{"version":1,"pages":[{"id":"QfeAqGh8CU86TPew7zR1","title":"Martian Defense Notebook","pathname":"/notes","siteSpaceId":"sitesp_pjMAL","description":""},{"id":"yR6LB8zJu24FXE1FwxxE","title":"Keeping it Real for Beginners","pathname":"/notes/training-and-career/keeping-it-real-for-beginners","siteSpaceId":"sitesp_pjMAL","description":"Below are my key considerations and recommendations for being successful in the security space","breadcrumbs":[{"label":"Training and Career"}]},{"id":"WCrWElS3OYe2QHLTYfy0","title":"Cybersecurity Domains","pathname":"/notes/training-and-career/cybersecurity-domains","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Training and Career"}]},{"id":"rfQpbc8P6wtExQZMXu13","title":"Reading and Repos","pathname":"/notes/training-and-career/reading-and-repos","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"}]},{"id":"Y93LbmcFNpK2bRcuM9yV","title":"Media","pathname":"/notes/training-and-career/media","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"}]},{"id":"EGdZkh1OqaJyJqhRWyHp","title":"Guides","pathname":"/notes/training-and-career/guides","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"}]},{"id":"ru805U6L1pwNtxLuP65u","title":"Cybersecurity Roadmaps","pathname":"/notes/training-and-career/guides/cybersecurity-roadmaps","siteSpaceId":"sitesp_pjMAL","description":"This is a general roadmap for learning about cybersecurity. It covers a wide range of topics, from foundational concepts to advanced techniques.","breadcrumbs":[{"label":"Training and Career"},{"label":"Guides"}]},{"id":"MqnVETjbYF5TSsB4HYSJ","title":"Cybersecurity Training Topics","pathname":"/notes/training-and-career/guides/cybersecurity-training-topics","siteSpaceId":"sitesp_pjMAL","description":"This list covers key areas of learning within the field of cybersecurity","breadcrumbs":[{"label":"Training and Career"},{"label":"Guides"}]},{"id":"jdTstkkf7FFOcYsyGCW4","title":"AppSec Training Pathway","pathname":"/notes/training-and-career/guides/appsec-training-pathway","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Guides"}]},{"id":"Awyvp55yRqmOchc1mg7B","title":"Resume and Interview Guide","pathname":"/notes/training-and-career/guides/interview-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Guides"}]},{"id":"gAzOHZGm7HqE1GwIC56A","title":"Exploit & Malware Development","pathname":"/notes/training-and-career/guides/exploit-and-malware-development","siteSpaceId":"sitesp_pjMAL","description":"A Structured Pathway to Mastering Exploits, Reverse Engineering, and Advanced Malware Tactics","breadcrumbs":[{"label":"Training and Career"},{"label":"Guides"}]},{"id":"4Om55kimINl7ZIZMPad3","title":"Platforms","pathname":"/notes/training-and-career/platforms","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"}]},{"id":"6LOhHizQYvg23HDLEVC7","title":"General","pathname":"/notes/training-and-career/platforms/general","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Platforms"}]},{"id":"4rvJRaAI6r0CBt9SOzKC","title":"Offensive Security","pathname":"/notes/training-and-career/platforms/offensive-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Platforms"}]},{"id":"f0kr0hxpuE9p0vTdLoZY","title":"Defensive Security","pathname":"/notes/training-and-career/platforms/defensive-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Platforms"}]},{"id":"QHd00OOqR0Gxkn1PYjuC","title":"CTF Sites","pathname":"/notes/training-and-career/platforms/ctf-sites","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Training and Career"},{"label":"Platforms"}]},{"id":"4Jig4YVOSZSzhGCMUmaR","title":"Live Vulnerable Sites","pathname":"/notes/training-and-career/platforms/live-vulnerable-sites","siteSpaceId":"sitesp_pjMAL","description":"These are deliberately vulnerable web applications used for educational and testing purposes.","breadcrumbs":[{"label":"Training and Career"},{"label":"Platforms"}]},{"id":"E2hNZtyJo5bJWrdD7Q1g","title":"Application Security","pathname":"/notes/resources/appsec","siteSpaceId":"sitesp_pjMAL","description":"Reliable Resources for AppSec","breadcrumbs":[{"label":"Resources"}]},{"id":"q7MkZ0yZzC8TpKZ7LXNU","title":"Recon + OSINT","pathname":"/notes/resources/recon-+-osint","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"5HJPkSNpDTRqY8tYgoBw","title":"Internal Active Recon","pathname":"/notes/resources/recon-+-osint/internal-active-recon","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Resources"},{"label":"Recon + OSINT"}]},{"id":"8GmIvS860PJu6sf8FWdD","title":"Offensive","pathname":"/notes/resources/offensive-cybersecurity","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"rYOM3LRC8do2ijwDz1kb","title":"General","pathname":"/notes/resources/offensive-cybersecurity/general","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"wAuNGcHhV1dGg3XnX1r7","title":"Infrastructure Pentesting","pathname":"/notes/resources/offensive-cybersecurity/infrastructure-pentesting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"I8bB5cNnsjVXmparINva","title":"Cloud Pentesting","pathname":"/notes/resources/offensive-cybersecurity/cloud-pentesting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"dWLBTeP7BcXzZURFddPJ","title":"Wordlists","pathname":"/notes/resources/offensive-cybersecurity/wordlists","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"dleRNM3XWEt0eYmIZmi6","title":"Social