{"version":1,"pages":[{"id":"-MlE1Imp9mg4lf4hcSpl","title":"Home","pathname":"/","siteSpaceId":"sitesp_hAfyC","description":""},{"id":"Qa5qyYZ4hjWbRI56sukB","title":"AI","pathname":"/so/ai","siteSpaceId":"sitesp_hAfyC","breadcrumbs":[{"label":"SO"}]},{"id":"ON8HNOohofi4vvI0pmxT","title":"Evasion","pathname":"/so/ai/evasion","siteSpaceId":"sitesp_hAfyC","description":"This is an attack in which an attacker perturbs an input such that a model produces an incorrect output (for example: this photo of a dog is now classified as a corkscrew)","breadcrumbs":[{"label":"SO"},{"label":"AI"}]},{"id":"2gZ533jylO70XlANlb0j","title":"Exercise 1","pathname":"/so/ai/evasion/exercise-1","siteSpaceId":"sitesp_hAfyC","description":"\"Evasion\" with random noise","breadcrumbs":[{"label":"SO"},{"label":"AI"},{"label":"Evasion"}]},{"id":"mSe3Mshgw4YUE35fCh5m","title":"Exercise 2","pathname":"/so/ai/evasion/exercise-2","siteSpaceId":"sitesp_hAfyC","description":"Carlini L2 Attack","breadcrumbs":[{"label":"SO"},{"label":"AI"},{"label":"Evasion"}]},{"id":"XvrcpyJkxbRGzBy2WPWs","title":"Exercise 3","pathname":"/so/ai/evasion/exercise-3","siteSpaceId":"sitesp_hAfyC","description":"Carlini L2 Attack","breadcrumbs":[{"label":"SO"},{"label":"AI"},{"label":"Evasion"}]},{"id":"z1oUTeuwVCaL7cYg0opW","title":"Exercise 4","pathname":"/so/ai/evasion/exercise-4","siteSpaceId":"sitesp_hAfyC","description":"SimBA (Simple Black-bot Adversarial Attack)","breadcrumbs":[{"label":"SO"},{"label":"AI"},{"label":"Evasion"}]},{"id":"lhTIxoHPAQKsiZNg1ngL","title":"Android","pathname":"/so/android","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"}]},{"id":"08Du3BM43LrjFNpot6ep","title":"adb","pathname":"/so/android/adb","siteSpaceId":"sitesp_hAfyC","description":"Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"w1PWw8SizPQjnA3cEYEx","title":"apktool","pathname":"/so/android/apktool","siteSpaceId":"sitesp_hAfyC","description":"Tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"TatzDK8kFD6U8QfUnIpJ","title":"burp suite","pathname":"/so/android/burp-suite","siteSpaceId":"sitesp_hAfyC","description":"The class-leading vulnerability scanning, penetration testing, and web app security platform.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"HMUv6EaE2IMAAXlmpF0k","title":"dns spoofing","pathname":"/so/android/dns-spoofing","siteSpaceId":"sitesp_hAfyC","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"NxSAu5yGDzJmp5iVhH9p","title":"frida","pathname":"/so/android/frida","siteSpaceId":"sitesp_hAfyC","description":"Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"xXF7zQRsfyutUHrm4Bt9","title":"intent","pathname":"/so/android/intent","siteSpaceId":"sitesp_hAfyC","description":"A messaging object you can use to request an action from another app component.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"IjVpX0IXO0Jnyfrbkmmq","title":"jadx","pathname":"/so/android/jadx","siteSpaceId":"sitesp_hAfyC","description":"Dex to Java decompiler.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"ubpueG6iuBuGFbyJbglw","title":"JNI","pathname":"/so/android/jni","siteSpaceId":"sitesp_hAfyC","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"3JojnSKt0wj6XYmhoWgj","title":"objection","pathname":"/so/android/objection","siteSpaceId":"sitesp_hAfyC","description":"Objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"nP9DsCa9FVd596gqZlvg","title":"tcpdump","pathname":"/so/android/tcpdump","siteSpaceId":"sitesp_hAfyC","description":"A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"yR85lcrvvwMRWRPzhU1z","title":"webview","pathname":"/so/android/webview","siteSpaceId":"sitesp_hAfyC","description":"A View that displays web pages.","breadcrumbs":[{"label":"SO"},{"label":"Android"}]},{"id":"aIabZs0bqaN5HNMwW2qt","title":"iOS","pathname":"/so/ios","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"}]},{"id":"ZHSknyYV6RvKZJsmhL9P","title":"objection","pathname":"/so/ios/objection","siteSpaceId":"sitesp_hAfyC","description":"Objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.","breadcrumbs":[{"label":"SO"},{"label":"iOS"}]},{"id":"-MlEzYhZxZSjVrcCjizz","title":"Linux","pathname":"/so/linux","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"}]},{"id":"-MlF-fE5dh9H23oS3uI8","title":"Internal Recon","pathname":"/so/linux/internal-recon","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlEziJIXaLSXDVrZBbS","title":"Bypasses","pathname":"/so/linux/bypasses","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlEzrfkjsqiKS5EUuRX","title":"Network","pathname":"/so/linux/network","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlF-6hQpsuPnFmIWgt4","title":"Exfiltration","pathname":"/so/linux/exfiltration","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlF-k-0alDzYPgynDaB","title":"Containers","pathname":"/so/linux/containers","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlF-yaNhy9lfbfWYLZK","title":"Iptables","pathname":"/so/linux/iptables","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Linux"}]},{"id":"-MlF1E2DlC1CeOfIIIQF","title":"Windows","pathname":"/so/windows","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"}]},{"id":"-MlF2vneIGaEDs1mnJv8","title":"Internal Recon","pathname":"/so/windows/internal-recon","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Windows"}]},{"id":"-MlF3D8VIf-fPmgMTnPA","title":"External