Translator
|
03d9c67a7c
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-08-18 18:40:53 +00:00 |
|
Translator
|
51b5524250
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-08-18 12:45:06 +00:00 |
|
Translator
|
0c70c0632d
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-14 02:48:27 +00:00 |
|
Translator
|
d8ed3ba7a6
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-08-05 03:14:19 +00:00 |
|
Translator
|
f148b34369
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-08-04 12:14:06 +00:00 |
|
Translator
|
4e1785dced
|
Translated ['src/AI/AI-Unsupervised-Learning-Algorithms.md', 'src/binary
|
2025-07-31 10:41:41 +00:00 |
|
Translator
|
a97b9634b0
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-30 04:48:47 +00:00 |
|
Translator
|
086b5655a0
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-28 10:13:09 +00:00 |
|
Translator
|
3fb276d75c
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-24 16:11:45 +00:00 |
|
Translator
|
0ffcfdf8fb
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-24 14:14:00 +00:00 |
|
Translator
|
85394a63e0
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 14:11:52 +00:00 |
|
Translator
|
a66a2e25c7
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-23 09:14:54 +00:00 |
|
Translator
|
59c23b8ba3
|
Translated ['src/AI/AI-Models-RCE.md', 'src/binary-exploitation/chrome-e
|
2025-07-22 11:47:08 +00:00 |
|
Translator
|
9c8a57fc16
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-07-18 18:09:44 +00:00 |
|
Translator
|
a2e21f5e25
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-16 06:11:23 +00:00 |
|
Translator
|
5031e65a6e
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 17:14:11 +00:00 |
|
Translator
|
b2ea9cba5d
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/ena
|
2025-07-15 10:46:47 +00:00 |
|
Translator
|
94d42ebf06
|
Translated ['src/generic-methodologies-and-resources/pentesting-wifi/REA
|
2025-07-13 18:11:20 +00:00 |
|
Translator
|
d99cd5a9c7
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-13 02:49:37 +00:00 |
|
Translator
|
d9159bcc5c
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-12 15:26:38 +00:00 |
|
Translator
|
4275643de1
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-12 11:25:10 +00:00 |
|
Translator
|
a21ccc96f4
|
Translated ['src/generic-methodologies-and-resources/basic-forensic-meth
|
2025-07-10 12:28:34 +00:00 |
|
Translator
|
d795738d24
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-07-08 19:26:56 +00:00 |
|
Translator
|
29008c75bf
|
Translated ['src/AI/AI-llm-architecture/0.-basic-llm-concepts.md', 'src/
|
2025-07-08 13:04:23 +00:00 |
|
Translator
|
860718e449
|
Translated ['src/generic-methodologies-and-resources/pentesting-network/
|
2025-05-11 15:15:49 +00:00 |
|
Translator
|
e08f089893
|
Translated ['src/README.md', 'src/generic-methodologies-and-resources/pe
|
2025-04-27 21:44:13 +00:00 |
|
Translator
|
b6fde524ac
|
Translated ['src/generic-methodologies-and-resources/phishing-methodolog
|
2025-04-27 16:32:38 +00:00 |
|
Translator
|
3538ed8a0c
|
Translated ['src/generic-methodologies-and-resources/pentesting-methodol
|
2025-04-19 17:12:00 +00:00 |
|
Translator
|
f6e71674c1
|
Translated ['src/backdoors/salseo.md', 'src/binary-exploitation/rop-retu
|
2025-04-07 02:19:52 +00:00 |
|
Translator
|
b938f06e4f
|
Translated ['src/generic-methodologies-and-resources/external-recon-meth
|
2025-03-29 22:58:33 +00:00 |
|
Translator
|
68e907363e
|
Translated ['src/generic-hacking/reverse-shells/windows.md', 'src/generi
|
2025-02-04 18:44:07 +00:00 |
|
Translator
|
8fc207d07c
|
Translated ['src/generic-methodologies-and-resources/external-recon-meth
|
2025-01-26 15:23:22 +00:00 |
|
Translator
|
6d86ecc406
|
Translated ['src/binary-exploitation/arbitrary-write-2-exec/aw2exec-__ma
|
2025-01-05 22:22:59 +00:00 |
|
Translator
|
71e43716fd
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-01-05 21:00:33 +00:00 |
|
Translator
|
4070714b4f
|
Translated ['src/generic-methodologies-and-resources/python/bypass-pytho
|
2025-01-05 16:13:20 +00:00 |
|
Translator
|
ab49e3c604
|
Translated ['src/binary-exploitation/arbitrary-write-2-exec/aw2exec-got-
|
2025-01-04 13:08:44 +00:00 |
|
Translator
|
9280ec8093
|
Translated ['src/binary-exploitation/basic-stack-binary-exploitation-met
|
2025-01-04 02:34:57 +00:00 |
|
Translator
|
f989307701
|
Translated ['src/README.md', 'src/binary-exploitation/rop-return-oriente
|
2025-01-03 18:12:13 +00:00 |
|
Translator
|
e05af755e9
|
Translated ['src/LICENSE.md', 'src/README.md', 'src/android-forensics.md
|
2025-01-03 12:37:18 +00:00 |
|
Congon4tor
|
afa74040cb
|
Migrate to using mdbook
|
2024-12-31 20:39:32 +01:00 |
|