-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathbookmarks.json
More file actions
1 lines (1 loc) · 278 KB
/
bookmarks.json
File metadata and controls
1 lines (1 loc) · 278 KB
1
{"guid":"root________","title":"","index":0,"dateAdded":1745156633936000,"lastModified":1747142114959000,"id":1,"typeCode":2,"type":"text/x-moz-place-container","root":"placesRoot","children":[{"guid":"menu________","title":"menu","index":0,"dateAdded":1745156633936000,"lastModified":1747142114959000,"id":2,"typeCode":2,"type":"text/x-moz-place-container","root":"bookmarksMenuFolder"},{"guid":"toolbar_____","title":"toolbar","index":1,"dateAdded":1745156633936000,"lastModified":1747142114959000,"id":3,"typeCode":2,"type":"text/x-moz-place-container","root":"toolbarFolder","children":[{"guid":"GFuaFORHvEIL","title":"Getting Started","index":0,"dateAdded":1745156634497000,"lastModified":1745156634497000,"id":12,"typeCode":1,"iconUri":"https://www.mozilla.org/media/img/favicons/firefox/browser/favicon.f093404c0135.ico","type":"text/x-moz-place","uri":"https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaign=new-users&utm_content=-global"},{"guid":"Ipob5aUDfNhS","title":"امنیت سایبری پیشرفته - Unk9vvN","index":1,"dateAdded":1745225564498000,"lastModified":1745225564498000,"id":13,"typeCode":1,"iconUri":"http://unk9vvn.local/wp-content/uploads/2022/09/Unk9vvN-300x300.png","type":"text/x-moz-place","uri":"http://unk9vvn.local/"},{"guid":"rBnRmUtGNvSd","title":"Penetration Testing","index":2,"dateAdded":1698123884000000,"lastModified":1747142105609000,"id":26,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"OL6mR4rPuVxn","title":"Web","index":0,"dateAdded":1698123891000000,"lastModified":1746943954000000,"id":27,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"eA28ydamCt29","title":"Analyse your HTTP response headers","index":0,"dateAdded":1686002380000000,"lastModified":1718788940000000,"id":28,"typeCode":1,"iconUri":"https://securityheaders.com/images/favicon.ico","type":"text/x-moz-place","uri":"https://securityheaders.com/"},{"guid":"OXz-yjDavukX","title":"WordPress Recon and Security Testing | wprecon.com – Online WordPress Testing Tool to discover security related information and configuration issues.","index":1,"dateAdded":1685907357000000,"lastModified":1718788940000000,"id":29,"typeCode":1,"type":"text/x-moz-place","uri":"https://wprecon.com/"},{"guid":"QwGkFZ0HWugy","title":"URL and website scanner - urlscan.io","index":2,"dateAdded":1685902985000000,"lastModified":1718788940000000,"id":30,"typeCode":1,"iconUri":"https://urlscan.io/img/urlscan_256.png","type":"text/x-moz-place","uri":"https://urlscan.io/"},{"guid":"YXdPGDMn4nqJ","title":"GitHub - kaiiyer/awesome-vulnerable: A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.","index":3,"dateAdded":1732919905000000,"lastModified":1732974766000000,"id":31,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/kaiiyer/awesome-vulnerable"},{"guid":"XGaf3oQLpimY","title":"Request Catcher — record HTTP requests, webhooks, API calls","index":4,"dateAdded":1606499914000000,"lastModified":1718788940000000,"id":32,"typeCode":1,"type":"text/x-moz-place","uri":"https://requestcatcher.com/"},{"guid":"FgEvW8xQjqxa","title":"SharePoint Pre-Auth Code Injection RCE chain CVE-2023-29357 & CVE-2023-24955 PoC","index":5,"dateAdded":1744401067000000,"lastModified":1744898936000000,"id":33,"typeCode":1,"iconUri":"https://gist.github.com/fluidicon.png","type":"text/x-moz-place","uri":"https://gist.github.com/testanull/dac6029d306147e6cc8dce9424d09868"},{"guid":"X3KshSGE1Q9O","title":"CSP Header Inspector and Validator","index":6,"dateAdded":1648729267000000,"lastModified":1718788940000000,"id":34,"typeCode":1,"type":"text/x-moz-place","uri":"https://cspvalidator.org/#url=https://cspvalidator.org/"},{"guid":"GsFCzgRNDHww","title":"HSTS Preload List Submission","index":7,"dateAdded":1734108711000000,"lastModified":1734108719000000,"id":35,"typeCode":1,"type":"text/x-moz-place","uri":"https://hstspreload.org/"},{"guid":"SBqSYD7CR8r8","title":"Bugbounty Methodology","index":8,"dateAdded":1742042540000000,"lastModified":1744898879000000,"id":36,"typeCode":1,"iconUri":"https://cat-penguin-73d.notion.site/images/favicon.ico","type":"text/x-moz-place","uri":"https://cat-penguin-73d.notion.site/Bugbounty-Methodology-1b6b9a407c6a80a0acf6f3540e75369b"},{"guid":"ZtH7pAF3tp_Y","title":"AI Exchange","index":9,"dateAdded":1746567762000000,"lastModified":1746943789000000,"id":37,"typeCode":1,"iconUri":"https://owaspai.org/favicon-dark.svg","type":"text/x-moz-place","uri":"https://owaspai.org/"},{"guid":"Pa-c29wFky8U","title":"Secure & reliable LLMs | promptfoo","index":10,"dateAdded":1746569002000000,"lastModified":1746943954000000,"id":38,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.promptfoo.dev/"},{"guid":"JT25kQCCrtKt","title":"HackTricks - HackTricks","index":11,"dateAdded":1745842137000000,"lastModified":1745842149000000,"id":39,"typeCode":1,"iconUri":"https://book.hacktricks.wiki/en/favicon.svg","type":"text/x-moz-place","uri":"https://book.hacktricks.wiki/en/index.html"},{"guid":"NmRveksjNdUR","title":"CVE-2022-22005 Microsoft SharePoint RCE | HoangND","index":12,"dateAdded":1745359445000000,"lastModified":1745359473000000,"id":40,"typeCode":1,"iconUri":"https://hnd3884.github.io/assets/img/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://hnd3884.github.io/posts/cve-2022-22005-microsoft-sharepoint-RCE/"},{"guid":"4ruRr7U98mUE","title":"W01fh4cker/CVE-2024-30043-XXE: Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing","index":13,"dateAdded":1745359454000000,"lastModified":1745359467000000,"id":41,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/W01fh4cker/CVE-2024-30043-XXE"},{"guid":"MXNK_l9bJql9","title":"RhinoSecurityLabs/CVEs: Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs","index":14,"dateAdded":1745692045000000,"lastModified":1745945968000000,"id":42,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/RhinoSecurityLabs/CVEs"},{"guid":"MqffNUdB3MeB","title":"shreyaschavhan/advanced-sql-injection-for-awae","index":15,"dateAdded":1744898828000000,"lastModified":1744898911000000,"id":43,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/shreyaschavhan/advanced-sql-injection-for-awae"},{"guid":"CjMgx4M89XNS","title":"kleiton0x00/Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced queries for SQL Injection of all types.","index":16,"dateAdded":1744898797000000,"lastModified":1744898915000000,"id":44,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet"},{"guid":"-pCDaO6tnT_z","title":"daffainfo/Oneliner-Bugbounty: A collection oneliner scripts for bug bounty","index":17,"dateAdded":1743695153000000,"lastModified":1744898858000000,"id":45,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/daffainfo/Oneliner-Bugbounty"},{"guid":"Wj84-gIbNVJj","title":"dwisiswant0/awesome-oneliner-bugbounty: A collection of awesome one-liner scripts especially for bug bounty tips.","index":18,"dateAdded":1743695151000000,"lastModified":1744898853000000,"id":46,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/dwisiswant0/awesome-oneliner-bugbounty"},{"guid":"Z26p-S_szGzJ","title":"0xPugal/One-Liners: A collection of one-liners for bug bounty hunting.","index":19,"dateAdded":1743695147000000,"lastModified":1744898846000000,"id":47,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/0xPugal/One-Liners"},{"guid":"ES3HJE3R1ILS","title":"Advanced SQL Injection Techniques by nav1n0x | Advanced SQL Injection Techniques","index":20,"dateAdded":1744898086000000,"lastModified":1744898090000000,"id":48,"typeCode":1,"iconUri":"https://nav1n0x.gitbook.io/advanced-sql-injection-techniques/~gitbook/icon?size=small&theme=dark","type":"text/x-moz-place","uri":"https://nav1n0x.gitbook.io/advanced-sql-injection-techniques"},{"guid":"qCHH8B0gVM5u","title":"Mehdi0x90/Web_Hacking: Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.","index":21,"dateAdded":1744823984000000,"lastModified":1744896935000000,"id":49,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Mehdi0x90/Web_Hacking"},{"guid":"IL-57RQP_vtg","title":"EdOverflow/bugbounty-cheatsheet: A list of interesting payloads, tips and tricks for bug bounty hunters.","index":22,"dateAdded":1743533141000000,"lastModified":1743647169000000,"id":50,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/EdOverflow/bugbounty-cheatsheet"},{"guid":"pBi0oVc-08jF","title":"GrrrDog/Java-Deserialization-Cheat-Sheet: The cheat sheet about Java Deserialization vulnerabilities","index":23,"dateAdded":1740942836000000,"lastModified":1741127787000000,"id":51,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet"},{"guid":"0s1Lj7NjObMt","title":"Sivnerof/Sources-And-Sinks-Cheatsheet: A cheatsheet for common JavaScript sources and sinks that lead to potential vulnerabilities.","index":24,"dateAdded":1744499511000000,"lastModified":1744541344000000,"id":52,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Sivnerof/Sources-And-Sinks-Cheatsheet"},{"guid":"KbwsF8iiWz5r","title":"JSFuck - Write any JavaScript with 6 Characters: []()!+","index":25,"dateAdded":1742740387000000,"lastModified":1742740401000000,"id":53,"typeCode":1,"type":"text/x-moz-place","uri":"https://jsfuck.com/"},{"guid":"45iLNEUMczDa","title":"Fastest protection for WordPress security vulnerabilities - Patchstack","index":26,"dateAdded":1744495496000000,"lastModified":1744541359000000,"id":54,"typeCode":1,"iconUri":"https://patchstack.com/wp-content/uploads/2021/01/Logomark.svg","type":"text/x-moz-place","uri":"https://patchstack.com/"},{"guid":"YEktJ1jnDsoq","title":"huntr - The world’s first bug bounty platform for AI/ML","index":27,"dateAdded":1744495502000000,"lastModified":1744541354000000,"id":55,"typeCode":1,"type":"text/x-moz-place","uri":"https://huntr.com/"},{"guid":"i0o4gnHydIph","title":"WordPress Security Plugin | Wordfence","index":28,"dateAdded":1744495493000000,"lastModified":1744541366000000,"id":56,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.wordfence.com/"},{"guid":"btddr6jQx_uv","title":"JavaScript Obfuscator Tool","index":29,"dateAdded":1742740333000000,"lastModified":1742740416000000,"id":57,"typeCode":1,"type":"text/x-moz-place","uri":"https://obfuscator.io/"},{"guid":"icJcSnpA39by","title":"Obfuscator.io Deobfuscator","index":30,"dateAdded":1742740091000000,"lastModified":1742740430000000,"id":58,"typeCode":1,"type":"text/x-moz-place","uri":"https://obf-io.deobfuscate.io/"},{"guid":"xsqpOcIMFHBi","title":"JavaScript Deobfuscator","index":31,"dateAdded":1742740043000000,"lastModified":1742740439000000,"id":59,"typeCode":1,"type":"text/x-moz-place","uri":"https://deobfuscate.io/"},{"guid":"JX5ZS4tkOnP6","title":"The Cyberboy - YouTube","index":32,"dateAdded":1741429008000000,"lastModified":1742221239000000,"id":60,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/ee47b5e0/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/@the_cyb3rb0y/videos"},{"guid":"AXPCkVjCVPJP","title":"GraphQL Voyager","index":33,"dateAdded":1726987062000000,"lastModified":1726987071000000,"id":61,"typeCode":1,"iconUri":"https://graphql-kit.com/graphql-voyager/icons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://graphql-kit.com/graphql-voyager/"},{"guid":"6tAfgOrfUA7a","title":"watchTowr Labs","index":34,"dateAdded":1743444156000000,"lastModified":1743647217000000,"id":62,"typeCode":1,"iconUri":"https://labs.watchtowr.com/content/images/size/w256h256/2022/05/Logo.png","type":"text/x-moz-place","uri":"https://labs.watchtowr.com/"},{"guid":"BILB8FtVe1Eg","title":"Hackyx","index":35,"dateAdded":1728930951000000,"lastModified":1728933951000000,"id":63,"typeCode":1,"type":"text/x-moz-place","uri":"https://hackyx.io/"},{"guid":"mn4DoL77b-SR","title":"Dorkers","index":36,"dateAdded":1744495690000000,"lastModified":1744541348000000,"id":64,"typeCode":1,"type":"text/x-moz-place","uri":"https://dorks.s1rn3tz.ovh/"},{"guid":"9ZMyLcr2iXsO","title":"Synapsint","index":37,"dateAdded":1730986819000000,"lastModified":1731059423000000,"id":65,"typeCode":1,"iconUri":"https://synapsint.com/favicon.png","type":"text/x-moz-place","uri":"https://synapsint.com/"},{"guid":"YdJcCcdxzsbi","title":"Filebin","index":38,"dateAdded":1737157507000000,"lastModified":1737157513000000,"id":66,"typeCode":1,"iconUri":"https://filebin.net/static/img/favicon.png","type":"text/x-moz-place","uri":"https://filebin.net/"},{"guid":"5n079SKihrO7","title":"Piotr Bazydło (chudy)","index":39,"dateAdded":1744494162000000,"lastModified":1744541375000000,"id":67,"typeCode":1,"type":"text/x-moz-place","uri":"https://chudypb.github.io/"},{"guid":"osR1uszqh2hO","title":"FireBounty | The Ultimate Vulnerability Disclosure Policy and Bug Bounty List!","index":40,"dateAdded":1743461322000000,"lastModified":1743647209000000,"id":68,"typeCode":1,"iconUri":"https://firebounty.com/static/images/favicon.ico","type":"text/x-moz-place","uri":"https://firebounty.com/"},{"guid":"0oniX55YKZgu","title":"CSP