/ .obsidian / plugins / remember-cursor-position / cursor-positions.json
cursor-positions.json
1  {"🛡️ Cybersecurity Knowledge Base.md":{"scroll":7.4605,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Templates/News & Blogs.md":{"scroll":0,"cursor":{"from":{"ch":4,"line":0},"to":{"ch":4,"line":0}}},"Templates/CVE.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":14},"to":{"ch":0,"line":14}}},"Templates/Job Roles.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Templates/Vulnerability.md":{"scroll":0,"cursor":{"from":{"ch":1,"line":6},"to":{"ch":1,"line":6}}},"Templates/Tools.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":2,"line":16}}},"Templates/Techniques.md":{"scroll":0,"cursor":{"from":{"ch":2,"line":12},"to":{"ch":2,"line":12}}},"Resource & References/Industry News & Blogs/Hadooken - New Linux malware Hadooken targets Oracle WebLogic servers.md":{"scroll":3.224,"cursor":{"from":{"ch":112,"line":18},"to":{"ch":112,"line":18}}},"Resource & References/Industry News & Blogs/Tsunami - Hackers infect Linux SSH servers with Tsunami botnet malware.md":{"scroll":5.1137,"cursor":{"from":{"ch":19,"line":37},"to":{"ch":19,"line":37}}},"Resource & References/Industry News & Blogs/CVE-2020-14882.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":13},"to":{"ch":0,"line":13}}},"Resource & References/Industry News & Blogs/GitLab releases fix for critical SAML authentication bypass flaw.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":7},"to":{"ch":0,"line":7}}},"Resource & References/Industry News & Blogs/Broadcom fixes critical RCE bug in VMware vCenter Server.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":11},"to":{"ch":0,"line":11}}},"Resource & References/Industry News & Blogs/CVE-2023-34048.md":{"scroll":0.6548,"cursor":{"from":{"ch":0,"line":14},"to":{"ch":0,"line":14}}},"Resource & References/Industry News & Blogs/CVE-2024-38812.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":16},"to":{"ch":0,"line":16}}},"Resource & References/Industry News & Blogs/CVE-2024-38813.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":18},"to":{"ch":0,"line":18}}},"Resource & References/Industry News & Blogs/CVE-2024-37079.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":16},"to":{"ch":0,"line":16}}},"Resource & References/Industry News & Blogs/CVE-2024-45409.md":{"scroll":0.7909,"cursor":{"from":{"ch":0,"line":14},"to":{"ch":0,"line":14}}},"Foundations/Core Concepts/SAML.md":{"scroll":0.6438,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Foundations/Core Concepts/DCERPC.md":{"scroll":7.1619,"cursor":{"from":{"ch":751,"line":18},"to":{"ch":751,"line":18}}},"Resource & References/Industry News & Blogs/CISA warns of Windows flaw used in infostealer malware attacks.md":{"scroll":0,"cursor":{"from":{"ch":1,"line":34},"to":{"ch":1,"line":34}}},"Resource & References/Industry News & Blogs/Void Banshee.md":{"scroll":0.6438,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Resource & References/Industry News & Blogs/CVE-2024-38112.md":{"scroll":15.8138,"cursor":{"from":{"ch":97,"line":32},"to":{"ch":97,"line":32}}},"Offensive Security/Reconnaissance/Nmap.md":{"scroll":63.7259,"cursor":{"from":{"ch":81,"line":110},"to":{"ch":81,"line":110}}},"Foundations/Core Concepts/3 Way Handshake.md":{"scroll":44.4596,"cursor":{"from":{"ch":56,"line":55},"to":{"ch":56,"line":55}}},"Foundations/Core Concepts/TTL.md":{"scroll":1.0169,"cursor":{"from":{"ch":62,"line":13},"to":{"ch":62,"line":13}}},"Foundations/Core Concepts/ARP.md":{"scroll":0,"cursor":{"from":{"ch":47,"line":16},"to":{"ch":47,"line":16}}},"Foundations/Core Concepts/DNS.md":{"scroll":7.5169,"cursor":{"from":{"ch":0,"line":32},"to":{"ch":0,"line":32}}},"Foundations/Core Concepts/ICMP Echo Requests.md":{"scroll":0,"cursor":{"from":{"ch":49,"line":17},"to":{"ch":49,"line":17}}},"Foundations/Core Concepts/OSI.