Translator
|
0b467d2ebc
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-09-30 22:40:00 +00:00 |
|
Translator
|
c90c51b131
|
Translated ['', 'src/windows-hardening/ntlm/places-to-steal-ntlm-creds.m
|
2025-09-30 04:39:55 +00:00 |
|
Translator
|
8daeabb02a
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-09-29 23:31:52 +00:00 |
|
Translator
|
832c23bf05
|
Translated ['src/generic-hacking/reverse-shells/windows.md', 'src/generi
|
2025-09-29 13:28:50 +00:00 |
|
Translator
|
6ede05236d
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-09-29 11:09:12 +00:00 |
|
Translator
|
edeb460c89
|
Translated ['src/windows-hardening/active-directory-methodology/ad-certi
|
2025-09-07 22:17:44 +00:00 |
|
Translator
|
4ac278d8cd
|
Translated ['', 'src/macos-hardening/macos-security-and-privilege-escala
|
2025-08-29 12:23:04 +00:00 |
|
Translator
|
2c071baaa4
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-28 22:47:07 +00:00 |
|
Translator
|
7294d929f8
|
Translated ['', 'src/pentesting-web/deserialization/README.md', 'src/pen
|
2025-08-22 00:11:14 +00:00 |
|
Translator
|
92c828ea2e
|
Translated ['', 'src/binary-exploitation/rop-return-oriented-programing/
|
2025-08-21 20:41:34 +00:00 |
|
Translator
|
fecffa48f5
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-21 16:00:00 +00:00 |
|
Translator
|
d8ed3ba7a6
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-05 03:14:19 +00:00 |
|
Translator
|
086b5655a0
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-28 10:13:09 +00:00 |
|
Translator
|
0ffcfdf8fb
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-24 14:14:00 +00:00 |
|
Translator
|
a2e21f5e25
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-16 06:11:23 +00:00 |
|
Translator
|
d9159bcc5c
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-12 15:26:38 +00:00 |
|
Translator
|
4275643de1
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-12 11:25:10 +00:00 |
|
Translator
|
d795738d24
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-08 19:26:56 +00:00 |
|
Translator
|
b6fde524ac
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-04-27 16:32:38 +00:00 |
|
Translator
|
68e907363e
|
Translated ['src/generic-hacking/reverse-shells/windows.md', 'src/generi
|
2025-02-04 18:44:07 +00:00 |
|
Translator
|
71e43716fd
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-01-05 21:00:33 +00:00 |
|
Translator
|
9280ec8093
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-01-04 02:34:57 +00:00 |
|
Translator
|
e05af755e9
|
Translated ['src/LICENSE.md', 'src/README.md', 'src/android-forensics.md
|
2025-01-03 12:37:18 +00:00 |
|
Congon4tor
|
afa74040cb
|
Migrate to using mdbook
|
2024-12-31 20:39:32 +01:00 |
|