Engineering","pathname":"/notes/resources/offensive-cybersecurity/social-engineering","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"sS9rf0cx6rTHUm5hiKEL","title":"Mobile Pentesting","pathname":"/notes/resources/offensive-cybersecurity/mobile-pentesting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"KvUQhtjm7nAvcUtmTm2C","title":"Container Security","pathname":"/notes/resources/offensive-cybersecurity/container-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"gq0dUcEMzNZGpDZOlIhL","title":"Blockchain","pathname":"/notes/resources/offensive-cybersecurity/blockchain","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"7Dl5CHe0KYWQ6nbBNkXX","title":"LLM Pentesting","pathname":"/notes/resources/offensive-cybersecurity/llm-pentesting","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Resources"},{"label":"Offensive"}]},{"id":"qj1yjKNGR7gcVG6EBFn4","title":"Defensive","pathname":"/notes/resources/defensive-cybersecurity","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"w8ywpFTGWTrjqGLxceaz","title":"General Cybersecurity","pathname":"/notes/resources/general-cybersecurity","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"YFkTnO9RDdyxipz3J53D","title":"Cybersecurity Operating Systems","pathname":"/notes/resources/general-cybersecurity/cybersecurity-operating-systems","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"},{"label":"General Cybersecurity"}]},{"id":"qOGCuhr1lYAydJ6wt1Vp","title":"Programming","pathname":"/notes/resources/coding","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"J6J1GW9mbusKt6NLqejS","title":"Reverse Engineering","pathname":"/notes/resources/reverse-engineering","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"P8Eh1oKtJfsotVmwyvxf","title":"AI","pathname":"/notes/resources/ai-and-ml","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Resources"}]},{"id":"DqT87Hy16tMNqBfjEsmb","title":"Product Security Engineering","pathname":"/notes/notes/product-security-engineering","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"s7yCXNhU57KTHdvqXZPg","title":"DevSecOps","pathname":"/notes/notes/product-security-engineering/devsecops","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"7HpGj5nTKh575VLi3vEA","title":"Docker","pathname":"/notes/notes/product-security-engineering/devsecops/docker","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"DevSecOps"}]},{"id":"Sbaeeizrgqqhbe7flewR","title":"How to Dockerize Applications with Docker Compose (Using SQLite and Flask)","pathname":"/notes/notes/product-security-engineering/devsecops/docker/how-to-dockerize-applications-with-docker-compose-using-sqlite-and-flask","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"DevSecOps"},{"label":"Docker"}]},{"id":"hkCW7k6I8GG8VWPI9vFo","title":"SAST/SCA","pathname":"/notes/notes/product-security-engineering/sast-sca","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"h4IoB6pmOld0cEOeA9Dl","title":"How to setup a GitHub Action for Code Security analysis","pathname":"/notes/notes/product-security-engineering/sast-sca/how-to-setup-a-github-action-for-code-security-analysis","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"SAST/SCA"}]},{"id":"isV1NOcgVLVAqxzgT5ZT","title":"JavaScript Security Analysis","pathname":"/notes/notes/product-security-engineering/sast-sca/javascript-security-analysis","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"SAST/SCA"}]},{"id":"SHfld6ElN63xnTaW18D5","title":"Java Security 101","pathname":"/notes/notes/product-security-engineering/sast-sca/java-security-101","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"SAST/SCA"}]},{"id":"J3RmFj29btR27XFrBBMO","title":"Tools","pathname":"/notes/notes/product-security-engineering/sast-sca/static-code-analysis","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"SAST/SCA"}]},{"id":"UvDkZxZZfscPNg2E0zaF","title":"CodeQL for Beginners","pathname":"/notes/notes/product-security-engineering/sast-sca/codeql-for-beginners","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"SAST/SCA"}]},{"id":"F7LdhevE0dqCCYZCZB2t","title":"Product Security Hardening","pathname":"/notes/notes/product-security-engineering/product-security-hardening","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"MPxmw0ZWMCqDm0kMv8tc","title":"Threat Modeling","pathname":"/notes/notes/product-security-engineering/threat-modeling","siteSpaceId":"sitesp_pjMAL","description":"Threat modeling with STRIDE, DREAD and PASTA","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"8L0YDM3sw5FZKa7VuQGO","title":"PHP Security","pathname":"/notes/notes/product-security-engineering/php-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"hs9nskqXWFwaHbETiIvJ","title":"Product Security Governance","pathname":"/notes/notes/product-security-engineering/product-security-governance","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"}]},{"id":"bQ6yC8TAlXTE6lejxDSI","title":"Controversial Subjects","pathname":"/notes/notes/product-security-engineering/product-security-governance/controversial-subjects","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"Product Security Governance"}]},{"id":"7FMjiIKjGIM8feeDgvE0","title":"Redis License Compliance in 2025","pathname":"/notes/notes/product-security-engineering/product-security-governance/controversial-subjects/redis-license-compliance-in-2025","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Product