Intelligence","emoji":"1f9e0"},{"label":"ELK Stack","emoji":"1f98c"}]},{"id":"pCN13grMbuhFruBZCSnI","title":"Kibana","pathname":"/drafts/ds/threat-intelligence/elk-stack/kibana","siteSpaceId":"sitesp_VijvU","emoji":"1f3d5","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Threat Intelligence","emoji":"1f9e0"},{"label":"ELK Stack","emoji":"1f98c"}]},{"id":"mTzm14Uw0VRis6ORtBP5","title":"SELKS","pathname":"/drafts/ds/threat-intelligence/elk-stack/selks","siteSpaceId":"sitesp_VijvU","emoji":"1f9a4","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Threat Intelligence","emoji":"1f9e0"},{"label":"ELK Stack","emoji":"1f98c"}]},{"id":"lWElfs8YcFDBMZwZTRAB","title":"Yara","pathname":"/drafts/ds/threat-intelligence/yara","siteSpaceId":"sitesp_VijvU","emoji":"1f693","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Threat Intelligence","emoji":"1f9e0"}]},{"id":"oqBndjqMebpEcF4801FQ","title":"Threat Hunting","pathname":"/drafts/ds/threat-hunting","siteSpaceId":"sitesp_VijvU","emoji":"1f3f9","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"}]},{"id":"5b2OtiHe3hwRJ8DzHIJV","title":"Malware Analysis","pathname":"/drafts/ds/malware-analysis","siteSpaceId":"sitesp_VijvU","emoji":"1f9ec","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"}]},{"id":"2SYwkIdUTdZcvyIy8oov","title":"Fundamentals","pathname":"/drafts/ds/malware-analysis/fundamentals","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Malware Analysis","emoji":"1f9ec"}]},{"id":"XOvL2LDEyNzapWM6un0U","title":"Forensics","pathname":"/drafts/ds/forensics","siteSpaceId":"sitesp_VijvU","emoji":"1f52c","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"}]},{"id":"ETwNmqVok4aNjZMiFKD9","title":"Network Forensics","pathname":"/drafts/ds/forensics/network-forensics","siteSpaceId":"sitesp_VijvU","emoji":"1f4f6","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"}]},{"id":"M4WmAmHJPJhZmNjGh2Mz","title":"Wireshark","pathname":"/drafts/ds/forensics/network-forensics/wireshark","siteSpaceId":"sitesp_VijvU","emoji":"1f988","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"},{"label":"Network Forensics","emoji":"1f4f6"}]},{"id":"YXPyI3W7hkN9HC9h2yQq","title":"TCP Dump","pathname":"/drafts/ds/forensics/network-forensics/tcp-dump","siteSpaceId":"sitesp_VijvU","emoji":"1f95f","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"},{"label":"Network Forensics","emoji":"1f4f6"}]},{"id":"yDIWMTXHzK3LKD1diKWG","title":"Memory Forensics","pathname":"/drafts/ds/forensics/memory-forensics","siteSpaceId":"sitesp_VijvU","emoji":"1f4be","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"}]},{"id":"KqCfjedSwamigIc1zOMB","title":"Volatility","pathname":"/drafts/ds/forensics/memory-forensics/volatility","siteSpaceId":"sitesp_VijvU","emoji":"26a1","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"},{"label":"Memory Forensics","emoji":"1f4be"}]},{"id":"mt67P8ja9yJxVN1mrVQn","title":"Disk Forensics","pathname":"/drafts/ds/forensics/disk-forensics","siteSpaceId":"sitesp_VijvU","emoji":"1f4bd","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"}]},{"id":"Gg6qcdGKL6Gy2hGf1ADM","title":"Autopsy","pathname":"/drafts/ds/forensics/disk-forensics/autopsy","siteSpaceId":"sitesp_VijvU","emoji":"1f415","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"},{"label":"Disk Forensics","emoji":"1f4bd"}]},{"id":"mAVjP8GRuDphOmQxXjci","title":"Windows Forensics","pathname":"/drafts/ds/forensics/windows-forensics","siteSpaceId":"sitesp_VijvU","emoji":"1fa9f","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"}]},{"id":"sZDCToAuhocWWJ7JflQu","title":"Linux