Translator
|
c5345938ba
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-09-07 22:17:07 +00:00 |
|
Translator
|
eb33c8cc69
|
Translated ['', 'src/generic-methodologies-and-resources/pentesting-netw
|
2025-09-07 20:10:53 +00:00 |
|
Translator
|
44c23d67b4
|
Translated ['', 'src/generic-methodologies-and-resources/pentesting-netw
|
2025-09-07 18:20:12 +00:00 |
|
Translator
|
7da8bbe56a
|
Translated ['src/mobile-pentesting/android-app-pentesting/smali-changes.
|
2025-09-04 09:34:26 +00:00 |
|
Translator
|
7bb3af5f64
|
Fix unmatched refs
|
2025-09-04 09:17:34 +00:00 |
|
Translator
|
c9f8a22a7c
|
Translated ['src/mobile-pentesting/android-app-pentesting/smali-changes.
|
2025-09-04 02:41:08 +00:00 |
|
Translator
|
a0c3118bde
|
Translated ['', 'src/network-services-pentesting/pentesting-web/spring-a
|
2025-09-04 00:58:47 +00:00 |
|
Translator
|
871ad35270
|
Translated ['', 'src/generic-methodologies-and-resources/basic-forensic-
|
2025-09-03 20:10:27 +00:00 |
|
Translator
|
ffc4052630
|
Translated ['src/pentesting-web/web-vulnerabilities-methodology/README.m
|
2025-09-03 11:40:00 +00:00 |
|
Translator
|
a8eb52d171
|
Translated ['src/generic-methodologies-and-resources/lua/bypass-lua-sand
|
2025-09-03 10:51:49 +00:00 |
|
Translator
|
ff97a026fd
|
Translated ['', 'src/windows-hardening/windows-local-privilege-escalatio
|
2025-08-29 12:31:50 +00:00 |
|
Translator
|
8c800bd970
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-28 22:48:59 +00:00 |
|
Translator
|
1410029fc6
|
Translated ['', 'src/generic-methodologies-and-resources/python/bypass-p
|
2025-08-28 12:46:55 +00:00 |
|
Translator
|
1ca3113376
|
Translated ['src/network-services-pentesting/pentesting-web/django.md',
|
2025-08-28 10:27:14 +00:00 |
|
Translator
|
fcbf83e8cb
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-26 20:11:20 +00:00 |
|
Translator
|
319930938f
|
Translated ['src/generic-methodologies-and-resources/python/README.md',
|
2025-08-22 00:23:44 +00:00 |
|
Translator
|
ab2419e1b7
|
Translated ['src/macos-hardening/macos-red-teaming/macos-mdm/README.md',
|
2025-08-22 00:15:16 +00:00 |
|
Translator
|
10297ed042
|
Translated ['src/macos-hardening/macos-security-and-privilege-escalation
|
2025-08-21 21:26:07 +00:00 |
|
Translator
|
199291edf0
|
Translated ['', 'src/generic-methodologies-and-resources/basic-forensic-
|
2025-08-21 02:33:30 +00:00 |
|
Translator
|
bad9842938
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-20 11:32:54 +00:00 |
|
Translator
|
9e7207d618
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-20 10:35:47 +00:00 |
|
Translator
|
4e05a4b2c6
|
Translated ['src/generic-methodologies-and-resources/python/pyscript.md'
|
2025-08-20 02:59:10 +00:00 |
|
Translator
|
29043a20a7
|
Translated ['src/generic-methodologies-and-resources/python/README.md',
|
2025-08-19 21:31:28 +00:00 |
|
Translator
|
1e6ff36078
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-19 16:59:08 +00:00 |
|
Translator
|
27efa2adae
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-08-19 09:26:32 +00:00 |
|
Translator
|
1e92de5a26
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-08-18 18:42:03 +00:00 |
|
Translator
|
b58b1e85e6
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-18 12:39:19 +00:00 |
|
Translator
|
24b5de159a
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-14 02:48:42 +00:00 |
|
Translator
|
ea946a59e3
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-05 03:14:53 +00:00 |
|
Translator
|
2d1eeb03d2
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-04 12:14:59 +00:00 |
|
Translator
|
a8f0917ce7
|
Translated ['src/AI/AI-Unsupervised-Learning-Algorithms.md', 'src/binary
|
2025-07-31 10:41:40 +00:00 |
|
Translator
|
35b4fc441b
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-30 04:46:43 +00:00 |
|
Translator
|
efc8572ad2
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-28 10:12:59 +00:00 |
|
Translator
|
19d293f866
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-24 16:11:42 +00:00 |
|
Translator
|
e012c048a5
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-24 14:14:14 +00:00 |
|
Translator
|
3633634fb2
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 14:11:51 +00:00 |
|
Translator
|
4ef51d8b67
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 09:14:54 +00:00 |
|
Translator
|
6ec640f294
|
Translated ['src/AI/AI-Models-RCE.md', 'src/binary-exploitation/chrome-e
|
2025-07-22 11:48:11 +00:00 |
|
Translator
|
7c4aa905ee
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-18 18:10:05 +00:00 |
|
Translator
|
03e61f3ed8
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-16 06:11:35 +00:00 |
|
Translator
|
b8b3405afb
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 17:15:05 +00:00 |
|
Translator
|
d876575772
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 10:46:37 +00:00 |
|
Translator
|
29eb4e712a
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/REA
|
2025-07-13 18:11:30 +00:00 |
|
Translator
|
039b0fcd73
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-13 02:49:40 +00:00 |
|
Translator
|
a7855c6897
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-12 15:29:17 +00:00 |
|
Translator
|
da3f08028d
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-12 11:25:53 +00:00 |
|
Translator
|
2954a5248f
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-10 12:28:40 +00:00 |
|
Translator
|
25ef2626a3
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-08 19:26:29 +00:00 |
|
Translator
|
ddfc4b0895
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-08 13:06:39 +00:00 |
|
Translator
|
69c46a0a55
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-05-11 15:12:47 +00:00 |
|