Security Engineering"},{"label":"Product Security Governance"},{"label":"Controversial Subjects"}]},{"id":"bInxpQpmlFzUSviiOUwF","title":"AppSec Testing","pathname":"/notes/notes/appsec","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"r2MvAXXvNt7poNHDHQsC","title":"Checklists","pathname":"/notes/notes/appsec/checklists","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"S1xPkSQ9mmstQZQacUqE","title":"WEB APP PENTESTING CHECKLIST","pathname":"/notes/notes/appsec/checklists/web-app-pentesting-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"tDWdg4sYHmcKpZbWrQ0I","title":"API Testing Checklist","pathname":"/notes/notes/appsec/checklists/api-testing-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"XZXRdVY1vcha0yc7qk2q","title":"Android Pentesting Checklist","pathname":"/notes/notes/appsec/checklists/android-pentesting-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"XnNpVhDkgl0vmMsaCL4U","title":"IoS Pentesting Checklist","pathname":"/notes/notes/appsec/checklists/ios-pentesting-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"U8goQE7YqiIeTnjOFGSW","title":"Thick Client Pentesting Checklist","pathname":"/notes/notes/appsec/checklists/thick-client-pentesting-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"Zf8a91XzuFFiOLXzRDH0","title":"Secure Code Review Checklist","pathname":"/notes/notes/appsec/checklists/secure-code-review-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Checklists"}]},{"id":"z0Hl8FJNiDnHcgt41L57","title":"Targeted Test Cases","pathname":"/notes/notes/appsec/targeted-test-cases","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"FPyyvFg6jyWvlDSbabPJ","title":"Part 1","pathname":"/notes/notes/appsec/targeted-test-cases/targeted-test-cases","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Targeted Test Cases"}]},{"id":"wWmLIVCyZ36a9DTbTatP","title":"Part 2","pathname":"/notes/notes/appsec/targeted-test-cases/part-2","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"},{"label":"Targeted Test Cases"}]},{"id":"ojZQhEDm6cZpb3trnBpf","title":"Ports and associated Vectors","pathname":"/notes/notes/appsec/ports-and-associated-vectors","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"eoUHO8cbjO3hy0omFQj3","title":"DNS","pathname":"/notes/notes/appsec/dns","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"BADcUU8Zov6vD98gbIqp","title":"Web Tools","pathname":"/notes/notes/appsec/tools","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"1qXTIM5OvcUz2TFmAvsl","title":"Command Injection Testing","pathname":"/notes/notes/appsec/command-injection-testing","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"XlYCPz9klYrznJ8jLsW2","title":"JWTs and JSON","pathname":"/notes/notes/appsec/json","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"AppSec Testing"}]},{"id":"w1kOqZwcrUh1D9oi7Q8Y","title":"Security Research","pathname":"/notes/notes/security-research","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"3O62e5VOZFc0EtxMK5lI","title":"Publishing CVEs","pathname":"/notes/notes/security-research/publishing-cves","siteSpaceId":"sitesp_pjMAL","description":"This will guide you through the process of identifying, disclosing, and publishing a CVE responsibly.","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"LKqsmRAwaZh3cps2dnWd","title":"Shodan Dork Cheatsheet","pathname":"/notes/notes/security-research/shodan-dork-cheatsheet","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"g5hvl0mop7vwMg2LeCCh","title":"Github Dorks","pathname":"/notes/notes/security-research/github-dorks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"4WpUDXyxeXXdYsgHdMxw","title":"Bug Bounty","pathname":"/notes/notes/security-research/bug-bounty","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"zogqEJUUvt1snnA7gIum","title":"Bug Bounty Programs","pathname":"/notes/notes/security-research/bug-bounty/bug-bounty-programs","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"},{"label":"Bug Bounty"}]},{"id":"ah02ExGKc9CHsfm0VFbH","title":"CVE Hunting Python Repos with VulnHunter","pathname":"/notes/notes/security-research/cve-hunting-python-repos-with-vulnhunter","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"OLSmSCJDp32v5veBV1nL","title":"Portable pyenv Setup for Python Vulnerability Research","pathname":"/notes/notes/security-research/portable-pyenv-setup-for-python-vulnerability-research","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Security Research"}]},{"id":"zzyEwW3IVvnoG0tDlIoU","title":"Programming","pathname":"/notes/notes/coding-programming","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"KDD5RE6mhfsGvfOZERGN","title":"Secure Coding Practices Checklist","pathname":"/notes/notes/coding-programming/secure-coding-practices-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"vdpJO3GerYK5okwvEfbg","title":"JavaScript","pathname":"/notes/notes/coding-programming/javascript","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"rGFvtZK7iJlsXGhEB8XR","title":"Python","pathname":"/notes/notes/coding-programming/python","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"bQNOInfSFfIl6o01Qzcn","title":"Quick Notes","pathname":"/notes/notes/coding-programming/python/quick-notes","siteSpaceId":"sitesp_pjMAL","description":"Notes from www.learnpython.org","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Python"}]},{"id":"duruuxfj0bTcftoyKNKc","title":"Python