Bypass Search","index":41,"dateAdded":1740872301000000,"lastModified":1740914551000000,"id":69,"typeCode":1,"type":"text/x-moz-place","uri":"https://cspbypass.com/"},{"guid":"JF2nA63rFh_8","title":"UTF-8 Visualizer","index":42,"dateAdded":1740804697000000,"lastModified":1740829429000000,"id":70,"typeCode":1,"iconUri":"data:image/svg+xml,<svg xmlns=%22http://www.w3.org/2000/svg%22 viewBox=%220 0 100 100%22><text y=%22.9em%22 font-size=%2290%22>%F0%9F%90%9B</text></svg>","type":"text/x-moz-place","uri":"https://sonarsource.github.io/utf8-visualizer/"},{"guid":"vidMYMrLFj6w","title":"Source Incite","index":43,"dateAdded":1735679454000000,"lastModified":1738614775000000,"id":71,"typeCode":1,"iconUri":"https://srcincite.io/assets/favicon.ico?","type":"text/x-moz-place","uri":"https://srcincite.io/"},{"guid":"t1epDeeeUyzX","title":"LostSec | Coffixp","index":44,"dateAdded":1739490994000000,"lastModified":1739567732000000,"id":72,"typeCode":1,"iconUri":"https://lostsec.xyz/spider.png","type":"text/x-moz-place","uri":"https://lostsec.xyz/"},{"guid":"My9mIqT683q2","title":"𝙇𝙤𝙨𝙩𝙨𝙚𝙘 - YouTube","index":45,"dateAdded":1739960813000000,"lastModified":1740057058000000,"id":73,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@lostsecc/videos"},{"guid":"RS1uIHYy2eG2","title":"Summoning Team","index":46,"dateAdded":1737582886000000,"lastModified":1737661059000000,"id":74,"typeCode":1,"iconUri":"https://summoning.team/favicon/favicon-32x32.png","type":"text/x-moz-place","uri":"https://summoning.team/"},{"guid":"uhADH4IAv0o2","title":"CSP Bypass Search","index":47,"dateAdded":1732314236000000,"lastModified":1732392091000000,"id":75,"typeCode":1,"type":"text/x-moz-place","uri":"http://cspbypass.com/"},{"guid":"tIJD827zX9Pl","title":"shifa123/Can-I-take-over-xyz-v2","index":48,"dateAdded":1739715126000000,"lastModified":1739715166000000,"id":76,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/shifa123/Can-I-take-over-xyz-v2"},{"guid":"8VT6k8pGkARz","title":"Documentation - Apollo GraphQL Docs","index":49,"dateAdded":1738789352000000,"lastModified":1738868752000000,"id":77,"typeCode":1,"iconUri":"https://www.apollographql.com/docs/favicon.svg","type":"text/x-moz-place","uri":"https://www.apollographql.com/docs"},{"guid":"q3CbT_9kgQw4","title":"WSTG - Latest | OWASP Foundation","index":50,"dateAdded":1738335038000000,"lastModified":1738344290000000,"id":78,"typeCode":1,"iconUri":"https://owasp.org/www--site-theme/favicon.ico","type":"text/x-moz-place","uri":"https://owasp.org/www-project-web-security-testing-guide/latest/"},{"guid":"Tx_OFAtPvONh","title":"Writeups List | WriteupDB","index":51,"dateAdded":1740003438000000,"lastModified":1740057048000000,"id":79,"typeCode":1,"iconUri":"https://www.writeup-db.com/wp-content/uploads/2024/07/cropped-400x400-1-32x32.jpg","type":"text/x-moz-place","uri":"https://www.writeup-db.com/writeups-list/"},{"guid":"ORayfw1x6po8","title":"ioc[.]one - OSINT Cyber Threat Intelligence Database","index":52,"dateAdded":1740003446000000,"lastModified":1740057040000000,"id":80,"typeCode":1,"iconUri":"https://ioc.one/static/img/favicon.png","type":"text/x-moz-place","uri":"https://ioc.one/auth/website?search=xss&status="},{"guid":"EAb7OwTy_XEi","title":"BugBountyHunting.com - A community-curated Resource for Bug Bounty Hunting","index":53,"dateAdded":1740003444000000,"lastModified":1740057039000000,"id":81,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.bugbountyhunting.com/"},{"guid":"_J2lNFrbwJd_","title":"tuhin1729/Bug-Bounty-Methodology: These are my checklists which I use during my hunting.","index":54,"dateAdded":1740002854000000,"lastModified":1740002861000000,"id":82,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tuhin1729/Bug-Bounty-Methodology"},{"guid":"rtC0mWvJPoKL","title":"0xmaximus/Galaxy-Bugbounty-Checklist: Tips and Tutorials for Bug Bounty and also Penetration Tests.","index":55,"dateAdded":1739736620000000,"lastModified":1739741248000000,"id":83,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist"},{"guid":"IweHFreUDFzg","title":"ODIN - Powerful Internet Scanning Search Engine","index":56,"dateAdded":1739564632000000,"lastModified":1739565661000000,"id":84,"typeCode":1,"type":"text/x-moz-place","uri":"https://odin.io/"},{"guid":"wzPspES_SunC","title":"WebVM - Linux virtualization in WebAssembly","index":57,"dateAdded":1731837491000000,"lastModified":1731886967000000,"id":85,"typeCode":1,"iconUri":"https://webvm.io/tower.ico","type":"text/x-moz-place","uri":"https://webvm.io/"},{"guid":"d6AhfJEAS0eY","title":"GitHub - testanull/MS-SharePoint-July-Patch-RCE-PoC","index":58,"dateAdded":1731440360000000,"lastModified":1731704489000000,"id":86,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/testanull/MS-SharePoint-July-Patch-RCE-PoC"},{"guid":"TaSK76H4c81a","title":"Coalfire-Research/java-deserialization-exploits: A collection of curated Java Deserialization Exploits","index":59,"dateAdded":1739309253000000,"lastModified":1739388469000000,"id":87,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Coalfire-Research/java-deserialization-exploits"},{"guid":"8kv5SRuH8nl0","title":"URL validation bypass cheat sheet for SSRF/CORS/Redirect - 2024 Edition | Web Security Academy","index":60,"dateAdded":1734204067000000,"lastModified":1734302698000000,"id":88,"typeCode":1,"iconUri":"https://portswigger.net/content/images/logos/favicon.ico","type":"text/x-moz-place","uri":"https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet"},{"guid":"owpROfQ7OJXF","title":"Base91 Encoding - Base 91 Online Decoder, Encoder, Translator","index":61,"dateAdded":1734929772000000,"lastModified":1735213957000000,"id":89,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.dcode.fr/base-91-encoding"},{"guid":"6Wz7KfyRv3eC","title":"The SQL Injection Knowledge Base","index":62,"dateAdded":1733270292000000,"lastModified":1733272340000000,"id":90,"typeCode":1,"charset":"windows-1252","type":"text/x-moz-place","uri":"https://websec.ca/kb/sql_injection"},{"guid":"i38LjaZeo6nC","title":"ScrapeOps - The DevOps Tool For Web Scraping. | ScrapeOps","index":63,"dateAdded":1681071019000000,"lastModified":1718788940000000,"id":91,"typeCode":1,"type":"text/x-moz-place","uri":"https://scrapeops.io/"},{"guid":"RFKhxXd7WRyR","title":"Az0x7/vulnerability-Checklist: This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter","index":64,"dateAdded":1704314332000000,"lastModified":1718788940000000,"id":92,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Az0x7/vulnerability-Checklist"},{"guid":"0tThaxspCRts","title":"softwaresecured/secure-code-review-checklist: A starter secure code review checklist","index":65,"dateAdded":1714344886000000,"lastModified":1718788940000000,"id":93,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/softwaresecured/secure-code-review-checklist"},{"guid":"4pPXDArfy9XR","title":"Pentesting Web checklist - Pentest Book","index":66,"dateAdded":1707750644000000,"lastModified":1718788940000000,"id":94,"typeCode":1,"iconUri":"https://1729840239-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/spaces%2F-M5x1LJiRQvXWpt04_ee%2Favatar-1589202873787.png?generation=1589202874039238&alt=media","type":"text/x-moz-place","uri":"https://pentestbook.six2dez.com/others/web-checklist"},{"guid":"y5WTlOjjTfdH","title":"0xdf hacks stuff | CTF solutions, malware analysis, home lab development","index":67,"dateAdded":1732974747000000,"lastModified":1732974757000000,"id":95,"typeCode":1,"iconUri":"https://0xdf.gitlab.io/assets/icons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://0xdf.gitlab.io/"},{"guid":"nHoFVtQYDui9","title":"JSfuck Decoder | De-Obfuscator","index":68,"dateAdded":1721565816000000,"lastModified":1721569774000000,"id":96,"typeCode":1,"iconUri":"https://enkhee-osiris.github.io/Decoder-JSFuck/assets/favicon-32x32.png","type":"text/x-moz-place","uri":"https://enkhee-osiris.github.io/Decoder-JSFuck/"},{"guid":"1kd9mhlKHIce","title":"Published | Zero Day Initiative","index":69,"dateAdded":1734050245000000,"lastModified":1734050461000000,"id":97,"typeCode":1,"iconUri":"https://www.zerodayinitiative.com/images/favicon.png?v1","type":"text/x-moz-place","uri":"https://www.zerodayinitiative.com/advisories/published/"},{"guid":"2c1ZXjRIrQxD","title":"Welcome to Invicti Learn | Invicti","index":70,"dateAdded":1732835491000000,"lastModified":1732974785000000,"id":98,"typeCode":1,"iconUri":"https://cdn.invicti.com/app/uploads/2022/03/08125959/cropped-favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.invicti.com/learn/"},{"guid":"CFkXnO9xslNH","title":"Ruffle - Flash Emulator","index":71,"dateAdded":1737229932000000,"lastModified":1737235143000000,"id":99,"typeCode":1,"iconUri":"https://ruffle.rs/favicon-32.png","type":"text/x-moz-place","uri":"https://ruffle.rs/"},{"guid":"WZdCAEbANN0m","title":"Canarytokens","index":72,"dateAdded":1721030323000000,"lastModified":1721304094000000,"id":100,"typeCode":1,"iconUri":"https://canarytokens.org/resources/favicon.ico","type":"text/x-moz-place","uri":"https://canarytokens.org/generate"},{"guid":"Z_3f7yBnocpZ","title":"Introduction - OWASP Cheat Sheet Series","index":73,"dateAdded":1734107187000000,"lastModified":1734108666000000,"id":101,"typeCode":1,"iconUri":"https://cheatsheetseries.owasp.org/assets/WebSite_Favicon.png","type":"text/x-moz-place","uri":"https://cheatsheetseries.owasp.org/"},{"guid":"cs7fdo7QqG-o","title":"Master Web Hacking and Security Code Review!","index":74,"dateAdded":1732569370000000,"lastModified":1732577011000000,"id":102,"typeCode":1,"iconUri":"https://assets.pentesterlab.com/favicon.ico","type":"text/x-moz-place","uri":"https://pentesterlab.com/"},{"guid":"wBqCLdW2flLA","title":"urlDNA | The DNA test for websites","index":75,"dateAdded":1729332385000000,"lastModified":1729543475000000,"id":103,"typeCode":1,"type":"text/x-moz-place","uri":"https://urldna.io/"},{"guid":"DHvp_-vx6cym","title":"OWASP/API-Security: OWASP API Security Project","index":76,"dateAdded":1732749460000000,"lastModified":1732787842000000,"id":104,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/OWASP/API-Security"},{"guid":"ebLTC7zyU7rO","title":"[P2O Vancouver 2023] SharePoint Pre-Auth RCE chain (CVE-2023–29357 & CVE-2023–24955) | STAR Labs","index":77,"dateAdded":1733254589000000,"lastModified":1733272334000000,"id":105,"typeCode":1,"iconUri":"https://starlabs.sg/logo-white.png","type":"text/x-moz-place","uri":"https://starlabs.sg/blog/2023/09-sharepoint-pre-auth-rce-chain/"},{"guid":"g4xzpLdN-qe5","title":"Cyber-Guy1/API-SecurityEmpire: API Security Project aims to present unique attack & defense methods in API Security field","index":78,"dateAdded":1732746880000000,"lastModified":1732787852000000,"id":106,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/Cyber-Guy1/API-SecurityEmpire"},{"guid":"umd8pUlqKr7a","title":"Google Dorks for Bug Bounty","index":79,"dateAdded":1722247238000000,"lastModified":1722248818000000,"id":107,"typeCode":1,"type":"text/x-moz-place","uri":"https://taksec.github.io/google-dorks-bug-bounty/"},{"guid":"XVdx3R36P0Ba","title":"GitHub - nixawk/labs: Vulnerability Labs for security analysis","index":80,"dateAdded":1732919332000000,"lastModified":1732974773000000,"id":108,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/nixawk/labs"},{"guid":"SI3-2jQ1XL4y","title":"Voorivex/bb-resouces","index":81,"dateAdded":1739136522000000,"lastModified":1739276515000000,"id":109,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Voorivex/bb-resouces"},{"guid":"gTdvbRR8cBjC","title":"XSS.Report","index":82,"dateAdded":1720640762000000,"lastModified":1720646156000000,"id":110,"typeCode":1,"type":"text/x-moz-place","uri":"https://xss.report/"},{"guid":"ToRmP_SUruAA","title":"The Hacker Recipes","index":83,"dateAdded":1731512394000000,"lastModified":1731512400000000,"id":111,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.thehacker.recipes/"},{"guid":"CXaGyNz5AY3z","title":"https://easytoyou.eu/decoders","index":84,"dateAdded":1729521378000000,"lastModified":1729543463000000,"id":112,"typeCode":1,"iconUri":"https://easytoyou.eu/gfx/img/favicon.ico","type":"text/x-moz-place","uri":"https://easytoyou.eu/decoders"},{"guid":"IIPHNT8R4Zhe","title":"hahwul/WebHackersWeapons: ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting","index":85,"dateAdded":1726377755000000,"lastModified":1726379955000000,"id":113,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/hahwul/WebHackersWeapons"},{"guid":"9TPw_G9qI23D","title":"Introduction | Security Knowledge Framework","index":86,"dateAdded":1721818709000000,"lastModified":1721824278000000,"id":114,"typeCode":1,"type":"text/x-moz-place","uri":"https://skf.gitbook.io/asvs-write-ups"},{"guid":"MKGusHi_gmar","title":"HackTricks | HackTricks | HackTricks","index":87,"dateAdded":1715188645000000,"lastModified":1718788940000000,"id":115,"typeCode":1,"iconUri":"https://2783428383-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/collections%2FmuMguNrsRx2mNyNqEox4%2Ficon%2F1qCJ0VIDlWcvGSecYCDq%2Ffondo.png?alt=media&token=1e721267-450f-43f3-861b-6c4f93278e93","type":"text/x-moz-place","uri":"https://book.hacktricks.xyz/"},{"guid":"17XWQz-2ydGM","title":"thezdi/PoC: Proofs-of-concept","index":88,"dateAdded":1731071626000000,"lastModified":1731185941000000,"id":116,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/thezdi/PoC"},{"guid":"lTydGPyIwZ6j","title":"Go Tutorial (Golang) for Beginners - YouTube","index":89,"dateAdded":1719322389000000,"lastModified":1719322404000000,"id":117,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/252a8b44/img/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PL4cUxeGkcC9gC88BEo9czgyS72A3doDeM"},{"guid":"y9Dn7igvljp1","title":"OWASP/www-project-smart-contract-top-10: OWASP Smart Contract Top 10","index":90,"dateAdded":1713281307000000,"lastModified":1718788940000000,"id":118,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/OWASP/www-project-smart-contract-top-10"},{"guid":"uVdNw6OJWpqp","title":"80vul/phpcodz: Php Codz Hacking","index":91,"dateAdded":1729056457000000,"lastModified":1729056472000000,"id":119,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/80vul/phpcodz"},{"guid":"_GlXSWCi-Uz6","title":"H1 Report Notes - Shreyas Chavhan (Shared)","index":92,"dateAdded":1711822492000000,"lastModified":1718788940000000,"id":120,"typeCode":1,"type":"text/x-moz-place","uri":"https://fork-glass-a4c.notion.site/H1-Report-Notes-Shreyas-Chavhan-Shared-c2c9e990d2474d288626da2604bd4498"},{"guid":"LEVkzBnM0u-f","title":"Code Beautify and Code Formatter For Developers - to Beautify, Validate, Minify, JSON, XML, JavaScript, CSS, HTML, Excel and more","index":93,"dateAdded":1713651251000000,"lastModified":1718788940000000,"id":121,"typeCode":1,"iconUri":"https://codebeautify.org/img/cb.png","type":"text/x-moz-place","uri":"https://codebeautify.org/"},{"guid":"LGZXhkcj3YDU","title":"EthToolbox - Toolbox for Ethereum Developers","index":94,"dateAdded":1714391114000000,"lastModified":1718788940000000,"id":122,"typeCode":1,"type":"text/x-moz-place","uri":"https://eth-toolbox.com/"},{"guid":"ncmU-JAx_et0","title":"xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes","index":95,"dateAdded":1719403361000000,"lastModified":1719403369000000,"id":123,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes"},{"guid":"2smncz7J5NZq","title":"EVM Bytecode Decompiler | Dedaub Security Suite","index":96,"dateAdded":1714389984000000,"lastModified":1718788940000000,"id":124,"typeCode":1,"type":"text/x-moz-place","uri":"https://app.dedaub.com/decompile"},{"guid":"VotspvWlXk_r","title":"Polygon PoS Chain (MATIC) Blockchain Explorer","index":97,"dateAdded":1714387276000000,"lastModified":1718788940000000,"id":125,"typeCode":1,"type":"text/x-moz-place","uri":"https://polygonscan.com/"},{"guid":"8o_Vbsg96W_N","title":"BNB Smart Chain (BNB) Blockchain Explorer","index":98,"dateAdded":1714387272000000,"lastModified":1718788940000000,"id":126,"typeCode":1,"type":"text/x-moz-place","uri":"https://bscscan.com/"},{"guid":"TxBjaGs17ppv","title":"Hadi Soleimany - YouTube","index":99,"dateAdded":1716490879000000,"lastModified":1718788940000000,"id":127,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@hadi.soleimany/videos"},{"guid":"10vPht5bbEjd","title":"Babak Nodoust - YouTube","index":100,"dateAdded":1716728103000000,"lastModified":1718788940000000,"id":128,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@babaknodoust2478/videos"},{"guid":"lAseQUI0O0In","title":"Payloads All The Things","index":101,"dateAdded":1712490664000000,"lastModified":1718788940000000,"id":129,"typeCode":1,"type":"text/x-moz-place","uri":"https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/"},{"guid":"QWn1hbE1vRJw","title":"Projectdiscovery.io | Chaos","index":102,"dateAdded":1660107501000000,"lastModified":1718788940000000,"id":130,"typeCode":1,"type":"text/x-moz-place","uri":"https://chaos.projectdiscovery.io/#/"},{"guid":"U5xro4D0Ss2w","title":"orangetw/My-Presentation-Slides: Collections of Orange Tsai's public presentation slides.","index":103,"dateAdded":1719350382000000,"lastModified":1719352089000000,"id":131,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/orangetw/My-Presentation-Slides"},{"guid":"3lwkfetiBxhE","title":"google/google-ctf: Google CTF","index":104,"dateAdded":1718228188000000,"lastModified":1718788940000000,"id":132,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/google/google-ctf"},{"guid":"gILojt-RBXmq","title":"IANA Character Sets","index":105,"dateAdded":1623766521000000,"lastModified":1718788940000000,"id":133,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.compart.com/en/unicode/charsets"},{"guid":"Aif6S-Ij6SFe","title":"/home/six2dez/.pentest-book | Pentest Book","index":106,"dateAdded":1713269035000000,"lastModified":1718788940000000,"id":134,"typeCode":1,"iconUri":"https://pentestbook.six2dez.com/~gitbook/image?url=https%3A%2F%2F1729840239-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-legacy-files%2Fo%2Fspaces%252F-M5x1LJiRQvXWpt04_ee%252Favatar-1589202873787.png%3Fgeneration%3D1589202874039238%26alt%3Dmedia&width=48&height=48&sign=b97284ce&sv=2","type":"text/x-moz-place","uri":"https://pentestbook.six2dez.com/"},{"guid":"NOAPH4vE3Tdg","title":"httpbin.org","index":107,"dateAdded":1664491086000000,"lastModified":1718788940000000,"id":135,"typeCode":1,"type":"text/x-moz-place","uri":"https://httpbin.org/"},{"guid":"fIMgAaQQXE6H","title":"Postman API Platform","index":108,"dateAdded":1708692356000000,"lastModified":1718788940000000,"id":136,"typeCode":1,"iconUri":"https://web.postman.co/_ar-assets/images/favicon-1-32.png","type":"text/x-moz-place","uri":"https://web.postman.co/"},{"guid":"-bHH_x-siLgf","title":"APIs (Free Tutorials, SDK Documentation & Pricing) | RapidAPI","index":109,"dateAdded":1708692298000000,"lastModified":1718788940000000,"id":137,"typeCode":1,"type":"text/x-moz-place","uri":"https://rapidapi.com/search/"},{"guid":"il5Fj09o93WE","title":"APIs.guru","index":110,"dateAdded":1708692306000000,"lastModified":1718788940000000,"id":138,"typeCode":1,"type":"text/x-moz-place","uri":"https://apis.guru/"},{"guid":"RE-3RyhxL4Is","title":"Hashes.org","index":111,"dateAdded":1598561690000000,"lastModified":1718788940000000,"id":139,"typeCode":1,"type":"text/x-moz-place","uri":"https://hashes.org/"},{"guid":"wdlpS-pIQxiO","title":"Graphic playground for Graph QL & online IDE | GraphQL Editor","index":112,"dateAdded":1615994917000000,"lastModified":1718788940000000,"id":140,"typeCode":1,"type":"text/x-moz-place","uri":"https://graphqleditor.com/"},{"guid":"5WcUuaIh6_l9","title":"JorNOT - check Joomla! version","index":113,"dateAdded":1624638921000000,"lastModified":1718788940000000,"id":141,"typeCode":1,"type":"text/x-moz-place","uri":"https://jornot.com/"},{"guid":"GBWH4b8x9Qt9","title":"Hookbin - Capture and inspect HTTP requests","index":114,"dateAdded":1624890794000000,"lastModified":1718788940000000,"id":142,"typeCode":1,"type":"text/x-moz-place","uri":"https://hookbin.com/"},{"guid":"Fu6MOZPYccEx","title":"Cross-Site WebSocket Hijacking Tester","index":115,"dateAdded":1625780538000000,"lastModified":1718788940000000,"id":143,"typeCode":1,"type":"text/x-moz-place","uri":"https://cow.cat/cswsh.html"},{"guid":"6yVmXx53Wyhm","title":"RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks","index":116,"dateAdded":1625780514000000,"lastModified":1718788940000000,"id":144,"typeCode":1,"type":"text/x-moz-place","uri":"https://requestbin.com/"},{"guid":"9E6Zzn4iIajj","title":"CodeQL","index":117,"dateAdded":1649427459000000,"lastModified":1718788940000000,"id":145,"typeCode":1,"iconUri":"https://codeql.github.com/assets/img/favicons/android-favicon.png","type":"text/x-moz-place","uri":"https://codeql.github.com/"},{"guid":"jvOyoGsNDzaQ","title":"GraphQL Voyager","index":118,"dateAdded":1647396672000000,"lastModified":1718788940000000,"id":146,"typeCode":1,"type":"text/x-moz-place","uri":"https://apis.guru/graphql-voyager/"},{"guid":"EXNeWl2Mneia","title":"SonarSource Code Analyzers Rules Explorer","index":119,"dateAdded":1647933893000000,"lastModified":1718788940000000,"id":147,"typeCode":1,"type":"text/x-moz-place","uri":"https://rules.sonarsource.com/"},{"guid":"cU8k88c0ZugI","title":"Exploitalert - database of exploits","index":120,"dateAdded":1647627998000000,"lastModified":1718788940000000,"id":148,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.exploitalert.com/"},{"guid":"7g_16Ew3JC9l","title":"WordPress Vulnerabilities","index":121,"dateAdded":1640723436000000,"lastModified":1718788940000000,"id":149,"typeCode":1,"iconUri":"https://wpscan.com/wp-content/uploads/2023/08/cropped-83c25-favicon.png?w=32","type":"text/x-moz-place","uri":"https://wpscan.com/wordpresses"},{"guid":"E50Dk2VjzFru","title":"All Web Security Academy topics | Web Security Academy - PortSwigger","index":122,"dateAdded":1708691658000000,"lastModified":1718788940000000,"id":150,"typeCode":1,"iconUri":"https://portswigger.net/content/images/logos/favicon.ico","type":"text/x-moz-place","uri":"https://portswigger.net/web-security/all-topics"},{"guid":"QTkIh8CT_fE1","title":"XSS Payloads","index":123,"dateAdded":1677000335000000,"lastModified":1718788940000000,"id":151,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.xss-payloads.com/index.html"},{"guid":"OxNxWMBkH8xz","title":"XSS Hunter","index":124,"dateAdded":1670917754000000,"lastModified":1718788940000000,"id":152,"typeCode":1,"type":"text/x-moz-place","uri":"https://xsshunter.com/"},{"guid":"qZeDhLuvtVL0","title":"Vulnerability DB | Snyk","index":125,"dateAdded":1658700424000000,"lastModified":1718788940000000,"id":153,"typeCode":1,"iconUri":"https://snyk.io/favicon.ico","type":"text/x-moz-place","uri":"https://security.snyk.io/vuln"},{"guid":"cV4OIiLBmX8a","title":"User Agents","index":126,"dateAdded":1673052860000000,"lastModified":1718788940000000,"id":154,"typeCode":1,"type":"text/x-moz-place","uri":"https://user-agents.net/"},{"guid":"vMgcRFlp9aib","title":"What Web Can Do Today","index":127,"dateAdded":1677724353000000,"lastModified":1718788940000000,"id":155,"typeCode":1,"type":"text/x-moz-place","uri":"https://whatwebcando.today/"},{"guid":"HjdfV4aivQ_t","title":"GitHub - shieldfy/API-Security-Checklist: Checklist of the most important security countermeasures when designing, testing, and releasing your API","index":128,"dateAdded":1646088063000000,"lastModified":1718788940000000,"id":156,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/shieldfy/API-Security-Checklist"},{"guid":"NcdZT9Dd1aCG","title":"hide01.ir - Advanced Web Attacks and Exploitation (WEB-300)","index":129,"dateAdded":1663604609000000,"lastModified":1718788940000000,"id":157,"typeCode":1,"type":"text/x-moz-place","uri":"https://awae.hide01.ir/"},{"guid":"aKWN2Y_TsuSu","title":"OWASP SAMM","index":130,"dateAdded":1672376474000000,"lastModified":1718788940000000,"id":158,"typeCode":1,"type":"text/x-moz-place","uri":"https://owaspsamm.org/"},{"guid":"yHpU0-63I3bn","title":"wstg/checklists at master · OWASP/wstg · GitHub","index":131,"dateAdded":1672392217000000,"lastModified":1718788940000000,"id":159,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/OWASP/wstg"},{"guid":"p1fgpDe3tpm1","title":"Find Subdomains Online | Pentest-Tools.com","index":132,"dateAdded":1598320323000000,"lastModified":1718788940000000,"id":160,"typeCode":1,"type":"text/x-moz-place","uri":"https://pentest-tools.com/information-gathering/find-subdomains-of-domain"},{"guid":"jaTqW7sLRJ1Y","title":"Subdomain Finder - C99.nl","index":133,"dateAdded":1682076573000000,"lastModified":1718788940000000,"id":161,"typeCode":1,"iconUri":"https://subdomainfinder.c99.nl/assets/favicon-32.png","type":"text/x-moz-place","uri":"https://subdomainfinder.c99.nl/"},{"guid":"B_q50j9apnK1","title":"Columbus Project - A fast, API-first subdomain discovery service with advanced queries.","index":134,"dateAdded":1694608284000000,"lastModified":1718788940000000,"id":162,"typeCode":1,"type":"text/x-moz-place","uri":"https://columbus.elmasy.com/"},{"guid":"SqbQL244wajF","title":"Cross-Site Scripting (XSS) Cheat Sheet - 2020 Edition | Web Security Academy","index":135,"dateAdded":1607799013000000,"lastModified":1718788940000000,"id":163,"typeCode":1,"type":"text/x-moz-place","uri":"https://portswigger.net/web-security/cross-site-scripting/cheat-sheet"},{"guid":"z2yu_JYBVVVX","title":"CSP Scanner - Content Security Policy Check | Analyze Bypasses","index":136,"dateAdded":1648729272000000,"lastModified":1718788940000000,"id":164,"typeCode":1,"type":"text/x-moz-place","uri":"https://cspscanner.com/"},{"guid":"5Vi6Y-m8mgJI","title":"Web application firewalls bypasses collection and testing tools – How to test, evaluate, compare, and bypass web application and API security solutions like WAF, NGWAF, RASP, and