Translator
|
0727e9e1be
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-09-07 22:17:29 +00:00 |
|
Translator
|
0e5df77e95
|
Translated ['', 'src/generic-methodologies-and-resources/pentesting-netw
|
2025-09-07 20:10:36 +00:00 |
|
Translator
|
b06287dae8
|
Translated ['', 'src/generic-methodologies-and-resources/pentesting-netw
|
2025-09-07 18:17:20 +00:00 |
|
Translator
|
df4acba3a3
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-09-04 09:31:14 +00:00 |
|
Translator
|
36486660fd
|
Fix unmatched refs
|
2025-09-04 09:17:10 +00:00 |
|
Translator
|
495c3534e9
|
Translated ['src/mobile-pentesting/android-app-pentesting/smali-changes.
|
2025-09-04 02:39:59 +00:00 |
|
Translator
|
fac91cfc2c
|
Translated ['', 'src/windows-hardening/active-directory-methodology/kerb
|
2025-09-04 00:57:09 +00:00 |
|
Translator
|
836b8a288a
|
Translated ['', 'src/generic-methodologies-and-resources/basic-forensic-
|
2025-09-03 20:10:19 +00:00 |
|
Translator
|
af452cea88
|
Translated ['src/windows-hardening/windows-local-privilege-escalation/pr
|
2025-09-03 11:35:22 +00:00 |
|
Translator
|
c0fbd3274b
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-09-03 10:48:20 +00:00 |
|
Translator
|
b18c180b64
|
Translated ['', 'src/generic-methodologies-and-resources/phishing-method
|
2025-08-29 12:23:34 +00:00 |
|
Translator
|
8345859139
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-28 22:43:53 +00:00 |
|
Translator
|
5e42ed1dea
|
Translated ['', 'src/generic-methodologies-and-resources/python/bypass-p
|
2025-08-28 12:46:52 +00:00 |
|
Translator
|
4e71d7868a
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-08-28 10:26:54 +00:00 |
|
Translator
|
910bb37804
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-26 20:10:37 +00:00 |
|
Translator
|
4f6aa61504
|
Translated ['src/generic-methodologies-and-resources/python/keras-model-
|
2025-08-22 00:21:33 +00:00 |
|
Translator
|
e33e199cf9
|
Translated ['', 'src/pentesting-web/deserialization/README.md', 'src/gen
|
2025-08-22 00:12:14 +00:00 |
|
Translator
|
04a7148fa2
|
Translated ['src/macos-hardening/macos-security-and-privilege-escalation
|
2025-08-21 21:39:48 +00:00 |
|
Translator
|
ca67b7b1a2
|
Translated ['', 'src/generic-methodologies-and-resources/basic-forensic-
|
2025-08-21 02:33:55 +00:00 |
|
Translator
|
ca28c502ab
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-20 11:32:30 +00:00 |
|
Translator
|
8bee3e5ec4
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-20 10:32:24 +00:00 |
|
Translator
|
2da2f5470f
|
Translated ['src/generic-methodologies-and-resources/python/pyscript.md'
|
2025-08-20 02:59:58 +00:00 |
|
Translator
|
d74ff76051
|
Translated ['src/generic-methodologies-and-resources/python/README.md',
|
2025-08-19 21:31:34 +00:00 |
|
Translator
|
d14b334e00
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-19 18:21:47 +00:00 |
|
Translator
|
3d30ddec07
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-08-19 09:58:20 +00:00 |
|
Translator
|
80b1de60d1
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-08-18 18:42:10 +00:00 |
|
Translator
|
f43364d743
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-18 12:41:58 +00:00 |
|
Translator
|
f9726ab176
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-14 02:48:26 +00:00 |
|
Translator
|
3ad368b013
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-05 03:14:50 +00:00 |
|
Translator
|
dd50bb6c02
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-04 12:14:10 +00:00 |
|
Translator
|
d07134931a
|
Translated ['src/AI/AI-Unsupervised-Learning-Algorithms.md', 'src/binary
|
2025-07-31 10:44:47 +00:00 |
|
Translator
|
87f49ea818
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-30 04:48:00 +00:00 |
|
Translator
|
34ead8b62e
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-28 10:13:58 +00:00 |
|
Translator
|
411573fa02
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-24 16:11:47 +00:00 |
|
Translator
|
250e4d2a02
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-24 14:14:54 +00:00 |
|
Translator
|
0c77a8afca
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 14:12:43 +00:00 |
|
Translator
|
11f6d55daa
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 09:16:21 +00:00 |
|
Translator
|
a430fcd6e5
|
Translated ['src/AI/AI-Models-RCE.md', 'src/binary-exploitation/chrome-e
|
2025-07-22 11:50:24 +00:00 |
|
Translator
|
d1d4ffe4f9
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-18 18:09:55 +00:00 |
|
Translator
|
6164e18920
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-16 06:11:54 +00:00 |
|
Translator
|
d1be7c87cd
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 17:16:11 +00:00 |
|
Translator
|
a5a3990c3c
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 10:46:42 +00:00 |
|
Translator
|
0bf3f42e4d
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/REA
|
2025-07-13 18:13:24 +00:00 |
|
Translator
|
569c1dce41
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-13 02:49:41 +00:00 |
|
Translator
|
faff2a8143
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-12 15:26:51 +00:00 |
|
Translator
|
b41fe8ca25
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-12 11:27:36 +00:00 |
|
Translator
|
a1993e963a
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-10 12:30:50 +00:00 |
|
Translator
|
3591511bb9
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-08 19:26:38 +00:00 |
|
Translator
|
4a635cc716
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-08 13:12:01 +00:00 |
|
Translator
|
9a28c87778
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-05-11 15:15:19 +00:00 |
|