Basics for Pentesters","pathname":"/notes/notes/coding-programming/python/python-basics-for-pentesters","siteSpaceId":"sitesp_pjMAL","description":"The entirety of this guide was written by Martian Defense, LLC","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Python"}]},{"id":"VjKDWdfLJt0h6OYcNPMQ","title":"Python Snippets","pathname":"/notes/notes/coding-programming/python/python","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Python"}]},{"id":"s7wm3v1JB8YWn0aWPdA3","title":"XML Basics with Python","pathname":"/notes/notes/coding-programming/python/xml-basics-with-python","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Python"}]},{"id":"wmwZhZWXK94mGWkuqXv5","title":"Golang","pathname":"/notes/notes/coding-programming/golang","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"UFfAAxloxmaVqRmBsvVX","title":"Theory","pathname":"/notes/notes/coding-programming/golang/theory","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"byedJzF8bVRcxNdjyciA","title":"Security","pathname":"/notes/notes/coding-programming/golang/security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"782LZchtzQpXhRVmxbr3","title":"Modules","pathname":"/notes/notes/coding-programming/golang/modules","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"ZJQxzwF7vDv7tX8K2lfc","title":"Entry Points","pathname":"/notes/notes/coding-programming/golang/entry-points","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"qckBiHxE3Yv2qgjXy77E","title":"File Forensics","pathname":"/notes/notes/coding-programming/golang/file-forensics","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"bG0CkHYX6jxI6ZCU4VQt","title":"Cryptography and Encoding","pathname":"/notes/notes/coding-programming/golang/cryptography-and-encoding","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"0iJQvQcdOxW3gnkJEGRw","title":"Golang Snippets","pathname":"/notes/notes/coding-programming/golang/golang-snippets","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"Golang"}]},{"id":"qgg2a96MCuUPYhZLSXX0","title":"PHP","pathname":"/notes/notes/coding-programming/php","siteSpaceId":"sitesp_pjMAL","description":"The entirety of this guide was written by Martian Defense, LLC","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"biLW8Aw2FZl3JxFEx1mD","title":"Setup","pathname":"/notes/notes/coding-programming/php/setup","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"neFCzaba7l8jlZAkmghE","title":"Syntax","pathname":"/notes/notes/coding-programming/php/syntax","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"4QymQ4rVveKhu4sFh7Fo","title":"Variables and Data Types","pathname":"/notes/notes/coding-programming/php/variables-and-data-types","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"314cbVM5sBy2bza9kegn","title":"Control Structures","pathname":"/notes/notes/coding-programming/php/control-structures","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"5lgjRf0vKlq6vnybfEUV","title":"Arrays","pathname":"/notes/notes/coding-programming/php/arrays","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"lX2lqqrr57L1KDllAUWB","title":"Functions","pathname":"/notes/notes/coding-programming/php/functions","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"fq3ih9pVkgnf5nMjbivn","title":"OOP Concepts","pathname":"/notes/notes/coding-programming/php/oop-concepts","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"itokcQI6vbLiVDdxmwWT","title":"Database Integration","pathname":"/notes/notes/coding-programming/php/database-integration","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"aFEuigbREEvbntY00oMa","title":"Handling HTTP Methods","pathname":"/notes/notes/coding-programming/php/handling-http-methods","siteSpaceId":"sitesp_pjMAL","description":"(GET and POST) and Forms","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"aw7Nv94te8QlP5jfiRbf","title":"Session Management","pathname":"/notes/notes/coding-programming/php/session-management","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"3WneP9Rk72Vhf57jUgBG","title":"File Uploads","pathname":"/notes/notes/coding-programming/php/file-uploads","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"STpWcV84iYqWgsIdSgzg","title":"Email Function","pathname":"/notes/notes/coding-programming/php/email-function","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"Kf6zigK4ZDkXphiBLYwG","title":"Error Handling","pathname":"/notes/notes/coding-programming/php/error-handling","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"EENc0ax9KezJhCOs89lp","title":"Advanced Topics and Best Practices","pathname":"/notes/notes/coding-programming/php/advanced-topics-and-best-practices","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Programming"},{"label":"PHP"}]},{"id":"2M0gpfQeKw6ePwh6wMrn","title":"Packaging and Automation of Docker Linux Apps","pathname":"/notes/notes/coding-programming/packaging-and-automation-of-docker-linux-apps","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Programming"}]},{"id":"2SuPOeHUt6kdd7PWoz7L","title":"Network Security","pathname":"/notes/notes/network-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"NZ0TGvf79kQ8ShhMpzh5","title":"Domain Trust Enumeration","pathname":"/notes/notes/network-security/domain-trust-enumeration","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"2wV0D8idzhvE4Ixhbn1T","title":"Bleeding Edge