WAAP","index":137,"dateAdded":1647634960000000,"lastModified":1718788940000000,"id":165,"typeCode":1,"type":"text/x-moz-place","uri":"https://waf-bypass.com/"},{"guid":"yKVzuni9L86G","title":"CSP Evaluator","index":138,"dateAdded":1658894559000000,"lastModified":1718788940000000,"id":166,"typeCode":1,"iconUri":"https://csp-evaluator.withgoogle.com/static/favicon.ico","type":"text/x-moz-place","uri":"https://csp-evaluator.withgoogle.com/"},{"guid":"CO7EXXzAhlpt","title":"JSON Crack - Crack your data into pieces","index":139,"dateAdded":1663126817000000,"lastModified":1718788940000000,"id":167,"typeCode":1,"type":"text/x-moz-place","uri":"https://jsoncrack.com/"},{"guid":"0G49KZ3-hdx4","title":"Detect My WP - Fastest WordPress Detector","index":140,"dateAdded":1663529376000000,"lastModified":1718788940000000,"id":168,"typeCode":1,"type":"text/x-moz-place","uri":"https://detectmywp.com/"},{"guid":"yY6NNCi0K6eS","title":"IsItWP - Free WordPress Theme Detector","index":141,"dateAdded":1663529387000000,"lastModified":1718788940000000,"id":169,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.isitwp.com/"},{"guid":"vRoLTkG-FWIL","title":"All labs | Web Security Academy","index":142,"dateAdded":1662981953000000,"lastModified":1718788940000000,"id":170,"typeCode":1,"type":"text/x-moz-place","uri":"https://portswigger.net/web-security/all-labs"},{"guid":"UR_4XoqDr_PB","title":"SPF -all Domain Survey","index":143,"dateAdded":1672074581000000,"lastModified":1718788940000000,"id":171,"typeCode":1,"type":"text/x-moz-place","uri":"https://spf-all.com/"},{"guid":"HyYd9gcVXtFr","title":"Offensive AI - Bounty","index":144,"dateAdded":1608921527000000,"lastModified":1718788940000000,"id":172,"typeCode":1,"type":"text/x-moz-place","uri":"https://bounty.offensiveai.com/"},{"guid":"Fy2Yte7Z5RGQ","title":"Zone-H.org - Unrestricted information","index":145,"dateAdded":1598335390000000,"lastModified":1718788940000000,"id":173,"typeCode":1,"type":"text/x-moz-place","uri":"http://zone-h.org/"},{"guid":"3690ieHXnIRM","title":"Nuclei - AI-Powered Template Generation and Scanning","index":146,"dateAdded":1694683756000000,"lastModified":1718788940000000,"id":174,"typeCode":1,"type":"text/x-moz-place","uri":"https://templates.nuclei.sh/"},{"guid":"EQAVK9Imy4jN","title":"Cheat Sheets | pentestmonkey","index":147,"dateAdded":1686002485000000,"lastModified":1718788940000000,"id":175,"typeCode":1,"type":"text/x-moz-place","uri":"https://pentestmonkey.net/category/cheat-sheet"},{"guid":"60ZfhMLd0rKo","title":"payloadbox/xss-payload-list: 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List","index":148,"dateAdded":1685896289000000,"lastModified":1718788940000000,"id":176,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/payloadbox/xss-payload-list"},{"guid":"M7XD83ByXX-U","title":"https://security.love/CSRF-PoC-Genorator/","index":149,"dateAdded":1685900841000000,"lastModified":1718788940000000,"id":177,"typeCode":1,"type":"text/x-moz-place","uri":"https://security.love/CSRF-PoC-Genorator/"},{"guid":"U-0w1USZq4Fm","title":"Bug Bounty Cheatsheet","index":150,"dateAdded":1685907381000000,"lastModified":1718788940000000,"id":178,"typeCode":1,"type":"text/x-moz-place","uri":"https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html"},{"guid":"YLt471m9Q6On","title":"swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF","index":151,"dateAdded":1685907421000000,"lastModified":1718788940000000,"id":179,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/swisskyrepo/PayloadsAllTheThings"},{"guid":"bbDrxowEuQ67","title":"daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)","index":152,"dateAdded":1685907556000000,"lastModified":1718788940000000,"id":180,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/daffainfo/AllAboutBugBounty"},{"guid":"ui6RY0MjvFoq","title":"execute PHP online - functions-online","index":153,"dateAdded":1598515512000000,"lastModified":1718788940000000,"id":181,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.functions-online.com/"},{"guid":"p1DWjzEj-KSJ","title":"DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc).","index":154,"dateAdded":1598518006000000,"lastModified":1718788940000000,"id":182,"typeCode":1,"type":"text/x-moz-place","uri":"http://ddecode.com/phpdecoder/"},{"guid":"5fdKhSXHt2sx","title":"JS NICE: Statistical renaming, Type inference and Deobfuscation","index":155,"dateAdded":1598521629000000,"lastModified":1718788940000000,"id":183,"typeCode":1,"type":"text/x-moz-place","uri":"http://jsnice.org/"},{"guid":"PrhrSW7gDh-t","title":"Online JavaScript beautifier","index":156,"dateAdded":1598521635000000,"lastModified":1718788940000000,"id":184,"typeCode":1,"iconUri":"https://beautifier.io/web/favicon.png","type":"text/x-moz-place","uri":"https://beautifier.io/"},{"guid":"usfaKpXV1v4l","title":"jjencode - Encode any JavaScript program using only symbols","index":157,"dateAdded":1600802383000000,"lastModified":1718788940000000,"id":185,"typeCode":1,"type":"text/x-moz-place","uri":"https://utf-8.jp/public/jjencode.html"},{"guid":"cKsEVna8wgkh","title":"JSON Web Tokens - jwt.io","index":158,"dateAdded":1601793278000000,"lastModified":1718788940000000,"id":186,"typeCode":1,"iconUri":"https://jwt.io/icon/32?93edc2b0d0185625","type":"text/x-moz-place","uri":"https://jwt.io/"},{"guid":"DyskhRjXkhlc","title":"dCode - Solvers, Ciphers, Calculators, Decoders, Online","index":159,"dateAdded":1601745342000000,"lastModified":1718788940000000,"id":187,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.dcode.fr/en"},{"guid":"a5r15t7SRTZM","title":"URL Decode and Encode - Online","index":160,"dateAdded":1601897706000000,"lastModified":1718788940000000,"id":188,"typeCode":1,"iconUri":"https://cdn.urldecoder.org/assets/images/url-32.png","type":"text/x-moz-place","uri":"https://www.urldecoder.org/"},{"guid":"giLqal4mmvbG","title":"Base64 Decode and Encode - Online","index":161,"dateAdded":1601897696000000,"lastModified":1718788940000000,"id":189,"typeCode":1,"iconUri":"https://cdn.base64decode.org/assets/images/b64-32.png","type":"text/x-moz-place","uri":"https://www.base64decode.org/"},{"guid":"pUq_jhQBdL_o","title":"Assetnote Wordlists","index":162,"dateAdded":1642623591000000,"lastModified":1718788940000000,"id":190,"typeCode":1,"type":"text/x-moz-place","uri":"https://wordlists.assetnote.io/"},{"guid":"S76hKI3lNBw7","title":"HTML Decode Online","index":163,"dateAdded":1672741598000000,"lastModified":1718788940000000,"id":191,"typeCode":1,"iconUri":"https://emn178.github.io/online-tools/images/logo.svg","type":"text/x-moz-place","uri":"https://emn178.github.io/online-tools/html_decode.html"},{"guid":"n-1XznCog8J4","title":"MD5 Online | Free MD5 Decryption, MD5 Hash Decoder","index":164,"dateAdded":1679143957000000,"lastModified":1718788940000000,"id":192,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.md5online.org/md5-decrypt.html"},{"guid":"yhWbhkmaOqUY","title":"php-reverse-shell/php-reverse-shell.php at master · pentestmonkey/php-reverse-shell","index":165,"dateAdded":1685999696000000,"lastModified":1718788940000000,"id":193,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php"},{"guid":"UGyazmATm_Za","title":"Online - Reverse Shell Generator","index":166,"dateAdded":1685885331000000,"lastModified":1718788940000000,"id":194,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.revshells.com/"},{"guid":"UXkGSxqPyM7o","title":"Become a bug bounty hunter - Learn about web application vulnerabilities and how to find them on bug bounty programs | BugBountyHunter.com","index":167,"dateAdded":1685896365000000,"lastModified":1718788940000000,"id":195,"typeCode":1,"iconUri":"https://www.bugbountyhunter.com/assets/favicons/favicon.ico","type":"text/x-moz-place","uri":"https://www.bugbountyhunter.com/"},{"guid":"CfnBqlA6gwGe","title":"(6) NahamSec - YouTube","index":168,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":196,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/780e45f1/img/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/@NahamSec"},{"guid":"drqM0OwWnoJZ","title":"(6) jhaddix - YouTube","index":169,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":197,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@jhaddix"},{"guid":"Uw-N9FNpp5_H","title":"PHP Obfuscator","index":170,"dateAdded":1685921076000000,"lastModified":1718788940000000,"id":198,"typeCode":1,"iconUri":"https://php-minify.com/php-obfuscator/favicon.ico","type":"text/x-moz-place","uri":"https://php-minify.com/php-obfuscator/"},{"guid":"7C1K720xFD0c","title":"JS Obfuscator","index":171,"dateAdded":1685921100000000,"lastModified":1718788940000000,"id":199,"typeCode":1,"type":"text/x-moz-place","uri":"https://php-minify.com/js-obfuscator/"},{"guid":"WEtVLqG-TlvY","title":"Hashkiller.io - List Manager","index":172,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":200,"typeCode":1,"type":"text/x-moz-place","uri":"https://hashkiller.io/listmanager"},{"guid":"XfNu1yHRgJvX","title":"CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.","index":173,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":201,"typeCode":1,"type":"text/x-moz-place","uri":"https://crackstation.net/"},{"guid":"8s8vmulVePzD","title":"SHAttered","index":174,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":202,"typeCode":1,"type":"text/x-moz-place","uri":"https://shattered.io/"},{"guid":"kfisei5JhOJt","title":"Online Password Hash Crack - MD5 NTLM Wordpress Joomla WPA PMKID, Office, iTunes, Archive, ..","index":175,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":203,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.onlinehashcrack.com/"},{"guid":"l7yyoEqEFmEp","title":"RsaCtfTool/RsaCtfTool: RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data","index":176,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":204,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/RsaCtfTool/RsaCtfTool"},{"guid":"-AAznUkPxFFc","title":"example_hashes [hashcat wiki]","index":177,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":205,"typeCode":1,"type":"text/x-moz-place","uri":"https://hashcat.net/wiki/doku.php?id=example_hashes"},{"guid":"cPHHH8Be4Aqa","title":"Cmd5 - MD5 Online ,MD5 Decryption, MD5 Hash Decoder","index":178,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":206,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.cmd5.org/"},{"guid":"DXqo0-hnq7H3","title":"GPUHASH.me - online WPA/WPA2 PMKID cracker and MD5,SHA1,SHA256,MD5CRYPT,NTLM,bcrypt,vBulletin,IPB,BTC/LTC wallet password recovery","index":179,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":207,"typeCode":1,"type":"text/x-moz-place","uri":"https://gpuhash.me/"},{"guid":"dq0YK8N1ncru","title":"Recovery of Password from Office documents (XLSX / DOCX), ZIP files and Hashes (Cisco, SHA1, MD5)","index":180,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":208,"typeCode":1,"type":"text/x-moz-place","uri":"https://passwordrecovery.io/"},{"guid":"dPFGsXx3ztiJ","title":"Md5 Online Decrypt & Encrypt - Compare your hash with our Database","index":181,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":209,"typeCode":1,"type":"text/x-moz-place","uri":"https://md5decrypt.net/en/"},{"guid":"32ED-eHIIihY","title":"Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online","index":182,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":210,"typeCode":1,"type":"text/x-moz-place","uri":"https://hashes.com/en/decrypt/hash"},{"guid":"OiGSnCIHq5Me","title":"Web Security Academy: Free Online Training from PortSwigger","index":183,"dateAdded":1686014442000000,"lastModified":1718788940000000,"id":211,"typeCode":1,"type":"text/x-moz-place","uri":"https://portswigger.net/web-security"},{"guid":"zXTTNrApaUKR","title":"PentesterLab: Our exercises","index":184,"dateAdded":1686014608000000,"lastModified":1718788940000000,"id":212,"typeCode":1,"iconUri":"https://assets.pentesterlab.com/favicon.ico","type":"text/x-moz-place","uri":"https://pentesterlab.com/exercises"},{"guid":"02jz9K1C6Tb1","title":"Application Security Training For Developers | Kontra","index":185,"dateAdded":1670966710000000,"lastModified":1718788940000000,"id":213,"typeCode":1,"type":"text/x-moz-place","uri":"https://application.security/"},{"guid":"a5S3n9pdXT93","title":"SQL Injection Lab | NotSoSecure","index":186,"dateAdded":1697261193000000,"lastModified":1718788940000000,"id":214,"typeCode":1,"iconUri":"https://notsosecure.com/sites/all/assets/nss/nss-favicon.ico","type":"text/x-moz-place","uri":"https://notsosecure.com/sql-injection-lab"},{"guid":"dVoEPZ4ROuL8","title":"0xn3va/cheat-sheets: A list of cheat sheets for application security","index":187,"dateAdded":1692866064000000,"lastModified":1718788940000000,"id":215,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/0xn3va/cheat-sheets"},{"guid":"4LfiJFaa3Z1g","title":"CryptoHack – A fun, free platform for learning cryptography","index":188,"dateAdded":1695286412000000,"lastModified":1718788940000000,"id":216,"typeCode":1,"type":"text/x-moz-place","uri":"https://cryptohack.org/"},{"guid":"LvOVuwEciWiY","title":"hide01.ir - Advanced Web Attacks and Exploitation (WEB-300)","index":189,"dateAdded":1675138933000000,"lastModified":1718788940000000,"id":217,"typeCode":1,"type":"text/x-moz-place","uri":"https://awae.hide01.ir/"},{"guid":"GA2_ykh6X4iO","title":"picoCTF - CMU Cybersecurity Competition","index":190,"dateAdded":1650828469000000,"lastModified":1718788940000000,"id":218,"typeCode":1,"type":"text/x-moz-place","uri":"https://picoctf.org/"},{"guid":"-nku0o0KcB8i","title":"GitHub - KingOfBugbounty/KingOfBugBountyTips: Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..","index":191,"dateAdded":1684157571000000,"lastModified":1718788940000000,"id":219,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/KingOfBugbounty/KingOfBugBountyTips"},{"guid":"lNPae0GWvT_e","title":"API Security Best Practices","index":192,"dateAdded":1680851271000000,"lastModified":1718788940000000,"id":220,"typeCode":1,"iconUri":"https://roadmap.sh/manifest/icon32.png","type":"text/x-moz-place","uri":"https://roadmap.sh/best-practices/api-security"},{"guid":"nyprvRPN5-aq","title":"Anti Captcha: Captcha Solving Service. Bypass Recaptcha, FunCaptcha Arkose Labs, image captcha, GeeTest, HCaptcha.","index":193,"dateAdded":1670832472000000,"lastModified":1718788940000000,"id":221,"typeCode":1,"type":"text/x-moz-place","uri":"https://anti-captcha.com/"},{"guid":"L11SvXyPzT7B","title":"JSFuck - Write any JavaScript with 6 Characters: []()!