/ .obsidian / bookmarks.json
bookmarks.json
  1  {
  2    "items": [
  3      {
  4        "type": "group",
  5        "ctime": 1726487659713,
  6        "items": [
  7          {
  8            "type": "group",
  9            "ctime": 1726487659713,
 10            "items": [
 11              {
 12                "type": "group",
 13                "ctime": 1726487659713,
 14                "items": [
 15                  {
 16                    "type": "group",
 17                    "ctime": 1726487659713,
 18                    "items": [
 19                      {
 20                        "type": "group",
 21                        "ctime": 1726487659713,
 22                        "items": [],
 23                        "title": "Reconnaissance"
 24                      },
 25                      {
 26                        "type": "group",
 27                        "ctime": 1726487659713,
 28                        "items": [],
 29                        "title": "Vulnerability Assessment"
 30                      },
 31                      {
 32                        "type": "group",
 33                        "ctime": 1726487659713,
 34                        "items": [],
 35                        "title": "Exploitation"
 36                      }
 37                    ],
 38                    "title": "Offensive Security"
 39                  }
 40                ],
 41                "title": "Core Concepts"
 42              },
 43              {
 44                "type": "group",
 45                "ctime": 1726487659713,
 46                "items": [],
 47                "title": "Legal & Ethical Hacking"
 48              }
 49            ],
 50            "title": "Foundations"
 51          },
 52          {
 53            "type": "group",
 54            "ctime": 1726487659713,
 55            "items": [
 56              {
 57                "type": "group",
 58                "ctime": 1726487659713,
 59                "items": [],
 60                "title": "Reconnaissance"
 61              },
 62              {
 63                "type": "group",
 64                "ctime": 1726487659713,
 65                "items": [],
 66                "title": "Vulnerability Assessment"
 67              },
 68              {
 69                "type": "group",
 70                "ctime": 1726487659713,
 71                "items": [],
 72                "title": "Exploitation"
 73              }
 74            ],
 75            "title": "Offensive Security"
 76          },
 77          {
 78            "type": "group",
 79            "ctime": 1726487659713,
 80            "items": [
 81              {
 82                "type": "group",
 83                "ctime": 1726487659713,
 84                "items": [],
 85                "title": "Security Monitoring & Incident Response"
 86              },
 87              {
 88                "type": "group",
 89                "ctime": 1726487659713,
 90                "items": [],
 91                "title": "Security Hardening & Defence"
 92              }
 93            ],
 94            "title": "Defensive Security"
 95          },
 96          {
 97            "type": "group",
 98            "ctime": 1726487659713,
 99            "items": [
100              {
101                "type": "group",
102                "ctime": 1726487659713,
103                "items": [],
104                "title": "Roles"
105              },
106              {
107                "type": "group",
108                "ctime": 1726487659713,
109                "items": [],
110                "title": "Roles"
111              },
112              {
113                "type": "group",
114                "ctime": 1726487659713,
115                "items": [],
116                "title": "Career Development"
117              }
118            ],
119            "title": "Cyber Security Roles & Career"
120          },
121          {
122            "type": "group",
123            "ctime": 1726487659713,
124            "items": [
125              {
126                "type": "group",
127                "ctime": 1726487659713,
128                "items": [],
129                "title": "Industry News & Blogs"
130              },
131              {
132                "type": "group",
133                "ctime": 1726487659713,
134                "items": [],
135                "title": "Techniques"
136              },
137              {
138                "type": "group",
139                "ctime": 1726487659713,
140                "items": [],
141                "title": "Vulnerabilities"
142              }
143            ],
144            "title": "Resource & References"
145          }
146        ],
147        "title": "sortspec"
148      },
149      {
150        "type": "file",
151        "ctime": 1726487659713,
152        "path": "🛡️ Cybersecurity Knowledge Base.md",
153        "subpath": "#^-"
154      }
155    ]
156  }