Vulnerabilities","pathname":"/notes/notes/network-security/bleeding-edge-vulnerabilities","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"WtHzT3Dx0w1TvVSQ0Atu","title":"Post-Exploitation","pathname":"/notes/notes/network-security/privileged-access","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"oiRdszJyUz4p08P6B3Yk","title":"Access Control Lists and Entries (ACL & ACE)","pathname":"/notes/notes/network-security/access-control-lists-and-entries-acl-and-ace","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"HZIpuF8m58V5iI84FAq0","title":"Credentialed Enumeration","pathname":"/notes/notes/network-security/credentialed-enumeration","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"cPuVleLBdIaBodeP68JF","title":"Password Attacks","pathname":"/notes/notes/network-security/password-attacks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"HB3EnzxTZngO4Xah08wG","title":"Internal Password Spraying","pathname":"/notes/notes/network-security/password-attacks/internal-password-spraying","siteSpaceId":"sitesp_pjMAL","description":"Password Spraying","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Password Attacks"}]},{"id":"Izsrl3toTsTbirYW4vcE","title":"Remote Password Attacks","pathname":"/notes/notes/network-security/password-attacks/remote-password-attacks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Password Attacks"}]},{"id":"KgZvIckYqJNaT3i7VWsq","title":"Linux Local Password Attacks","pathname":"/notes/notes/network-security/password-attacks/linux-local-password-attacks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Password Attacks"}]},{"id":"sDGtKiuEEAqN8wkUPt3V","title":"Windows Local Password Attacks","pathname":"/notes/notes/network-security/password-attacks/windows-local-password-attacks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Password Attacks"}]},{"id":"NHR3bIrEYwTGhkwgh7SY","title":"Windows Lateral Movement","pathname":"/notes/notes/network-security/password-attacks/windows-lateral-movement","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Password Attacks"}]},{"id":"WkGx5rFWZndDq5xoAmyc","title":"PowerView","pathname":"/notes/notes/network-security/powerview","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"PujRLI5zZ4nmTGpD8jKh","title":"Pivoting, Tunneling and Forwarding","pathname":"/notes/notes/network-security/pivoting-tunneling-and-forwarding","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"mDKrZ4VOAkL3qvvFRY0h","title":"Linux Privilege Escalation","pathname":"/notes/notes/network-security/linux-privilege-escalation","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"fx7sQDi99qxMTfJCxSbZ","title":"Windows Privesc","pathname":"/notes/notes/network-security/windows-privesc","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"Ab0du8Ef59138TqsC3XK","title":"OS Attacks","pathname":"/notes/notes/network-security/windows-privesc/os-attacks","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Windows Privesc"}]},{"id":"dK65mehwZ5SO5HAzYQV5","title":"Windows User Privileges","pathname":"/notes/notes/network-security/windows-privesc/windows-user-privileges","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Windows Privesc"}]},{"id":"44TJ2MIngDNeeWOYjIvq","title":"Windows Group Privileges","pathname":"/notes/notes/network-security/windows-privesc/windows-group-privileges","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Windows Privesc"}]},{"id":"zhkYVBAE0kUMcMRFZPYI","title":"Manual Enumeration","pathname":"/notes/notes/network-security/windows-privesc/manual-enumeration","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Windows Privesc"}]},{"id":"vlSL1ObXjEFfwnQ87X0u","title":"Credential Theft","pathname":"/notes/notes/network-security/windows-privesc/credential-theft","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Windows Privesc"}]},{"id":"49nekDmgic5JYFbDrxL4","title":"Kerberos Attacks","pathname":"/notes/notes/network-security/kerberoasting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"JmLGQXBXPSAcr0UCOGj9","title":"Kerberos Quick Reference Sheet","pathname":"/notes/notes/network-security/kerberoasting/kerberos-quick-reference-sheet","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"},{"label":"Kerberos Attacks"}]},{"id":"9btGv51i1mvutwJrQs0S","title":"Pentesting JumpCloud vs Active Directory (AD) vs Azure ADDS","pathname":"/notes/notes/network-security/pentesting-jumpcloud-vs-active-directory-ad-vs-azure-adds","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Network Security"}]},{"id":"0ZUImtFk7Jti05oXf1Ys","title":"Cloud Security Testing","pathname":"/notes/notes/cloud-security-testing","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"gaaxJ8pf7XMUKgOXpJi5","title":"Red Teaming","pathname":"/notes/notes/offensive-security","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"}]},{"id":"F5kPOVlUSP7cF1eFztGy","title":"Red Team Infrastructure","pathname":"/notes/notes/offensive-security/red-team-infrastructure","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Red Teaming"}]},{"id":"iOejt5XqFbNnePLNYabC","title":"Red Team OPSEC Playbook","pathname":"/notes/notes/offensive-security/red-team-opsec-playbook","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Red Teaming"}]},{"id":"bAYe2vdk3WUO11kZWxZF","title":"Incident