bookmarks.json
1 { 2 "items": [ 3 { 4 "type": "group", 5 "ctime": 1726487659713, 6 "items": [ 7 { 8 "type": "group", 9 "ctime": 1726487659713, 10 "items": [ 11 { 12 "type": "group", 13 "ctime": 1726487659713, 14 "items": [ 15 { 16 "type": "group", 17 "ctime": 1726487659713, 18 "items": [ 19 { 20 "type": "group", 21 "ctime": 1726487659713, 22 "items": [], 23 "title": "Reconnaissance" 24 }, 25 { 26 "type": "group", 27 "ctime": 1726487659713, 28 "items": [], 29 "title": "Vulnerability Assessment" 30 }, 31 { 32 "type": "group", 33 "ctime": 1726487659713, 34 "items": [], 35 "title": "Exploitation" 36 } 37 ], 38 "title": "Offensive Security" 39 } 40 ], 41 "title": "Core Concepts" 42 }, 43 { 44 "type": "group", 45 "ctime": 1726487659713, 46 "items": [], 47 "title": "Legal & Ethical Hacking" 48 } 49 ], 50 "title": "Foundations" 51 }, 52 { 53 "type": "group", 54 "ctime": 1726487659713, 55 "items": [ 56 { 57 "type": "group", 58 "ctime": 1726487659713, 59 "items": [], 60 "title": "Reconnaissance" 61 }, 62 { 63 "type": "group", 64 "ctime": 1726487659713, 65 "items": [], 66 "title": "Vulnerability Assessment" 67 }, 68 { 69 "type": "group", 70 "ctime": 1726487659713, 71 "items": [], 72 "title": "Exploitation" 73 } 74 ], 75 "title": "Offensive Security" 76 }, 77 { 78 "type": "group", 79 "ctime": 1726487659713, 80 "items": [ 81 { 82 "type": "group", 83 "ctime": 1726487659713, 84 "items": [], 85 "title": "Security Monitoring & Incident Response" 86 }, 87 { 88 "type": "group", 89 "ctime": 1726487659713, 90 "items": [], 91 "title": "Security Hardening & Defence" 92 } 93 ], 94 "title": "Defensive Security" 95 }, 96 { 97 "type": "group", 98 "ctime": 1726487659713, 99 "items": [ 100 { 101 "type": "group", 102 "ctime": 1726487659713, 103 "items": [], 104 "title": "Roles" 105 }, 106 { 107 "type": "group", 108 "ctime": 1726487659713, 109 "items": [], 110 "title": "Roles" 111 }, 112 { 113 "type": "group", 114 "ctime": 1726487659713, 115 "items": [], 116 "title": "Career Development" 117 } 118 ], 119 "title": "Cyber Security Roles & Career" 120 }, 121 { 122 "type": "group", 123 "ctime": 1726487659713, 124 "items": [ 125 { 126 "type": "group", 127 "ctime": 1726487659713, 128 "items": [], 129 "title": "Industry News & Blogs" 130 }, 131 { 132 "type": "group", 133 "ctime": 1726487659713, 134 "items": [], 135 "title": "Techniques" 136 }, 137 { 138 "type": "group", 139 "ctime": 1726487659713, 140 "items": [], 141 "title": "Vulnerabilities" 142 } 143 ], 144 "title": "Resource & References" 145 } 146 ], 147 "title": "sortspec" 148 }, 149 { 150 "type": "file", 151 "ctime": 1726487659713, 152 "path": "🛡️ Cybersecurity Knowledge Base.md", 153 "subpath": "#^-" 154 } 155 ] 156 }