Recon","pathname":"/so/windows/external-recon","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Windows"}]},{"id":"-MlF1SThj1kLbNuEcbvO","title":"Bypasses","pathname":"/so/windows/bypasses","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Windows"}]},{"id":"-MlF1k3xZYj9oGYw3JxB","title":"Network","pathname":"/so/windows/network","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Windows"}]},{"id":"-MlF1skVgQZlG-vJUX0q","title":"Exfiltration","pathname":"/so/windows/exfiltration","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SO"},{"label":"Windows"}]},{"id":"-MlEurA96Ki9Z2Sfihcl","title":"Misc","pathname":"/shells/misc","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SHELLS"}]},{"id":"-MlEuwwaeeKcMZZc_wju","title":"Web Shells","pathname":"/shells/webshells","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SHELLS"}]},{"id":"-MlEvAwBcSkW-LrHfbNP","title":"Reverse Shells","pathname":"/shells/reverse-shells","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SHELLS"}]},{"id":"-MlEwGhiSPJzAzxh5Erl","title":"Obfuscated Shells","pathname":"/shells/obfuscated-shells","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"SHELLS"}]},{"id":"-MlE28alcw5BLyWqubAL","title":"Misc","pathname":"/web-attacks/misc","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlE9zLbckZlipkTyxor","title":"Command Injection","pathname":"/web-attacks/command-injection","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEGNBoRNtY4XuvNvSH","title":"Cross-Site Scripting (XSS)","pathname":"/web-attacks/cross-site-scripting-xss","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEcq9Ewm6yIFb-yR3D","title":"XSS Tips","pathname":"/web-attacks/cross-site-scripting-xss/xss-tips","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"-MlEdQIMLG93e-3zG04-","title":"WAF Bypasses","pathname":"/web-attacks/cross-site-scripting-xss/waf-bypasses","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"mp0pce5PgLFpSOJQTqtJ","title":"Insecure Direct Object Reference (IDOR)","pathname":"/web-attacks/insecure-direct-object-reference-idor","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEGFl0PsDeKQwMOrOG","title":"Insecure File Upload","pathname":"/web-attacks/insecure-file-upload","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEDwqUBqJ8jFaed1dA","title":"Local File Inclusion (LFI)","pathname":"/web-attacks/local-file-inclusion-lfi","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEEfubP-RjyCtQGtdN","title":"Bypass Techniques","pathname":"/web-attacks/local-file-inclusion-lfi/bypass-techniques","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"Local File Inclusion (LFI)"}]},{"id":"-MlEEvDuBZdxxG4P_EeG","title":"LFI to RCE","pathname":"/web-attacks/local-file-inclusion-lfi/lfi-to-rce","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"Local File Inclusion (LFI)"}]},{"id":"-MlGz5xQKeq8oakxIWNr","title":"OAuth","pathname":"/web-attacks/oauth","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlE9XYI8uRHKJJO1QdW","title":"Open Redirect","pathname":"/web-attacks/open-redirect","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlE9ainvXXoa0DbMvoU","title":"Open Redirect to XSS","pathname":"/web-attacks/open-redirect/open-redirect-to-xss","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"Open Redirect"}]},{"id":"-MlFD9wn8ans2v0xeKjF","title":"Server Side Request Forgery (SSRF)","pathname":"/web-attacks/server-side-request-forgery-ssrf","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEGRFceXsll6rnNY-N","title":"Server Side Template Injection (SSTI)","pathname":"/web-attacks/server-side-template-injection-ssti","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEGKyrS-9vwM5PXlej","title":"SQL Injection (SQLi)","pathname":"/web-attacks/sql-injection-sqli","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"EA0kZQgAmYl5xyGe30N3","title":"SQLMap","pathname":"/web-attacks/sql-injection-sqli/sqlmap","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"SQL Injection (SQLi)"}]},{"id":"-MlEGxbr1cAFZHbkP3Xc","title":"MySQL","pathname":"/web-attacks/sql-injection-sqli/mysql","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"SQL Injection (SQLi)"}]},{"id":"-MlEKgGZeCLNHIkEJFx0","title":"MSSQL","pathname":"/web-attacks/sql-injection-sqli/mssql","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"SQL Injection (SQLi)"}]},{"id":"-MlEKatVmZJleGf9whbH","title":"Oracle","pathname":"/web-attacks/sql-injection-sqli/oracle","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"SQL Injection (SQLi)"}]},{"id":"-MlEQRJ-FrSST_6Pxe0A","title":"PostgreSQL","pathname":"/web-attacks/sql-injection-sqli/postgresql","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"},{"label":"SQL Injection (SQLi)"}]},{"id":"-MlEGVl40wwp0aF-t2lN","title":"XML External Entity (XXE)","pathname":"/web-attacks/xml-external-entity-xxe","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"WEB ATTACKS"}]},{"id":"-MlEwxT7vXRF22YFu_H4","title":"Cracking","pathname":"/other/cracking","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"OTHER"}]},{"id":"-MlExPKkanhuQzb2e8fK","title":"Hashcat","pathname":"/other/cracking/hashcat","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"OTHER"},{"label":"Cracking"}]},{"id":"-MlExfkWXtTDH9RO6otW","title":"John the Ripper","pathname":"/other/cracking/john-the-ripper","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"OTHER"},{"label":"Cracking"}]},{"id":"-MlExsTgDQxNvGMo6RxC","title":"Sandbox Escape","pathname":"/other/sandbox","siteSpaceId":"sitesp_hAfyC","description":"","breadcrumbs":[{"label":"OTHER"}]}]}