+","index":194,"dateAdded":1670917838000000,"lastModified":1718788940000000,"id":222,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.jsfuck.com/"},{"guid":"Onq4ywqV7_TY","title":"GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF","index":195,"dateAdded":1650823746000000,"lastModified":1718788940000000,"id":223,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/swisskyrepo/PayloadsAllTheThings"},{"guid":"2zXuYYsdoCyo","title":"regex101: build, test, and debug regex","index":196,"dateAdded":1622007433000000,"lastModified":1718788940000000,"id":224,"typeCode":1,"iconUri":"https://regex101.com/static/assets/icon-32.png","type":"text/x-moz-place","uri":"https://regex101.com/"}]},{"guid":"fAxMoP_Pjskc","title":"Mobile","index":1,"dateAdded":1698123903000000,"lastModified":1741914138000000,"id":225,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"HT_WVmXfnpR9","title":"radare cydia repository","index":0,"dateAdded":1684850956000000,"lastModified":1718788940000000,"id":226,"typeCode":1,"type":"text/x-moz-place","uri":"https://cydia.radare.org/"},{"guid":"O9FwJXjK7X9l","title":"On-demand Mobile Security Training | 8kSec Academy","index":1,"dateAdded":1741897930000000,"lastModified":1741914138000000,"id":227,"typeCode":1,"iconUri":"https://lwfiles.mycourse.app/66c35021da1fe6df974b8aee-public/458d045364a51703f99583456f176536.png","type":"text/x-moz-place","uri":"https://academy.8ksec.io/home"},{"guid":"HXOIjUiT39xS","title":"Download iOS Firmware for iPhone, iPad, iPod Touch, Apple Watch, Apple TV, HomePod and Vision Pro / IPSW Downloads","index":2,"dateAdded":1739565637000000,"lastModified":1739565652000000,"id":228,"typeCode":1,"iconUri":"https://ipsw.me/assets/brand/favicon.png","type":"text/x-moz-place","uri":"https://ipsw.me/"},{"guid":"bqDqcZht2gHJ","title":"Home | iOS Guide","index":3,"dateAdded":1728161686000000,"lastModified":1728230544000000,"id":229,"typeCode":1,"type":"text/x-moz-place","uri":"https://ios.cfw.guide/"},{"guid":"6Qcu5ED-ZTk3","title":"palera1n","index":4,"dateAdded":1728159529000000,"lastModified":1728159541000000,"id":230,"typeCode":1,"iconUri":"https://palera.in/favicons/32@2x.png","type":"text/x-moz-place","uri":"https://palera.in/"},{"guid":"JicyvE1DKUuQ","title":"8kSec | Live & On-Demand Mobile Security Trainings","index":5,"dateAdded":1741803375000000,"lastModified":1741807576000000,"id":231,"typeCode":1,"iconUri":"https://i0.wp.com/8ksec.io/wp-content/uploads/2022/09/cropped-8ksec-final-2-1.png?fit=32%2C32&ssl=1","type":"text/x-moz-place","uri":"https://8ksec.io/"},{"guid":"938PpdCg_zID","title":"OWASP Mobile Application Security | OWASP Foundation","index":6,"dateAdded":1733277251000000,"lastModified":1733304486000000,"id":232,"typeCode":1,"iconUri":"https://owasp.org/www--site-theme/favicon.ico","type":"text/x-moz-place","uri":"https://owasp.org/www-project-mobile-app-security/"},{"guid":"ZXaDZ42KkGoJ","title":"OWASP MASTG - OWASP Mobile Application Security","index":7,"dateAdded":1728540186000000,"lastModified":1728576344000000,"id":233,"typeCode":1,"iconUri":"https://mas.owasp.org/assets/logo_circle.png","type":"text/x-moz-place","uri":"https://mas.owasp.org/MASTG/"},{"guid":"qNJK8KH92loh","title":"GitHub - OWASP/owasp-masvs: The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.","index":8,"dateAdded":1672391566000000,"lastModified":1718788940000000,"id":234,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/OWASP/owasp-masvs"},{"guid":"a1cEWcjRN_BX","title":"Siguza.net","index":9,"dateAdded":1712030067000000,"lastModified":1718788940000000,"id":235,"typeCode":1,"type":"text/x-moz-place","uri":"https://siguza.net/"},{"guid":"bMQ5Om1AAQcW","title":"julioverne's Repo","index":10,"dateAdded":1672388023000000,"lastModified":1718788940000000,"id":236,"typeCode":1,"type":"text/x-moz-place","uri":"https://julioverne.github.io/"},{"guid":"zPBxarxjlh77","title":"GitHub - googleprojectzero/SkCodecFuzzer: Fuzzing harness for testing proprietary image codecs supported by Skia on Android","index":11,"dateAdded":1673004740000000,"lastModified":1718788940000000,"id":237,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/googleprojectzero/SkCodecFuzzer/tree/master/mms_exploit"},{"guid":"VEtXYZGOm5Ij","title":"APKMirror - Free APK Downloads - Free and safe Android APK downloads","index":12,"dateAdded":1675924665000000,"lastModified":1718788940000000,"id":238,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.apkmirror.com/"}]},{"guid":"dFlSbRXewIFV","title":"Cloud","index":2,"dateAdded":1698123908000000,"lastModified":1739567765000000,"id":239,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"8Jbpc95zB7NU","title":"Public S3 Buckets by GrayhatWarfare","index":0,"dateAdded":1598481682000000,"lastModified":1718788940000000,"id":240,"typeCode":1,"type":"text/x-moz-place","uri":"https://buckets.grayhatwarfare.com/"},{"guid":"e2gBM0ixfj3k","title":"KeyCDN - Content delivery made easy","index":1,"dateAdded":1648812158000000,"lastModified":1718788940000000,"id":241,"typeCode":1,"iconUri":"https://www.keycdn.com/img/favicon/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.keycdn.com/"},{"guid":"uAm9c4ioHRlU","title":"Cloud Application Platform | Heroku","index":2,"dateAdded":1661642434000000,"lastModified":1718788940000000,"id":242,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.heroku.com/"},{"guid":"VFZkAshEK7c3","title":"sshOcean - SSH Websocket CDN Cloudflare server United States (SSH WS)","index":3,"dateAdded":1671340920000000,"lastModified":1718788940000000,"id":243,"typeCode":1,"type":"text/x-moz-place","uri":"https://sshocean.com/sshws/united-states"},{"guid":"b786v4AenTsQ","title":"Home Page - Azure IP Ranges","index":4,"dateAdded":1722105845000000,"lastModified":1722248824000000,"id":244,"typeCode":1,"type":"text/x-moz-place","uri":"https://azureipranges.azurewebsites.net/"},{"guid":"567oS2UTLtc3","title":"https://www.arvancloud.ir/fa/ips.txt","index":5,"dateAdded":1683750966000000,"lastModified":1718788940000000,"id":245,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.arvancloud.ir/fa/ips.txt"},{"guid":"bp0OugUTM4lw","title":"Hacking The Cloud - Hacking The Cloud","index":6,"dateAdded":1718296351000000,"lastModified":1718788940000000,"id":246,"typeCode":1,"type":"text/x-moz-place","uri":"https://hackingthe.cloud/"},{"guid":"lkg0HEQpBvvI","title":"GitHub - OWASP/owasp-cstg","index":7,"dateAdded":1643768416000000,"lastModified":1718788940000000,"id":247,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/OWASP/owasp-cstg"},{"guid":"f2eDxyGPAo9O","title":"Home","index":8,"dateAdded":1731838201000000,"lastModified":1731838219000000,"id":248,"typeCode":1,"type":"text/x-moz-place","uri":"https://lzone.de/"},{"guid":"Hg_jkkvhyDg1","title":"Index of /data/automated/","index":9,"dateAdded":1739289304000000,"lastModified":1739567765000000,"id":249,"typeCode":1,"charset":"windows-1252","type":"text/x-moz-place","uri":"https://wordlists-cdn.assetnote.io/data/automated/"},{"guid":"judguhE6Lz8E","title":"HackTricks Cloud | HackTricks Cloud","index":10,"dateAdded":1728388346000000,"lastModified":1728406778000000,"id":250,"typeCode":1,"iconUri":"https://1903070231-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/collections%2FCwO1tbNpoOUJlM2hGhoK%2Ficon%2F5f3X1nONH2UfRY8Bj39K%2FCLOUD-logo.svg?alt=media&token=fb49f498-1147-46ee-979c-07f4b02ace70","type":"text/x-moz-place","uri":"https://cloud.hacktricks.xyz/"},{"guid":"4gVmnQJFSTzu","title":"OWASP Cloud-Native Application Security Top 10 | OWASP Foundation","index":11,"dateAdded":1643979432000000,"lastModified":1718788940000000,"id":251,"typeCode":1,"iconUri":"https://owasp.org/www--site-theme/favicon.ico","type":"text/x-moz-place","uri":"https://owasp.org/www-project-cloud-native-application-security-top-10/#"},{"guid":"EV-lPwZG3o-v","title":"GoLinuxCloud | How To | Guide | Tutorial","index":12,"dateAdded":1661716750000000,"lastModified":1718788940000000,"id":252,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.golinuxcloud.com/"},{"guid":"nNOfI-rLAnri","title":"Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…","index":13,"dateAdded":1671592682000000,"lastModified":1718788940000000,"id":253,"typeCode":1,"type":"text/x-moz-place","uri":"https://adsecurity.org/"},{"guid":"0Pr7EresMUIb","title":"infosecn1nja/AD-Attack-Defense: Attack and defend active directory using modern post exploitation adversary tradecraft activity","index":14,"dateAdded":1686000972000000,"lastModified":1718788940000000,"id":254,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/infosecn1nja/AD-Attack-Defense"},{"guid":"01cAesRWA-4Y","title":"Cloud Security Wiki | Cloud Security Wiki","index":15,"dateAdded":1684136277000000,"lastModified":1718788940000000,"id":255,"typeCode":1,"type":"text/x-moz-place","uri":"https://cloudsecwiki.com/index.html"},{"guid":"ZFa8RGvHw0jf","title":"GitHub - dafthack/CloudPentestCheatsheets: This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.","index":16,"dateAdded":1684135897000000,"lastModified":1718788940000000,"id":256,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/dafthack/CloudPentestCheatsheets"},{"guid":"xGx3hfCeiguG","title":"pushsecurity/saas-attacks: Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown","index":17,"dateAdded":1695219179000000,"lastModified":1718788940000000,"id":257,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/pushsecurity/saas-attacks"}]},{"guid":"RIX6baTarsiL","title":"Network","index":3,"dateAdded":1698123913000000,"lastModified":1743919560000000,"id":258,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"KixVHolS7kdS","title":"crt.sh | Certificate Search","index":0,"dateAdded":1685897112000000,"lastModified":1718788940000000,"id":259,"typeCode":1,"type":"text/x-moz-place","uri":"https://crt.sh/"},{"guid":"ytqjSGplmAsB","title":"28 Online Vulnerability Scanners & Network Tools | HackerTarget.com","index":1,"dateAdded":1685897202000000,"lastModified":1718788940000000,"id":260,"typeCode":1,"type":"text/x-moz-place","uri":"https://hackertarget.com/"},{"guid":"Z2CZkciwCc3K","title":"SSL Fingerprint JA3","index":2,"dateAdded":1604659115000000,"lastModified":1718788940000000,"id":261,"typeCode":1,"type":"text/x-moz-place","uri":"https://ja3er.com/"},{"guid":"jeuvPljz930I","title":"Find Virtual Hosts for Any IP Address with Pentest-Tools.com","index":3,"dateAdded":1610154146000000,"lastModified":1718788940000000,"id":262,"typeCode":1,"type":"text/x-moz-place","uri":"https://pentest-tools.com/information-gathering/find-virtual-hosts"},{"guid":"oyv13rKMaelI","title":"SSL Server Test (Powered by Qualys SSL Labs)","index":4,"dateAdded":1683056150000000,"lastModified":1718788940000000,"id":263,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ssllabs.com/ssltest/"},{"guid":"Pu4qTq8xmNiP","title":"Pentest-Tools.com | 25+ Online Penetration Testing Tools","index":5,"dateAdded":1643771322000000,"lastModified":1718788940000000,"id":264,"typeCode":1,"iconUri":"https://pentest-tools.com/favicon.svg","type":"text/x-moz-place","uri":"https://pentest-tools.com/"},{"guid":"kbk6Kmtlfrxw","title":"RIPE Network Coordination Centre","index":6,"dateAdded":1678601302000000,"lastModified":1718788940000000,"id":265,"typeCode":1,"iconUri":"https://www.ripe.net/static/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://www.ripe.net/"},{"guid":"ifU8Uahjl1dP","title":"CS4G Network Simulator","index":7,"dateAdded":1720642785000000,"lastModified":1720646151000000,"id":266,"typeCode":1,"type":"text/x-moz-place","uri":"https://netsim.erinn.io/"},{"guid":"oGDjGg9VwlW7","title":"Introduction | Server Sandbox","index":8,"dateAdded":1731995154000000,"lastModified":1732014503000000,"id":267,"typeCode":1,"iconUri":"https://kikobeats.github.io/server-sandbox/gitbook/images/favicon.ico","type":"text/x-moz-place","uri":"https://kikobeats.github.io/server-sandbox/"},{"guid":"JlkO0koI-wPl","title":"ASCIIFlow","index":9,"dateAdded":1721660863000000,"lastModified":1721677502000000,"id":268,"typeCode":1,"iconUri":"https://asciiflow.com/public/favicon.png","type":"text/x-moz-place","uri":"https://asciiflow.com/#/"},{"guid":"kKudOIaunyPO","title":"Compiler Explorer","index":10,"dateAdded":1737812874000000,"lastModified":1737812881000000,"id":269,"typeCode":1,"iconUri":"https://godbolt.org/favicon.ico?v=1","type":"text/x-moz-place","uri":"https://godbolt.org/"},{"guid":"UOO2dXZFMG5h","title":"آپارات | ابوالفضل کاظمی","index":11,"dateAdded":1742911793000000,"lastModified":1742911802000000,"id":270,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.aparat.com/oxaa55"},{"guid":"cK-S_68E1mOS","title":"390R Spring 2023 - YouTube","index":12,"dateAdded":1737812538000000,"lastModified":1737812547000000,"id":271,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/024ccc3d/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PLqyh8Dka_7j2FmrvdZ-ZkzFWTDr0tg5Oy"},{"guid":"fAkndwdxzF5l","title":"hfiref0x pages | hfiref0x","index":13,"dateAdded":1726239638000000,"lastModified":1726264232000000,"id":272,"typeCode":1,"type":"text/x-moz-place","uri":"https://hfiref0x.github.io/"},{"guid":"YnffhBHB4B7e","title":"Mayfly","index":14,"dateAdded":1734780588000000,"lastModified":1734811437000000,"id":273,"typeCode":1,"iconUri":"https://mayfly277.github.io/assets/img/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://mayfly277.github.io/"},{"guid":"ELhQmyAkTxk7","title":"Ai000 Assembly and Shellcoding Course - YouTube","index":15,"dateAdded":1743919550000000,"lastModified":1743919560000000,"id":274,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PLY98Os54-V_WaKcXBaZJXDrsLDTpHOIEA"},{"guid":"yF--2BEGZurX","title":"Online x86 and x64 Intel Instruction Assembler","index":16,"dateAdded":1725726544000000,"lastModified":1725734011000000,"id":275,"typeCode":1,"type":"text/x-moz-place","uri":"https://defuse.ca/online-x86-assembler.htm"},{"guid":"a0GOtavy2JLu","title":"Interactive map of Linux kernel","index":17,"dateAdded":1721629372000000,"lastModified":1721658920000000,"id":276,"typeCode":1,"type":"text/x-moz-place","uri":"https://makelinux.github.io/kernel/map/"},{"guid":"AN4SFRaslxSJ","title":"آموزش استفاده از CDN GCore بر روی دامنه ثبت شده در Cloudflare · hiddify/Hiddify-Manager Wiki","index":18,"dateAdded":1737583607000000,"lastModified":1738614745000000,"id":277,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/hiddify/Hiddify-Manager/wiki/%D8%A2%D9%85%D9%88%D8%B2%D8%B4-%D8%A7%D8%B3%D8%AA%D9%81%D8%A7%D8%AF%D9%87-%D8%A7%D8%B2-CDN-GCore-%D8%A8%D8%B1-%D8%B1%D9%88%DB%8C-%D8%AF%D8%A7%D9%85%D9%86%D9%87-%D8%AB%D8%A8%D8%AA-%D8%B4%D8%AF%D9%87-%D8%AF%D8%B1-Cloudflare"},{"guid":"wAWt0rDtur6K","title":"iAnonymous3000/awesome-pentest-checklist: A comprehensive, step-by-step penetration testing checklist for ethical hackers. Covers pre-engagement, information gathering, analysis, exploitation, reporting, and more. Ideal for both beginners and pros.","index":19,"dateAdded":1733275377000000,"lastModified":1733315189000000,"id":278,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/iAnonymous3000/awesome-pentest-checklist"},{"guid":"P_wRfGVEsVlV","title":"Pentest tools from Nmap online to Subdomain finder cmseek theharvester & wappalyzer","index":20,"dateAdded":1621027013000000,"lastModified":1718788940000000,"id":279,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nmmapper.com/"},{"guid":"ya_3axcs8KV1","title":"IPv6 test - IPv6/4 connectivity and speed test","index":21,"dateAdded":1715277814000000,"lastModified":1718788940000000,"id":280,"typeCode":1,"type":"text/x-moz-place","uri":"https://ipv6-test.com/"},{"guid":"lbWwfi9pNdR_","title":"Windows Internals - YouTube","index":22,"dateAdded":1699898186000000,"lastModified":1718788940000000,"id":281,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PLV_646g8Ljh79PoaG7uWN-E-TK6INzeX8"},{"guid":"Iju37A0NMNlk","title":"Home | WaterWall docs","index":23,"dateAdded":1720120805000000,"lastModified":1720121076000000,"id":282,"typeCode":1,"iconUri":"https://radkesvat.github.io/WaterWall-Docs/img/favicon.ico","type":"text/x-moz-place","uri":"https://radkesvat.github.io/WaterWall-Docs/"},{"guid":"FZjrZjIpM88r","title":"Exploit Notes","index":24,"dateAdded":1731512374000000,"lastModified":1731512406000000,"id":283,"typeCode":1,"iconUri":"https://exploit-notes.hdks.org/img/favicon.ico","type":"text/x-moz-place","uri":"https://exploit-notes.hdks.org/"},{"guid":"RKjJPkBCoyeR","title":"Cloudflare Radar","index":25,"dateAdded":1716318999000000,"lastModified":1718788940000000,"id":284,"typeCode":1,"type":"text/x-moz-place","uri":"https://radar.cloudflare.com/ir"},{"guid":"fIOcffhdXtYY","title":"CloudFlare | آیپی تمیز کلودفلر","index":26,"dateAdded":1724084774000000,"lastModified":1724154475000000,"id":285,"typeCode":1,"iconUri":"https://ircf.space/assets/favicon.ico?v1.1","type":"text/x-moz-place","uri":"https://ircf.space/linkbox.php"},{"guid":"6nEBhsWGbtAu","title":"Websites using Fastly CDN","index":27,"dateAdded":1723817141000000,"lastModified":1723910619000000,"id":286,"typeCode":1,"iconUri":"https://d28rh9vvmrd65v.cloudfront.net/img/favicon.ico","type":"text/x-moz-place","uri":"https://trends.builtwith.com/websitelist/Fastly-CDN"},{"guid":"pV5YSXgXAfu2","title":"Cybersecurity Notes | Cybersec","index":28,"dateAdded":1734300262000000,"lastModified":1734302653000000,"id":287,"typeCode":1,"iconUri":"https://349224153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/spaces%2F-MEwBGnjPgf263kl5vWP%2Favatar-1597679102856.png?generation=1597679103137105&alt=media","type":"text/x-moz-place","uri":"https://ir0nstone.gitbook.io/notes"},{"guid":"AfMr1Y8qQwn_","title":"Welcome to MCSI’s Library — MCSI Library","index":29,"dateAdded":1734300271000000,"lastModified":1734302644000000,"id":288,"typeCode":1,"iconUri":"https://library.mosse-institute.com/_static/favicon.ico","type":"text/x-moz-place","uri":"https://library.mosse-institute.com/index.html"},{"guid":"fHNqsBA5jBJL","title":"Introduction to Assembly | Assembly Language","index":30,"dateAdded":1731059439000000,"lastModified":1731062907000000,"id":289,"typeCode":1,"type":"text/x-moz-place","uri":"https://d3v1lal.gitbook.io/assembly-language"},{"guid":"GBIGxfpTKcXk","title":"00) Windows Internals Course Introduction [PER] - YouTube","index":31,"dateAdded":1708740225000000,"lastModified":1718788940000000,"id":290,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/watch?v=mNdRws8Es6c"},{"guid":"hcJpaE39RSMs","title":"google/security-research: This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.","index":32,"dateAdded":1734204372000000,"lastModified":1734302688000000,"id":291,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/google/security-research"},{"guid":"oIu1zyFfb_Ug","title":"kernel - Linux source code (v5.15.8) - Bootlin","index":33,"dateAdded":1639589278000000,"lastModified":1718788940000000,"id":292,"typeCode":1,"type":"text/x-moz-place","uri":"https://elixir.bootlin.com/linux/latest/source/kernel"},{"guid":"Rasttc30APUW","title":"Default passwords list - Select manufacturer","index":34,"dateAdded":1598561650000000,"lastModified":1718788940000000,"id":293,"typeCode":1,"type":"text/x-moz-place","uri":"https://default-password.info/"},{"guid":"7Io2DN6n9C9Y","title":"5919 Default Passwords from Open Sez Me!","index":35,"dateAdded":1598561681000000,"lastModified":1718788940000000,"id":294,"typeCode":1,"type":"text/x-moz-place","uri":"http://open-sez.me/"},{"guid":"PItISk5T6YBg","title":"Dstat.CC - Layer 4 & Layer 7 Dstats - Fuck all other DSTATS","index":36,"dateAdded":1705288469000000,"lastModified":1718788940000000,"id":295,"typeCode":1,"type":"text/x-moz-place","uri":"https://dstat.cc/"},{"guid":"NLxVzEyvUqHk","title":"Default Password List","index":37,"dateAdded":1598561663000000,"lastModified":1718788940000000,"id":296,"typeCode":1,"type":"text/x-moz-place","uri":"http://phenoelit.org/dpl/dpl.html"},{"guid":"Wl9DhlMcviRn","title":"Router Passwords Community Database - The Wireless Router Experts","index":38,"dateAdded":1598562039000000,"lastModified":1718788940000000,"id":297,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.routerpasswords.com/"},{"guid":"K9WM6WUyylll","title":"Default Password Lookup Utility","index":39,"dateAdded":1598561698000000,"lastModified":1718788940000000,"id":298,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.fortypoundhead.com/tools_dpw.asp"},{"guid":"ejpVwL0YhPfR","title":"Default Passwords | CIRT.net","index":40,"dateAdded":1598561702000000,"lastModified":1718788940000000,"id":299,"typeCode":1,"type":"text/x-moz-place","uri":"https://cirt.net/passwords"},{"guid":"lmo05fVVYN2d","title":"dayzerosec","index":41,"dateAdded":1708644613000000,"lastModified":1718788940000000,"id":300,"typeCode":1,"iconUri":"https://dayzerosec.com/images/favicon.32.png","type":"text/x-moz-place","uri":"https://dayzerosec.com/"},{"guid":"sps5GzmwaDE7","title":"libc-database","index":42,"dateAdded":1602758658000000,"lastModified":1718788940000000,"id":301,"typeCode":1,"type":"text/x-moz-place","uri":"https://libc.rip/"},{"guid":"2qpFRZ9D_xIT","title":"HE 3D Network Map","index":43,"dateAdded":1703448869000000,"lastModified":1718788940000000,"id":302,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.he.net/3d-map/"},{"guid":"hncXCL7CYW3n","title":"GitHub - lucyoa/kernel-exploits","index":44,"dateAdded":1625512815000000,"lastModified":1718788940000000,"id":303,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/lucyoa/kernel-exploits"},{"guid":"xfWPSmlOKFAf","title":"Linux System Calls quick and easy","index":45,"dateAdded":1635110367000000,"lastModified":1718788940000000,"id":304,"typeCode":1,"type":"text/x-moz-place","uri":"https://syscall.sh/"},{"guid":"qHQD0SOtetCi","title":"Windows x86-64 WIN32K.SYS System Call Table (XP/2003/Vista/2008/7/2012/8/10)","index":46,"dateAdded":1654116583000000,"lastModified":1718788940000000,"id":305,"typeCode":1,"type":"text/x-moz-place","uri":"https://j00ru.vexillium.org/syscalls/win32k/64/"},{"guid":"7b67ZMqf5LBl","title":"Winbindex - The Windows Binaries Index","index":47,"dateAdded":1664841677000000,"lastModified":1718788940000000,"id":306,"typeCode":1,"type":"text/x-moz-place","uri":"https://winbindex.m417z.com/"},{"guid":"SqYDNEO86AUO","title":"ROP Emporium","index":48,"dateAdded":1650857135000000,"lastModified":1718788940000000,"id":307,"typeCode":1,"iconUri":"https://ropemporium.com/favicon/favicon-32.png","type":"text/x-moz-place","uri":"https://ropemporium.com/"},{"guid":"HV2lnhyW4Fws","title":"Randy Franklin Smith's Ultimate Windows Security","index":49,"dateAdded":1673052827000000,"lastModified":1718788940000000,"id":308,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ultimatewindowssecurity.com/"},{"guid":"mILHxpk8tSHF","title":"Vergilius Project | Home","index":50,"dateAdded":1651108954000000,"lastModified":1718788940000000,"id":309,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.vergiliusproject.com/"},{"guid":"FSQAG1Ui5NiD","title":"آپارات | ابوالفضل کاظمی","index":51,"dateAdded":1655108856000000,"lastModified":1718788940000000,"id":310,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.aparat.com/oxaa55/videos"},{"guid":"jQ885DPN6ivE","title":"PWK (OSCP) (PEN-200) - Hide01.ir","index":52,"dateAdded":1668125337000000,"lastModified":1718788940000000,"id":311,"typeCode":1,"type":"text/x-moz-place","uri":"https://pwk.hide01.ir/"},{"guid":"jlCRVnzcYDX6","title":"OpenSecurityTraining2","index":53,"dateAdded":1672220481000000,"lastModified":1718788940000000,"id":312,"typeCode":1,"type":"text/x-moz-place","uri":"https://opensecuritytraining.info/Home.html"},{"guid":"HLI4_m79Clh2","title":"GitHub - hacksysteam/HackSysExtremeVulnerableDriver: HackSys Extreme Vulnerable Windows Driver (HEVD)","index":54,"dateAdded":1672111638000000,"lastModified":1718788940000000,"id":313,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/hacksysteam/HackSysExtremeVulnerableDriver"},{"guid":"6ValVZsRTkEp","title":"GitHub - FULLSHADE/WindowsExploitationResources: Resources for Windows exploit development","index":55,"dateAdded":1656224999000000,"lastModified":1718788940000000,"id":314,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/FULLSHADE/WindowsExploitationResources"},{"guid":"7I3oRUVZvzRx","title":"| OpenSecurityTraining2","index":56,"dateAdded":1661739970000000,"lastModified":1718788940000000,"id":315,"typeCode":1,"type":"text/x-moz-place","uri":"https://p.ost2.fyi/"},{"guid":"X5tOxlcpG_fr","title":"GitHub - SecWiki/linux-kernel-exploits: linux-kernel-exploits