Response","pathname":"/notes/notes/defensive-security","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"W4wwkARBfabL1tBfSEH6","title":"Splunk","pathname":"/notes/notes/defensive-security/splunk","siteSpaceId":"sitesp_pjMAL","description":"Replace the placeholder data from this section with your actual data","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"}]},{"id":"zRqFB2zc6ACfRBhXkDZE","title":"Basic Queries","pathname":"/notes/notes/defensive-security/splunk/basic-queries","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"},{"label":"Splunk"}]},{"id":"I7GymQR76lnqCOOEvKez","title":"Dashboards","pathname":"/notes/notes/defensive-security/splunk/dashboards","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"},{"label":"Splunk"}]},{"id":"s93p9BlbiKl44sjo7n06","title":"Forensics","pathname":"/notes/notes/defensive-security/forensics","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"}]},{"id":"xCLAJ3EzRLj6q2ldEWPv","title":"Volatility","pathname":"/notes/notes/defensive-security/forensics/volatility","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"},{"label":"Forensics"}]},{"id":"YXHFVVhXwXMhET3wp3I0","title":"WireShark filters","pathname":"/notes/notes/defensive-security/wireshark-filters","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Incident Response"}]},{"id":"AJDp6gEusMdl99ye5Jv2","title":"Governance, Risk, Compliance","pathname":"/notes/notes/governance-risk-compliance","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"Cq85PXbaSM5xI0TC0VSS","title":"Vulnerability Management Lifecycle","pathname":"/notes/notes/governance-risk-compliance/vulnerability-management-lifecycle","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Governance, Risk, Compliance"}]},{"id":"vU9snt6nKhftqreFrwS5","title":"Cheatsheets","pathname":"/notes/notes/cheatsheets","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"}]},{"id":"N5kh4ig6IMd1E5qfsIC2","title":"Web Security Testing","pathname":"/notes/notes/cheatsheets/web-security-testing","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"}]},{"id":"nObNhuq8C0mGFnctafkV","title":"Information Gathering","pathname":"/notes/notes/cheatsheets/web-security-testing/information-gathering","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Web Security Testing"}]},{"id":"crVpvtl7jR7LZqNFasw6","title":"Web Fuzzing","pathname":"/notes/notes/cheatsheets/web-security-testing/web-fuzzing","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Web Security Testing"}]},{"id":"OVctby5RuOWLFejCxuDw","title":"SQL Injection Fundamentals","pathname":"/notes/notes/cheatsheets/web-security-testing/sql-injection-fundamentals","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Web Security Testing"}]},{"id":"o2pZMs2Ed96BXVt8byut","title":"Login Brute Forcing","pathname":"/notes/notes/cheatsheets/web-security-testing/login-brute-forcing","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Web Security Testing"}]},{"id":"IJNcKEX2PVdJ20PbnRe0","title":"Assembly Language","pathname":"/notes/notes/cheatsheets/assembly-language","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"}]},{"id":"Xh6fnAZVGwsAXwHH7rGL","title":"Capture-the-Flag Training","pathname":"/notes/notes/cheatsheets/capture-the-flag-training","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"}]},{"id":"P2ncTAmKfx1vDQ23utut","title":"Vulnerable Machine Checklist","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/vulnerable-machine-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"RB0RRwnoiEXW14mAcwEx","title":"Reverse Engineering Checklist","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/reverse-engineering-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"LOU4xd0PxV5pvLEeSRsq","title":"Magic Bytes","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/reverse-engineering-checklist/magic-bytes","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"},{"label":"Reverse Engineering Checklist"}]},{"id":"a9seN7ngOPA5xVvO8OnG","title":"Mobile Checklist","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/mobile-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"hIV51PxNZzvyjQpODL4c","title":"Forensics Checklist","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/forensics-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"loa6VWcO7f4cbzLQEkyC","title":"Binary Exploitation","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/binary-exploitation","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"BYB7AeIf6yuyIBxjWbJA","title":"Cryptography Checklist","pathname":"/notes/notes/cheatsheets/capture-the-flag-training/cryptography-checklist","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Cheatsheets"},{"label":"Capture-the-Flag Training"}]},{"id":"PTZQg6nkB9sKV9nwjq5m","title":"Certifications","pathname":"/notes/notes/certifications","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"bxYruCvQuNA5GLnAYiLf","title":"CSSLP","pathname":"/notes/notes/certifications/csslp","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"}]},{"id":"OAZAOWjPPwc5csElLNK7","title":"Domain 1: Secure Software Concepts","pathname":"/notes/notes/certifications/csslp/domain-1-secure-software-concepts","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"JkqdBkN9XEo0HmDta1bE","title":"Domain 2: Secure Software Lifecycle Management","pathname":"/notes/notes/certifications/csslp/domain-2-secure-software-lifecycle-management","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"Avq6TGo6JyeGykwNm7xg","title":"Domain 