workspace.json
1 { 2 "main": { 3 "id": "67beaa8afcda8489", 4 "type": "split", 5 "children": [ 6 { 7 "id": "7b08ca52736a7e45", 8 "type": "tabs", 9 "children": [ 10 { 11 "id": "abd43af7458c1918", 12 "type": "leaf", 13 "state": { 14 "type": "markdown", 15 "state": { 16 "file": "Offensive Security/Exploitation/Login Brute Forcing.md", 17 "mode": "source", 18 "source": false 19 }, 20 "icon": "lucide-file", 21 "title": "Login Brute Forcing" 22 } 23 } 24 ] 25 } 26 ], 27 "direction": "vertical" 28 }, 29 "left": { 30 "id": "c52f780ae4ca4b6a", 31 "type": "split", 32 "children": [ 33 { 34 "id": "cd5415ce001e6caf", 35 "type": "tabs", 36 "children": [ 37 { 38 "id": "100ac86013311ab5", 39 "type": "leaf", 40 "state": { 41 "type": "file-explorer", 42 "state": { 43 "sortOrder": "byModifiedTimeReverse" 44 }, 45 "icon": "lucide-folder-closed", 46 "title": "Files" 47 } 48 }, 49 { 50 "id": "013a6922942b8ee0", 51 "type": "leaf", 52 "state": { 53 "type": "search", 54 "state": { 55 "query": "", 56 "matchingCase": false, 57 "explainSearch": false, 58 "collapseAll": false, 59 "extraContext": false, 60 "sortOrder": "alphabetical" 61 }, 62 "icon": "lucide-search", 63 "title": "Search" 64 } 65 }, 66 { 67 "id": "f977908d7acb70fb", 68 "type": "leaf", 69 "state": { 70 "type": "bookmarks", 71 "state": {}, 72 "icon": "lucide-bookmark", 73 "title": "Bookmarks" 74 } 75 } 76 ] 77 }, 78 { 79 "id": "545cd3605a825bb1", 80 "type": "tabs", 81 "children": [ 82 { 83 "id": "f803e82373cbdfac", 84 "type": "leaf", 85 "pinned": true, 86 "state": { 87 "type": "graph", 88 "state": {}, 89 "pinned": true, 90 "icon": "lucide-git-fork", 91 "title": "Graph view" 92 } 93 } 94 ] 95 } 96 ], 97 "direction": "horizontal", 98 "width": 300, 99 "collapsed": true 100 }, 101 "right": { 102 "id": "213ff5d4e55a3a77", 103 "type": "split", 104 "children": [ 105 { 106 "id": "ba2691cc69f5f000", 107 "type": "tabs", 108 "children": [ 109 { 110 "id": "a633864c8ca4ec0b", 111 "type": "leaf", 112 "state": { 113 "type": "tag", 114 "state": { 115 "sortOrder": "frequency", 116 "useHierarchy": true 117 }, 118 "icon": "lucide-tags", 119 "title": "Tags" 120 } 121 }, 122 { 123 "id": "8b13c73354a20ed4", 124 "type": "leaf", 125 "state": { 126 "type": "backlink", 127 "state": { 128 "file": "Offensive Security/Reconnaissance/FFUF.md", 129 "collapseAll": false, 130 "extraContext": false, 131 "sortOrder": "alphabetical", 132 "showSearch": false, 133 "searchQuery": "", 134 "backlinkCollapsed": false, 135 "unlinkedCollapsed": true 136 }, 137 "icon": "links-coming-in", 138 "title": "Backlinks for FFUF" 139 } 140 }, 141 { 142 "id": "ce7a84c166de5e74", 143 "type": "leaf", 144 "state": { 145 "type": "outgoing-link", 146 "state": { 147 "file": "Offensive Security/Reconnaissance/FFUF.md", 148 "linksCollapsed": false, 149 "unlinkedCollapsed": true 150 }, 151 "icon": "links-going-out", 152 "title": "Outgoing links from FFUF" 153 } 154 }, 155 { 156 "id": "4f19be011203921e", 157 "type": "leaf", 158 "state": { 159 "type": "outline", 160 "state": { 161 "file": "Offensive Security/Reconnaissance/FFUF.md" 162 }, 163 "icon": "lucide-list", 164 "title": "Outline of FFUF" 165 } 166 }, 167 { 168 "id": "271df27231524d9c", 169 "type": "leaf", 170 "state": { 171 "type": "all-properties", 172 "state": { 173 "sortOrder": "frequency", 174 "showSearch": false, 175 "searchQuery": "" 176 }, 177 "icon": "lucide-archive", 178 "title": "All properties" 179 } 180 } 181 ], 182 "currentTab": 3 183 } 184 ], 185 "direction": "horizontal", 186 "width": 448.5, 187 "collapsed": true 188 }, 189 "left-ribbon": { 190 "hiddenItems": { 191 "templates:Insert template": false, 192 "command-palette:Open command palette": true, 193 "table-editor-obsidian:Advanced Tables Toolbar": true, 194 "omnisearch:Omnisearch": false, 195 "templater-obsidian:Templater": true, 196 "copilot:Copilot Chat": false, 197 "custom-sort:Toggle custom sorting": true, 198 "graph:Open graph view": false, 199 "workspaces:Manage workspace layouts": false 200 } 201 }, 202 "active": "abd43af7458c1918", 203 "lastOpenFiles": [ 204 "Foundations/Legal & Ethical Hacking/Documentation & Reporting.md", 205 "Offensive Security/Exploitation/Login Brute Forcing.md", 206 "Pasted image 20241023211139.png", 207 "Images", 208 "Images/Pasted image 20241023210901.png", 209 "Offensive Security/Reconnaissance/FFUF.md", 210 "Offensive Security/Reconnaissance/Nmap.md", 211 "Offensive Security/Exploitation/Hashcat.md", 212 "Offensive Security/Exploitation/Cross-Site Scripting (XSS).md", 213 "Resource & References/Techniques/Frequency Analysis.md", 214 "🛡️ Cybersecurity Knowledge Base.md", 215 "Resource & References/Tools/Mimikatz.md", 216 "Resource & References/Techniques/Kerberoasting attack.md", 217 "Resource & References/Tools/Responder.md", 218 "Resource & References/Tools", 219 "Resource & References/Tools/Hashid.md", 220 "Resource & References/Tools/hcxtools.md", 221 "Resource & References/Tools/airodump-ng.md", 222 "Resource & References/Tools/JohnTheRipper.md", 223 "Resource & References/Tools/Netcat.md", 224 "Templates/Tools.md", 225 "Resource & References/Techniques/Man-in-the-Middle (MitM).md", 226 "Resource & References/Techniques/Padding Oracle Attack.md", 227 "Templates/Techniques.md", 228 "Templates/Vulnerability.md", 229 "Foundations/Core Concepts/WPA and WPA2.md", 230 "WPA/WPA2.md", 231 "WPA", 232 "Foundations/Core Concepts/WPA", 233 "Offensive Security/Exploitation/Hashcat1.md", 234 "MD5.md", 235 "SHA256.md", 236 "SSL", 237 "copilot-conversations", 238 "Templates", 239 "Untitled.canvas", 240 "Offensive Security/Post-Exploitation", 241 "coding.jpg", 242 "Resource & References/Vulnerabilities", 243 "Offensive Security/Vulnerability Assessment" 244 ] 245 }