Linux平台提权漏洞集合","index":57,"dateAdded":1623845922000000,"lastModified":1718788940000000,"id":316,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/SecWiki/linux-kernel-exploits"},{"guid":"Fxz6NyJFfi6w","title":"The Best Stresser Booter, Send DDoS Attacks for Free!","index":58,"dateAdded":1609501927000000,"lastModified":1718788940000000,"id":317,"typeCode":1,"type":"text/x-moz-place","uri":"https://stresser.net/"},{"guid":"QiJidCTUSxj_","title":"HackTricks - HackTricks","index":59,"dateAdded":1671085874000000,"lastModified":1718788940000000,"id":318,"typeCode":1,"type":"text/x-moz-place","uri":"https://book.hacktricks.xyz/welcome/readme"},{"guid":"0STHptlcRp2S","title":"IODA | Monitor Macroscopic Internet Outages in Near Real-Time","index":60,"dateAdded":1694052451000000,"lastModified":1718788940000000,"id":319,"typeCode":1,"type":"text/x-moz-place","uri":"https://ioda.inetintel.cc.gatech.edu/"},{"guid":"NK-7lZPTGg8N","title":"Check server: Check host - online website monitoring","index":61,"dateAdded":1676747564000000,"lastModified":1718788940000000,"id":320,"typeCode":1,"iconUri":"https://check-host.net/checkhost-favicon.png","type":"text/x-moz-place","uri":"https://check-host.net/"},{"guid":"9PJKVtIbhmO-","title":"رادار ابر آروان | وضعیت ارتباطات اینترنت ایران و جهان","index":62,"dateAdded":1678448195000000,"lastModified":1718788940000000,"id":321,"typeCode":1,"iconUri":"https://radar.arvancloud.ir/favicons/en/32.png","type":"text/x-moz-place","uri":"https://radar.arvancloud.ir/"},{"guid":"nnN3Gk_E2ZN9","title":"https://network-tools.com/","index":63,"dateAdded":1642434676000000,"lastModified":1718788940000000,"id":322,"typeCode":1,"type":"text/x-moz-place","uri":"https://network-tools.com/"},{"guid":"UNPP9F2pcR_9","title":"Check my ping with ping test on Host-tracker.com","index":64,"dateAdded":1685302951000000,"lastModified":1718788940000000,"id":323,"typeCode":1,"iconUri":"https://www.host-tracker.com/Content/img/favicon.ico?v=2","type":"text/x-moz-place","uri":"https://www.host-tracker.com/en/ic/ping-test"},{"guid":"NTE17hIP4jC4","title":"Nmap Cheat Sheet 2023: All the Commands, Flags & Switches","index":65,"dateAdded":1686000685000000,"lastModified":1718788940000000,"id":324,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.stationx.net/nmap-cheat-sheet/"},{"guid":"rZQqp4oXHtKx","title":"https://smarinovic.github.io/","index":66,"dateAdded":1685911111000000,"lastModified":1718788940000000,"id":325,"typeCode":1,"type":"text/x-moz-place","uri":"https://smarinovic.github.io/"},{"guid":"2tIblD-oVIeX","title":"ihazomgsecurityskillz","index":67,"dateAdded":1685896629000000,"lastModified":1718788940000000,"id":326,"typeCode":1,"type":"text/x-moz-place","uri":"http://ihazomgsecurityskillz.blogspot.com/"},{"guid":"bZVW-2YGnyDt","title":"The Journey to Try Harder: TJnull’s Preparation Guide for PEN-200 PWK/OSCP 2.0 | NetSec Focus","index":68,"dateAdded":1686002141000000,"lastModified":1718788940000000,"id":327,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.netsecfocus.com/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html"},{"guid":"JO1FTT2RVlnl","title":"Ethical hacking and penetration testing - InfoSec, IT, Kali Linux, BlackArch","index":69,"dateAdded":1686010792000000,"lastModified":1718788940000000,"id":328,"typeCode":1,"type":"text/x-moz-place","uri":"https://miloserdov.org/"},{"guid":"7ROmW6B3mHDk","title":"Default Passwords | CIRT.net","index":70,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":329,"typeCode":1,"type":"text/x-moz-place","uri":"https://cirt.net/passwords"},{"guid":"PX-q3WSo3vzN","title":"List of Router Default Passwords For All Brands [Tried & Tested]","index":71,"dateAdded":1686010693000000,"lastModified":1718788940000000,"id":330,"typeCode":1,"type":"text/x-moz-place","uri":"https://bcca.org/routers-default-passwords/"},{"guid":"BJSjptLKGuBN","title":"Mebus/cupp: Common User Passwords Profiler (CUPP)","index":72,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":331,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Mebus/cupp"},{"guid":"7Dv_WGA2pLow","title":"danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.","index":73,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":332,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/danielmiessler/SecLists"},{"guid":"7QefhoUtrwD9","title":"Assetnote Wordlists","index":74,"dateAdded":1686009946000000,"lastModified":1718788940000000,"id":333,"typeCode":1,"type":"text/x-moz-place","uri":"http://wordlists.assetnote.io/"},{"guid":"H9WCn342FUXo","title":"digininja/CeWL: CeWL is a Custom Word List Generator","index":75,"dateAdded":1686052607000000,"lastModified":1718788940000000,"id":334,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/digininja/CeWL"},{"guid":"GpfO7FLT5YKR","title":"(6) LiveOverflow - YouTube","index":76,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":335,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@LiveOverflow"},{"guid":"0gRrUzV2dL7P","title":"https://pen300.hide01.ir/","index":77,"dateAdded":1675138914000000,"lastModified":1718788940000000,"id":336,"typeCode":1,"type":"text/x-moz-place","uri":"https://pen300.hide01.ir/"},{"guid":"5-LQXVoALggG","title":"The Penetration Testing Execution Standard","index":78,"dateAdded":1676999184000000,"lastModified":1718788940000000,"id":337,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.pentest-standard.org/index.php/Main_Page"},{"guid":"VCpTgD-TaSqB","title":"Welcome to Geneva’s documentation! — geneva documentation","index":79,"dateAdded":1687652775000000,"lastModified":1718788940000000,"id":338,"typeCode":1,"type":"text/x-moz-place","uri":"https://geneva.readthedocs.io/en/latest/index.html"},{"guid":"AEUwJF4NgcZI","title":"GitHub - Escapingbug/awesome-browser-exploit: awesome list of browser exploitation tutorials","index":80,"dateAdded":1661800282000000,"lastModified":1718788940000000,"id":339,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Escapingbug/awesome-browser-exploit"},{"guid":"c88qpt-DZU3s","title":"GitHub - SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合","index":81,"dateAdded":1672404470000000,"lastModified":1718788940000000,"id":340,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/SecWiki/windows-kernel-exploits"}]},{"guid":"4VMCW9EhTDSN","title":"Wireless","index":4,"dateAdded":1698123920000000,"lastModified":1742221262000000,"id":341,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"C05zw3lvUhOU","title":"IMEI CHECK - Free Online IMEI Number Checker | IMEI.info","index":0,"dateAdded":1688860813000000,"lastModified":1718788940000000,"id":342,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.imei.info/"},{"guid":"Dm_1-mddUtE0","title":"SS7 Secrets Exposed : Location Tracking, Call Logs & OTP Bypass Tools, Techniques & Protection - YouTube","index":1,"dateAdded":1739960803000000,"lastModified":1742221255000000,"id":343,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/f4b9f934/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/watch?v=ZkVQUG2aubg"},{"guid":"UXb8dJcTLEuj","title":"Cracking the 5G Fortress: Peering Into 5G's Vulnerability Abyss - YouTube","index":2,"dateAdded":1739960805000000,"lastModified":1742221262000000,"id":344,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/f4b9f934/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/watch?v=nPaSsM0eZbo"},{"guid":"IODdiz7H8BTr","title":"MITRE | FiGHT™","index":3,"dateAdded":1741800486000000,"lastModified":1741800491000000,"id":345,"typeCode":1,"type":"text/x-moz-place","uri":"https://fight.mitre.org/"},{"guid":"YiDT1aCvHBeO","title":"Keep Track - 3D Satellite Toolkit","index":4,"dateAdded":1730967892000000,"lastModified":1730968135000000,"id":346,"typeCode":1,"iconUri":"https://app.keeptrack.space/img/favicons/favicon.ico?v=10.0.0","type":"text/x-moz-place","uri":"https://app.keeptrack.space/"},{"guid":"hZnZCdbnLE6A","title":"HACK-A-SAT 4","index":5,"dateAdded":1730927622000000,"lastModified":1730968142000000,"id":347,"typeCode":1,"iconUri":"https://hackasat.com/storage/2022/03/favicon-150x150.png","type":"text/x-moz-place","uri":"https://hackasat.com/"},{"guid":"4r_kelO8mQvB","title":"ShareTechnote","index":6,"dateAdded":1718054430000000,"lastModified":1718788940000000,"id":348,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.sharetechnote.com/Home.html"},{"guid":"Vgy2iyucm1SW","title":"http://astria.tacc.utexas.edu/AstriaGraph/","index":7,"dateAdded":1730967091000000,"lastModified":1730968129000000,"id":349,"typeCode":1,"type":"text/x-moz-place","uri":"http://astria.tacc.utexas.edu/AstriaGraph/"},{"guid":"9bTGUBcaqarb","title":"GSM Security Map","index":8,"dateAdded":1672206655000000,"lastModified":1718788940000000,"id":350,"typeCode":1,"type":"text/x-moz-place","uri":"https://gsmmap.org/"}]},{"guid":"qwJ5V61KUx87","title":"IoT","index":5,"dateAdded":1698123925000000,"lastModified":1745945982000000,"id":351,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"R3M-ntDohKEL","title":"Hardware All The Things","index":0,"dateAdded":1712490654000000,"lastModified":1718788940000000,"id":352,"typeCode":1,"iconUri":"https://swisskyrepo.github.io/HardwareAllTheThings/assets/images/favicon.png","type":"text/x-moz-place","uri":"https://swisskyrepo.github.io/HardwareAllTheThings/"},{"guid":"pyY5T5Cq5u8M","title":"شرکت فنی مهندسی شبکه دیدهبان","index":1,"dateAdded":1675402540000000,"lastModified":1718788940000000,"id":353,"typeCode":1,"type":"text/x-moz-place","uri":"https://netdrco.com/"},{"guid":"ZZSF3uV3fdQh","title":"فروش قطعات و تجهیزات اتوماسیون صنعتی- فروشگاه اتوماسیون صنعتی سیماتیک کنترل","index":2,"dateAdded":1673647973000000,"lastModified":1718788940000000,"id":354,"typeCode":1,"type":"text/x-moz-place","uri":"https://simaticcontrol.com/"},{"guid":"PwbjDJun2TAn","title":"Firmware Security | Supply Chain Risk Management | BINARLY","index":3,"dateAdded":1745690345000000,"lastModified":1745945975000000,"id":355,"typeCode":1,"iconUri":"https://cdn.prod.website-files.com/65d392ca924b59f0fcd873eb/660196452b0cde006a5aae30_favicon-binarly-2.png","type":"text/x-moz-place","uri":"https://www.binarly.io/"},{"guid":"ehPNgD7gt232","title":"Meltdown and Spectre","index":4,"dateAdded":1745689874000000,"lastModified":1745945982000000,"id":356,"typeCode":1,"type":"text/x-moz-place","uri":"https://meltdownattack.com/"}]}]},{"guid":"DCprWVx2cWUa","title":"Red Team","index":3,"dateAdded":1698123944000000,"lastModified":1747142107319000,"id":357,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"8odRjhna_zTp","title":"Reconnaissance","index":0,"dateAdded":1698124070000000,"lastModified":1747142080213000,"id":358,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"0qLkkPg8BYpb","title":"The World's Largest Repository of Historical DNS data","index":0,"dateAdded":1598320852000000,"lastModified":1718788940000000,"id":359,"typeCode":1,"iconUri":"https://securitytrails.com/dist/temp/meta/favicon/favicon-32x32.png","type":"text/x-moz-place","uri":"https://securitytrails.com/"},{"guid":"CGJDE99FZS5J","title":"Argus Managed Defence | mnemonic","index":1,"dateAdded":1598320946000000,"lastModified":1718788940000000,"id":360,"typeCode":1,"iconUri":"https://static.mnemonic.no/mnemonic/v1/resources/versions/1.6.0/images/argus-favicon.png","type":"text/x-moz-place","uri":"https://passivedns.mnemonic.no/"},{"guid":"-xvb1B1Iqff-","title":"DNSdumpster.com - dns recon and research, find and lookup dns records","index":2,"dateAdded":1598320908000000,"lastModified":1718788940000000,"id":361,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnsdumpster.com/"},{"guid":"fHB4kkOuRGKl","title":"DNS History","index":3,"dateAdded":1598480983000000,"lastModified":1718788940000000,"id":362,"typeCode":1,"type":"text/x-moz-place","uri":"http://dnshistory.org/"},{"guid":"AJZdZuDDtYAe","title":"Wayback Machine","index":4,"dateAdded":1713267722000000,"lastModified":1718788940000000,"id":363,"typeCode":1,"iconUri":"https://web-static.archive.org/_static/images/archive.ico","type":"text/x-moz-place","uri":"https://web.archive.org/"},{"guid":"Filo5GHHdFFf","title":"osint.rocks","index":5,"dateAdded":1726226969000000,"lastModified":1726264213000000,"id":364,"typeCode":1,"iconUri":"https://osint.rocks/static/img/osintrocks-favicon-color.png","type":"text/x-moz-place","uri":"https://osint.rocks/"},{"guid":"VQJOVf5VlWVq","title":"Free Online Domain Name WHOIS Information Lookup Tool | IQWhois","index":6,"dateAdded":1716136360000000,"lastModified":1718788940000000,"id":365,"typeCode":1,"type":"text/x-moz-place","uri":"https://iqwhois.com/"},{"guid":"IhKG1w_DqGP8","title":"WhiteIntel - Dark Web Scan and Data Breach Detection","index":7,"dateAdded":1715182693000000,"lastModified":1718788940000000,"id":366,"typeCode":1,"iconUri":"https://whiteintel.io/favicon.png","type":"text/x-moz-place","uri":"https://whiteintel.io/"},{"guid":"Pqjw3mFahdot","title":"FOFA Search