Forensics","pathname":"/drafts/ds/forensics/linux-forensics","siteSpaceId":"sitesp_VijvU","emoji":"1f427","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Forensics","emoji":"1f52c"}]},{"id":"MPekcfGLtgpfIC918S5w","title":"Security Operations","pathname":"/drafts/ds/security-operations","siteSpaceId":"sitesp_VijvU","emoji":"1f332","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"}]},{"id":"q38xyu248rn6LMLobM1q","title":"Intrusion Detection & Prevention","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"}]},{"id":"mf1EwMWRZQhPmgudx7v0","title":"Splunk","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk","siteSpaceId":"sitesp_VijvU","emoji":"1f41b","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"}]},{"id":"kz2xAJSYX4prajawLcgC","title":"Splunk Basics","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk/splunk-basics","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"},{"label":"Splunk","emoji":"1f41b"}]},{"id":"L33BqxyhOyuAuu18LgBh","title":"Integrating Suricata with Splunk","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk/integrating-suricata-with-splunk","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"},{"label":"Splunk","emoji":"1f41b"}]},{"id":"mLqIzgm0Dbln7z6AOij7","title":"Suricata","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/suricata","siteSpaceId":"sitesp_VijvU","emoji":"1f417","description":"Suricata Intrusion Detection System","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"}]},{"id":"ded6kbANTNGSeHGwYrpq","title":"Intro to Suricata","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/suricata/intro-to-suricata","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"},{"label":"Suricata","emoji":"1f417"}]},{"id":"eQsZWkAvjptOm6MJfmUl","title":"Snort","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/snort","siteSpaceId":"sitesp_VijvU","emoji":"1f43d","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"}]},{"id":"AKGxP5cecyshozWvOdjn","title":"Snort Basics","pathname":"/drafts/ds/security-operations/intrusion-detection-and-prevention/snort/snort-basics","siteSpaceId":"sitesp_VijvU","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"},{"label":"Intrusion Detection & Prevention"},{"label":"Snort","emoji":"1f43d"}]},{"id":"t318EUORnUHRd3vVtluq","title":"Security Information and Event Management (SIEM)","pathname":"/drafts/ds/security-operations/security-information-and-event-management-siem","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"}]},{"id":"SK8U6yuawku7RwlkmcGo","title":"Security Orchestration, Automation and Response (SOAR)","pathname":"/drafts/ds/security-operations/security-orchestration-automation-and-response-soar","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"DS"},{"label":"Security Operations","emoji":"1f332"}]},{"id":"bMaTJygEkNgMlRX9YQYY","title":"HL","pathname":"/drafts/hl","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"}]},{"id":"siZxzETa6ZAGyf3bNPTX","title":"Hardware","pathname":"/drafts/hl/hardware","siteSpaceId":"sitesp_VijvU","emoji":"1f5a5","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"HL"}]},{"id":"wCmVf9X1Eggi7T0T8lt3","title":"OS","pathname":"/drafts/os","siteSpaceId":"sitesp_VijvU","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"}]},{"id":"znstXIcyNkRywNUYOhbu","title":"Network Exploitation","pathname":"/drafts/os/network-exploitation","siteSpaceId":"sitesp_VijvU","emoji":"1f4f6","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"OS"}]},{"id":"ERcMeusI6RnTeWL3EfVm","title":"Cloud Exploitation","pathname":"/drafts/os/cloud-exploitation","siteSpaceId":"sitesp_VijvU","emoji":"1f329","description":"","breadcrumbs":[{"label":"DRAFTS","emoji":"1f9ba"},{"label":"OS"}]}]}