3: Secure Software Requirements","pathname":"/notes/notes/certifications/csslp/domain-3-secure-software-requirements","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"LO4efqVZMLsh73ocpkir","title":"Domain 4: Secure Software Architecture and Design","pathname":"/notes/notes/certifications/csslp/domain-4-secure-software-architecture-and-design","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"lOmXVsbkOcpt6gDzDZGf","title":"Domain 5: Secure Software Implementation","pathname":"/notes/notes/certifications/csslp/domain-5-secure-software-implementation","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"4thGi0UOIzNECXvtg7Jj","title":"Domain 6: Secure Software Testing","pathname":"/notes/notes/certifications/csslp/domain-6-secure-software-testing","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"b1vw7nQqf1QIMRhUZFiY","title":"Domain 7: Secure Software Deployment, Operations, Maintenance","pathname":"/notes/notes/certifications/csslp/domain-7-secure-software-deployment-operations-maintenance","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"VSeX4hOQd6sSNwViaF1r","title":"Domain 8: Secure Software Supply Chain","pathname":"/notes/notes/certifications/csslp/domain-8-secure-software-supply-chain","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Certifications"},{"label":"CSSLP"}]},{"id":"DYW5Z0qqm3wvOycgVgrP","title":"Reporting","pathname":"/notes/notes/reporting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"}]},{"id":"UqTkrOzibRyNK26xK4jD","title":"Common System Task Info","pathname":"/notes/notes/common-system-task-info","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"}]},{"id":"pp8s9Skq8OEUXsYosDu3","title":"IT Tasks","pathname":"/notes/notes/common-system-task-info/basic-it-tasks","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"},{"label":"Common System Task Info"}]},{"id":"0p9EMlu2rCxQFrp52t1C","title":"Linux Basics","pathname":"/notes/notes/common-system-task-info/basic-linux-for-ctfs","siteSpaceId":"sitesp_pjMAL","description":"Useful Find command reference","breadcrumbs":[{"label":"Notes"},{"label":"Common System Task Info"}]},{"id":"LnHxnxaOf1CCFCZ6afh7","title":"PowerShell","pathname":"/notes/notes/common-system-task-info/powershell","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Notes"},{"label":"Common System Task Info"}]},{"id":"z7CLpjrTGvQZZ68i80kb","title":"App Pentest Toolkit","pathname":"/notes/notes/app-pentest-toolkit","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Notes"}]},{"id":"fYDNpmwgiiwyJSLJlxkl","title":"Personal Information Removal Services","pathname":"/notes/digital-privacy/personal-information-removal-services","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"6kZZ0SIdSWE5SNAcEgjd","title":"Privacy-Focused DNS Configuration Guides","pathname":"/notes/digital-privacy/privacy-focused-dns-configuration-guides","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"5ajrLwuQqsmVKKs2hc9p","title":"Private and Secure DNS with Pi-hole and Unbound","pathname":"/notes/digital-privacy/privacy-focused-dns-configuration-guides/private-and-secure-dns-with-pi-hole-and-unbound","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy-Focused DNS Configuration Guides"}]},{"id":"OCcPGuNH2w230HdzNweq","title":"DNS Leak Prevention and Firewall Configuration","pathname":"/notes/digital-privacy/privacy-focused-dns-configuration-guides/private-and-secure-dns-with-pi-hole-and-unbound/dns-leak-prevention-and-firewall-configuration","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy-Focused DNS Configuration Guides"},{"label":"Private and Secure DNS with Pi-hole and Unbound"}]},{"id":"pGu79dhyirm0PE26GkS1","title":"Configuring DoT with Unbound and Pi-hole on OPNsense","pathname":"/notes/digital-privacy/privacy-focused-dns-configuration-guides/configuring-dot-with-unbound-and-pi-hole-on-opnsense","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy-Focused DNS Configuration Guides"}]},{"id":"7mevPs65QkXU6Y5Exx51","title":"Forwarding Mode Explained: Forward Queries to Upstream DNS Server (Optionally with DNS-over-TLS)","pathname":"/notes/digital-privacy/privacy-focused-dns-configuration-guides/forwarding-mode-explained-forward-queries-to-upstream-dns-server-optionally-with-dns-over-tls","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy-Focused DNS Configuration Guides"}]},{"id":"jPxiKHMHkAnz8R4pZUnn","title":"Public DNS Services","pathname":"/notes/digital-privacy/dns-services","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"WMxTCElgbSOGJluvcm0W","title":"Privacy and Opsec Resources","pathname":"/notes/digital-privacy/opsec","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"UPKWFlCzRrpdMsfnBwXf","title":"Martian's Stack","pathname":"/notes/digital-privacy/opsec/martians-stack","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy and Opsec Resources"}]},{"id":"lWWCVouoWyZ0Twc5Ti3m","title":"De-Googling Android","pathname":"/notes/digital-privacy/opsec/de-googling-android","siteSpaceId":"sitesp_pjMAL","description":"This page covers methods to safely De-Google Android","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy and Opsec Resources"}]},{"id":"zEq3cwuGVTbFhEI68gHo","title":"Acquiring Monero (XMR) Anonymously","pathname":"/notes/digital-privacy/opsec/acquiring-monero-xmr-anonymously","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Privacy