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":18},"to":{"ch":0,"line":18}}},"Foundations/Core Concepts/SCTP.md":{"scroll":10.2526,"cursor":{"from":{"ch":54,"line":22},"to":{"ch":54,"line":22}}},"Foundations/Core Concepts/TCP.md":{"scroll":15.8346,"cursor":{"from":{"ch":219,"line":33},"to":{"ch":219,"line":33}}},"Foundations/Core Concepts/UDP.md":{"scroll":11.8915,"cursor":{"from":{"ch":168,"line":32},"to":{"ch":168,"line":32}}},"Foundations/Core Concepts/Wi-Fi.md":{"scroll":24.4245,"cursor":{"from":{"ch":122,"line":45},"to":{"ch":122,"line":45}}},"Foundations/Core Concepts/Diffie-Hellman.md":{"scroll":16.8784,"cursor":{"from":{"ch":208,"line":40},"to":{"ch":208,"line":40}}},"Foundations/Core Concepts/Ethernet.md":{"scroll":23.0163,"cursor":{"from":{"ch":273,"line":47},"to":{"ch":273,"line":47}}},"Foundations/Core Concepts/HTTP.md":{"scroll":0.4152,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Foundations/Core Concepts/HTTPS.md":{"scroll":12.4355,"cursor":{"from":{"ch":54,"line":36},"to":{"ch":54,"line":36}}},"Foundations/Core Concepts/IMAP.md":{"scroll":0.6438,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Foundations/Core Concepts/IP.md":{"scroll":20.8574,"cursor":{"from":{"ch":116,"line":41},"to":{"ch":116,"line":41}}},"Foundations/Core Concepts/IPsec.md":{"scroll":20.497,"cursor":{"from":{"ch":259,"line":43},"to":{"ch":259,"line":43}}},"Foundations/Core Concepts/MAC addresses.md":{"scroll":12.472,"cursor":{"from":{"ch":313,"line":27},"to":{"ch":313,"line":27}}},"Foundations/Core Concepts/NetBIOS.md":{"scroll":3.0169,"cursor":{"from":{"ch":281,"line":18},"to":{"ch":281,"line":18}}},"Foundations/Core Concepts/POP3.md":{"scroll":17.7872,"cursor":{"from":{"ch":283,"line":40},"to":{"ch":283,"line":40}}},"Foundations/Core Concepts/RPC.md":{"scroll":0,"cursor":{"from":{"ch":150,"line":26},"to":{"ch":150,"line":26}}},"Foundations/Core Concepts/SMTP.md":{"scroll":8.5571,"cursor":{"from":{"ch":75,"line":34},"to":{"ch":75,"line":34}}},"Foundations/Core Concepts/SSH.md":{"scroll":2.0448,"cursor":{"from":{"ch":145,"line":12},"to":{"ch":145,"line":12}}},"Foundations/Core Concepts/SSL.md":{"scroll":6.8886,"cursor":{"from":{"ch":284,"line":26},"to":{"ch":284,"line":26}}},"Foundations/Core Concepts/TLS.md":{"scroll":0.4152,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Foundations/Core Concepts/VPN.md":{"scroll":0,"cursor":{"from":{"ch":94,"line":17},"to":{"ch":94,"line":17}}},"Foundations/Core Concepts/Domain Name.md":{"scroll":0.6438,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Offensive Security/Exploitation/Hashcat.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}},"Foundations/Core Concepts/WPA and WPA2.md":{"scroll":2.7955,"cursor":{"from":{"ch":0,"line":27},"to":{"ch":0,"line":27}}},"Resource & References/Techniques/Man-in-the-Middle (MitM).md":{"scroll":12.7008,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":30}}},"Resource & References/Tools/Netcat.md":{"scroll":9.5972,"cursor":{"from":{"ch":0,"line":30},"to":{"ch":0,"line":30}}},"Resource & References/Tools/Responder.md":{"scroll":28.1043,"cursor":{"from":{"ch":181,"line":45},"to":{"ch":181,"line":45}}},"Resource & References/Tools/Mimikatz.md":{"scroll":12.9603,"cursor":{"from":{"ch":197,"line":47},"to":{"ch":197,"line":47}}},"Resource & References/Tools/JohnTheRipper.md":{"scroll":0,"cursor":{"from":{"ch":144,"line":46},"to":{"ch":144,"line":46}}},"Resource & References/Tools/hcxtools.md":{"scroll":13.5558,"cursor":{"from":{"ch":163,"line":45},"to":{"ch":163,"line":45}}},"Resource & References/Tools/Hashid.md":{"scroll":13.0794,"cursor":{"from":{"ch":159,"line":45},"to":{"ch":159,"line":45}}},"Resource & References/Tools/airodump-ng.md":{"scroll":14.0918,"cursor":{"from":{"ch":161,"line":46},"to":{"ch":161,"line":46}}},"Resource & References/Techniques/Padding Oracle Attack.md":{"scroll":5.2958,"cursor":{"from":{"ch":195,"line":27},"to":{"ch":195,"line":27}}},"Resource & References/Techniques/Frequency Analysis.md":{"scroll":4.8125,"cursor":{"from":{"ch":180,"line":28},"to":{"ch":180,"line":28}}},"Resource & References/Techniques/Kerberoasting attack.md":{"scroll":0,"cursor":{"from":{"ch":86,"line":11},"to":{"ch":86,"line":11}}},"Offensive Security/Exploitation/Cross-Site Scripting (XSS).md":{"scroll":77.0072,"cursor":{"from":{"ch":130,"line":168},"to":{"ch":130,"line":168}}},"Offensive Security/Reconnaissance/FFUF.md":{"scroll":92.6947,"cursor":{"from":{"ch":23,"line":126},"to":{"ch":23,"line":126}}},"Offensive Security/Exploitation/Login Brute Forcing.md":{"scroll":197.5938,"cursor":{"from":{"ch":78,"line":234},"to":{"ch":78,"line":234}}},"Foundations/Legal & Ethical Hacking/Documentation & Reporting.md":{"scroll":0,"cursor":{"from":{"ch":0,"line":0},"to":{"ch":0,"line":0}}}}