and Opsec Resources"}]},{"id":"wIse3BcZqPOHMbSCZN3Y","title":"Self-Hosting","pathname":"/notes/digital-privacy/self-hosting","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"dev3TLrirRGlC9cBsXrJ","title":"Proxmox VE","pathname":"/notes/digital-privacy/self-hosting/proxmox-ve","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"}]},{"id":"6mdwX95KiZZb7jCSKOQC","title":"Proxmox Update Setup Guide","pathname":"/notes/digital-privacy/self-hosting/proxmox-ve/proxmox-update-setup-guide","siteSpaceId":"sitesp_pjMAL","description":"This guide covers how to set up the necessary Proxmox repositories, enable automatic updates with unattended-upgrades, and handle both enterprise and non-subscription update channels.","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Proxmox VE"}]},{"id":"A0LB9FqLxJGmllOGDufx","title":"Enable and test Wake-on-LAN (WOL)","pathname":"/notes/digital-privacy/self-hosting/proxmox-ve/enable-and-test-wake-on-lan-wol","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Proxmox VE"}]},{"id":"KcVr2doX0P08yeM1jnRM","title":"Remotely Unlocking LUKS-Encrypted Proxmox with Dropbear SSH at Boot","pathname":"/notes/digital-privacy/self-hosting/proxmox-ve/remotely-unlocking-luks-encrypted-proxmox-with-dropbear-ssh-at-boot","siteSpaceId":"sitesp_pjMAL","description":"This guide explains how to set up remote unlocking via SSH during the early boot stage using Dropbear inside the initramfs environment on a LUKS-encrypted Proxmox system.","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Proxmox VE"}]},{"id":"ZKDOKLjIMvCKljLNDXWG","title":"Idle Proxmox Auto-Shutdown","pathname":"/notes/digital-privacy/self-hosting/proxmox-ve/idle-proxmox-auto-shutdown","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Proxmox VE"}]},{"id":"OggOVHkITO0qipp8QjTu","title":"Secure Remote Access with TailScale + Hardened SSH","pathname":"/notes/digital-privacy/self-hosting/secure-remote-access-with-tailscale-+-hardened-ssh","siteSpaceId":"sitesp_pjMAL","description":"This guide walks you through setting up secure remote access using TailScale VPN with MagicDNS for easy hostname access along with steps to harden SSH with key-based login.","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"}]},{"id":"xMfoFHyZ9IOUkwOSGl7Z","title":"Expose the Web UI over Tailnet","pathname":"/notes/digital-privacy/self-hosting/secure-remote-access-with-tailscale-+-hardened-ssh/expose-the-web-ui-over-tailnet","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Secure Remote Access with TailScale + Hardened SSH"}]},{"id":"3iMHrJj41dyLKGeAhiak","title":"Remote Unlock of LUKS-Encrypted Root Disk via SSH","pathname":"/notes/digital-privacy/self-hosting/remote-unlock-of-luks-encrypted-root-disk-via-ssh","siteSpaceId":"sitesp_pjMAL","description":"This document outlines how to configure remote unlocking of an encrypted root filesystem protected by LUKS during system boot, using SSH access before the main OS loads.","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"}]},{"id":"KzrsoNtiaT1MG3e8RoT4","title":"Git","pathname":"/notes/digital-privacy/self-hosting/git","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"}]},{"id":"bSqvNBEgPEc7cO8AixXd","title":"Hosting Gitea & Forgejo with Docker, Nginx, and Cloudflare Proxy","pathname":"/notes/digital-privacy/self-hosting/git/hosting-gitea-and-forgejo-with-docker-nginx-and-cloudflare-proxy","siteSpaceId":"sitesp_pjMAL","description":"This guide helps beginners deploy Gitea or Forgejo Git servers using Docker containers, secure them with Nginx reverse proxy, and protect with Cloudflare.","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"},{"label":"Git"}]},{"id":"hqndh6GnugGPQ2yZ90FE","title":"Two-VPS Private Proxy Architecture: Nginx Reverse Proxy Over Wireguard VPN","pathname":"/notes/digital-privacy/self-hosting/two-vps-private-proxy-architecture-nginx-reverse-proxy-over-wireguard-vpn","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"},{"label":"Self-Hosting"}]},{"id":"VeWOpT6SetPhCgXpjXJF","title":"Monero Mining Guide","pathname":"/notes/digital-privacy/monero-mining-guide","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"vennPpEegBfdHjDQvk3C","title":"Android OSes","pathname":"/notes/digital-privacy/android-oses","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Digital Privacy"}]},{"id":"JYAVqzb5j1SCLPnKIe06","title":"Entrepreneurship Roadmaps","pathname":"/notes/cyber-entreprenuership/entrepreneurship-roadmaps","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Cyber Entreprenuership"}]},{"id":"ESsqajVTeR12Rg8DK6iU","title":"Consulting","pathname":"/notes/cyber-entreprenuership/entrepreneurship-roadmaps/consulting","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Cyber Entreprenuership"},{"label":"Entrepreneurship Roadmaps"}]},{"id":"WtVc63IsGPAJ1hLsVVgj","title":"Starting a Business","pathname":"/notes/cyber-entreprenuership/entrepreneurship-roadmaps/starting-a-business","siteSpaceId":"sitesp_pjMAL","description":"","breadcrumbs":[{"label":"Cyber Entreprenuership"},{"label":"Entrepreneurship Roadmaps"}]},{"id":"BNQfwI5U9v2qIjgYeQir","title":"Open Source Business & SaaS Tools","pathname":"/notes/cyber-entreprenuership/open-source-business-and-saas-tools","siteSpaceId":"sitesp_pjMAL","breadcrumbs":[{"label":"Cyber Entreprenuership"}]}]}