Engine","index":8,"dateAdded":1714245370000000,"lastModified":1718788940000000,"id":367,"typeCode":1,"type":"text/x-moz-place","uri":"https://en.fofa.info/"},{"guid":"EuQDw_dLFFq-","title":"Malfrat's OSINT Map","index":9,"dateAdded":1716165047000000,"lastModified":1718788940000000,"id":368,"typeCode":1,"type":"text/x-moz-place","uri":"https://map.malfrats.industries/"},{"guid":"yGXMeHzYgvRo","title":"Home - ZoomEye really mapping,global leader of cyberspace mapping","index":10,"dateAdded":1714245378000000,"lastModified":1718788940000000,"id":369,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.zoomeye.hk/"},{"guid":"kLAttYcnrYuQ","title":"AI Risk Database","index":11,"dateAdded":1718050264000000,"lastModified":1718788940000000,"id":370,"typeCode":1,"type":"text/x-moz-place","uri":"https://airisk.io/"},{"guid":"5x3lgnrIzqlV","title":"Web Check","index":12,"dateAdded":1701503792000000,"lastModified":1718788940000000,"id":371,"typeCode":1,"type":"text/x-moz-place","uri":"https://web-check.as93.net/"},{"guid":"KQneGfIxPQew","title":"OSINT Industries","index":13,"dateAdded":1713063897000000,"lastModified":1718788940000000,"id":372,"typeCode":1,"type":"text/x-moz-place","uri":"https://osint.industries/"},{"guid":"smTDGI-JjcLZ","title":"Sourcegraph","index":14,"dateAdded":1726170975000000,"lastModified":1726219974000000,"id":373,"typeCode":1,"type":"text/x-moz-place","uri":"https://sourcegraph.com/search"},{"guid":"NB9GRHijjvK1","title":"Internal All The Things","index":15,"dateAdded":1712490657000000,"lastModified":1718788940000000,"id":374,"typeCode":1,"iconUri":"https://swisskyrepo.github.io/InternalAllTheThings/assets/images/favicon.png","type":"text/x-moz-place","uri":"https://swisskyrepo.github.io/InternalAllTheThings/"},{"guid":"LvdgM-ICFsDZ","title":"DNS Leak Test","index":16,"dateAdded":1707961333000000,"lastModified":1718788940000000,"id":375,"typeCode":1,"iconUri":"https://dnsleaktest.org/favicon.png","type":"text/x-moz-place","uri":"https://dnsleaktest.org/dns-leak-test"},{"guid":"yPRj9rKReLPO","title":"Search Insights | EchoTrail","index":17,"dateAdded":1713905275000000,"lastModified":1718788940000000,"id":376,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.echotrail.io/insights"},{"guid":"EPLuXffXiTe_","title":"IODA | Dashboard for Monitoring Internet Outages","index":18,"dateAdded":1712650773000000,"lastModified":1718788940000000,"id":377,"typeCode":1,"type":"text/x-moz-place","uri":"https://ioda.inetintel.cc.gatech.edu/dashboard"},{"guid":"TzAmE5WWqsMi","title":"My IP Address - Shows IPv4 & IPv6 | Blacklist IP Check - Hosting Info","index":19,"dateAdded":1706108252000000,"lastModified":1718788940000000,"id":378,"typeCode":1,"type":"text/x-moz-place","uri":"https://myip.ms/"},{"guid":"Ux1yNsWIZ1HH","title":"Filigran | Uncover Threats. Take Action.","index":20,"dateAdded":1703626731000000,"lastModified":1718788940000000,"id":379,"typeCode":1,"iconUri":"https://filigran.io/app/themes/filigran/src/images/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://filigran.io/"},{"guid":"3bELkQwrvgQI","title":"DNS Checker - DNS Check Propagation Tool","index":21,"dateAdded":1604185187000000,"lastModified":1718788940000000,"id":380,"typeCode":1,"iconUri":"https://dnschecker.org/themes/common/images/general/favicon-32.png","type":"text/x-moz-place","uri":"https://dnschecker.org/#A/unk9vvn.com"},{"guid":"KS7ZsQxuKGZE","title":"What's that site running? | Netcraft","index":22,"dateAdded":1610060362000000,"lastModified":1718788940000000,"id":381,"typeCode":1,"iconUri":"https://static.netcraft.com/images/favicon-32x32.png","type":"text/x-moz-place","uri":"https://sitereport.netcraft.com/"},{"guid":"rUlzUuoC2d2n","title":"Web Development Toronto","index":23,"dateAdded":1608574548000000,"lastModified":1718788940000000,"id":382,"typeCode":1,"type":"text/x-moz-place","uri":"https://jrgraphix.net/r/"},{"guid":"p60aUUvBTG6i","title":"DNS Checker - DNS Check Propagation Tool","index":24,"dateAdded":1625458851000000,"lastModified":1718788940000000,"id":383,"typeCode":1,"iconUri":"https://dnschecker.org/themes/common/images/general/favicon-32.png","type":"text/x-moz-place","uri":"https://dnschecker.org/"},{"guid":"p5xojNnKhnQl","title":"Dig (DNS lookup)","index":25,"dateAdded":1625761905000000,"lastModified":1718788940000000,"id":384,"typeCode":1,"type":"text/x-moz-place","uri":"https://toolbox.googleapps.com/apps/dig/"},{"guid":"pGUQXzYHYhBP","title":"BGPView - BGP Toolkit and BGP ASN Routing Lookup Tool","index":26,"dateAdded":1711413995000000,"lastModified":1718788940000000,"id":385,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgpview.io/"},{"guid":"-yrLtjrMx0LZ","title":"Create an Access Control List to Block Countries or Continents","index":27,"dateAdded":1699793967000000,"lastModified":1718788940000000,"id":386,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.countryipblocks.net/acl.php"},{"guid":"Ek2HZozx6Wv2","title":"WordPress Directory Searcher - WPdirectory","index":28,"dateAdded":1649855878000000,"lastModified":1718788940000000,"id":387,"typeCode":1,"type":"text/x-moz-place","uri":"https://wpdirectory.net/"},{"guid":"bvk9LnSvMJej","title":"DNS-Lookup - The Professional Free DNS Lookup Checker Tool","index":29,"dateAdded":1674065302000000,"lastModified":1718788940000000,"id":388,"typeCode":1,"type":"text/x-moz-place","uri":"https://dns-lookup.com/"},{"guid":"LdzeLL2CXsNE","title":"IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites.","index":30,"dateAdded":1676816718000000,"lastModified":1718788940000000,"id":389,"typeCode":1,"type":"text/x-moz-place","uri":"https://ipleak.net/"},{"guid":"DAe9FRPBvLMC","title":"Reverse IP Lookup - Find Other Web Sites Hosted on a Web Server","index":31,"dateAdded":1604740640000000,"lastModified":1718788940000000,"id":390,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.yougetsignal.com/tools/web-sites-on-web-server/"},{"guid":"WbkZk5HgPSL7","title":"DNS Checker — DNS Check Tool","index":32,"dateAdded":1658533969000000,"lastModified":1718788940000000,"id":391,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nslookup.io/"},{"guid":"beBX3GQeQmDi","title":"DNS Lookup: Instant Check | Spyse","index":33,"dateAdded":1598319114000000,"lastModified":1718788940000000,"id":392,"typeCode":1,"type":"text/x-moz-place","uri":"https://spyse.com/tools/dns-lookup"},{"guid":"zshER1Lr1NIJ","title":"DNSdumpster.com - dns recon and research, find and lookup dns records","index":34,"dateAdded":1685897107000000,"lastModified":1718788940000000,"id":393,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnsdumpster.com/"},{"guid":"gXBK7mS6jcU1","title":"jivoi/awesome-osint: A curated list of amazingly awesome OSINT","index":35,"dateAdded":1662422562000000,"lastModified":1718788940000000,"id":394,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/jivoi/awesome-osint"},{"guid":"M9LfBrTle4Vt","title":"Comprehensive IP address data, IP geolocation API and database - IPinfo.io","index":36,"dateAdded":1656493513000000,"lastModified":1718788940000000,"id":395,"typeCode":1,"type":"text/x-moz-place","uri":"https://ipinfo.io/"},{"guid":"J81fGoDb5eDX","title":"DNS History","index":37,"dateAdded":1657497025000000,"lastModified":1718788940000000,"id":396,"typeCode":1,"type":"text/x-moz-place","uri":"https://completedns.com/dns-history/"},{"guid":"uboOzWvd05tS","title":"Check your IP address | MyIP.com","index":38,"dateAdded":1675396804000000,"lastModified":1718788940000000,"id":397,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.myip.com/"},{"guid":"lZKFz0LczQ8G","title":"EXFiLTRATED","index":39,"dateAdded":1598481966000000,"lastModified":1718788940000000,"id":398,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.exfiltrated.com/querystart.php"},{"guid":"MmhpoaBY5DHn","title":"Bard - Chat Based AI Tool from Google","index":40,"dateAdded":1701503784000000,"lastModified":1718788940000000,"id":399,"typeCode":1,"type":"text/x-moz-place","uri":"https://bard.google.com/?hl=en"},{"guid":"yyXLGL8KswEH","title":"MX Lookup Tool - Check your DNS MX Records online - MxToolbox","index":41,"dateAdded":1621039541000000,"lastModified":1718788940000000,"id":400,"typeCode":1,"iconUri":"https://mxtoolbox.com/public/favicon/mx-logo-icon.svg","type":"text/x-moz-place","uri":"https://mxtoolbox.com/"},{"guid":"21VxgoXLBHwn","title":"RapidDNS Rapid DNS Information Collection - Home","index":42,"dateAdded":1621027022000000,"lastModified":1718788940000000,"id":401,"typeCode":1,"type":"text/x-moz-place","uri":"https://rapiddns.io/"},{"guid":"lndulTN532Q2","title":"APNIC","index":43,"dateAdded":1678601425000000,"lastModified":1718788940000000,"id":402,"typeCode":1,"iconUri":"https://www.apnic.net/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.apnic.net/"},{"guid":"efrp56S-KVYZ","title":"Registro de Direcciones IP en LAC | LACNIC","index":44,"dateAdded":1678601333000000,"lastModified":1718788940000000,"id":403,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.lacnic.net/"},{"guid":"VcDT1o4FAIxD","title":"Open Port Check Tool -- Verify Port Forwarding on Your Router","index":45,"dateAdded":1697796265000000,"lastModified":1718788940000000,"id":404,"typeCode":1,"type":"text/x-moz-place","uri":"https://canyouseeme.org/"},{"guid":"6BsOLAxvoJtt","title":"ASN Lookup: IP, AS Number, Ownership Data | Spyse","index":46,"dateAdded":1598482112000000,"lastModified":1718788940000000,"id":405,"typeCode":1,"type":"text/x-moz-place","uri":"https://spyse.com/tools/asn-lookup"},{"guid":"YjEAmc5TC7kx","title":"Team Cymru IP to ASN Lookup v1.0","index":47,"dateAdded":1598483958000000,"lastModified":1718788940000000,"id":406,"typeCode":1,"type":"text/x-moz-place","uri":"https://asn.cymru.com/"},{"guid":"qnuUEOnkInPo","title":"Iran SOCKS Free proxy list - Iran(IR) SOCKS Free proxy servers list online - ProxyHub.Me","index":48,"dateAdded":1626113129000000,"lastModified":1718788940000000,"id":407,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.proxyhub.me/en/ir-socks-proxy-list.html"},{"guid":"tO5e6fhU_3QA","title":"IP Address Lookup, Reverse IP Lookup and RBL Lookup","index":49,"dateAdded":1658717346000000,"lastModified":1718788940000000,"id":408,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ipchecking.com/"},{"guid":"jF1V26XYXIpB","title":"آدرس IP جستجو ابزار | آدرس IP (فارسی) 🔍","index":50,"dateAdded":1663134342000000,"lastModified":1718788940000000,"id":409,"typeCode":1,"type":"text/x-moz-place","uri":"https://fa.ipshu.com/"},{"guid":"HGGSJdNMIAMI","title":"MTPro.XYZ – Free proxies for Telegram","index":51,"dateAdded":1664636854000000,"lastModified":1718788940000000,"id":410,"typeCode":1,"type":"text/x-moz-place","uri":"https://mtpro.xyz/"},{"guid":"SH9_HWy-Fwbo","title":"Innovative Proxy Service to Gather Data at Scale | Oxylabs","index":52,"dateAdded":1666153782000000,"lastModified":1718788940000000,"id":411,"typeCode":1,"type":"text/x-moz-place","uri":"https://oxylabs.io/"},{"guid":"ktUCy1kRgXv0","title":"The Best Residential Proxy Network | Smartproxy","index":53,"dateAdded":1666153789000000,"lastModified":1718788940000000,"id":412,"typeCode":1,"type":"text/x-moz-place","uri":"https://smartproxy.com/"},{"guid":"_D1DPab-D66n","title":"Buy Reverse Backconnect and Dedicated Proxy - Storm Proxies","index":54,"dateAdded":1666153923000000,"lastModified":1718788940000000,"id":413,"typeCode":1,"type":"text/x-moz-place","uri":"https://stormproxies.com/"},{"guid":"sW_fyu8RVbts","title":"Proxy Rotator - Rotating Proxies","index":55,"dateAdded":1666153957000000,"lastModified":1718788940000000,"id":414,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.proxyrotator.com/"},{"guid":"bagLZdzfMJ7M","title":"Bright Data - The World's #1 Web Data Platform","index":56,"dateAdded":1666153966000000,"lastModified":1718788940000000,"id":415,"typeCode":1,"type":"text/x-moz-place","uri":"https://brightdata.com/"},{"guid":"mOCIUOMcczhV","title":"What is my public IP address - IP.ME","index":57,"dateAdded":1677724945000000,"lastModified":1718788940000000,"id":416,"typeCode":1,"type":"text/x-moz-place","uri":"https://ip.me/"},{"guid":"s8cLtwZO3TCi","title":"ICANN Lookup","index":58,"dateAdded":1678601522000000,"lastModified":1718788940000000,"id":417,"typeCode":1,"type":"text/x-moz-place","uri":"https://lookup.icann.org/en/lookup"},{"guid":"Tt2sPPw7Dtrg","title":"Looking Glass points: execute host, ping, traceroute and mtr commands for domain name and IPv4 or IPv6 addresses","index":59,"dateAdded":1684672616000000,"lastModified":1718788940000000,"id":418,"typeCode":1,"type":"text/x-moz-place","uri":"https://looking.house/"},{"guid":"2MHIo2SIUj1P","title":"IP-API.com - Geolocation API","index":60,"dateAdded":1690636161000000,"lastModified":1718788940000000,"id":419,"typeCode":1,"type":"text/x-moz-place","uri":"https://ip-api.com/"},{"guid":"Q_sMs4ouZrju","title":"IP Information, Proxy and VPN Detection API - Focsec","index":61,"dateAdded":1691447536000000,"lastModified":1718788940000000,"id":420,"typeCode":1,"type":"text/x-moz-place","uri":"https://focsec.com/"},{"guid":"40VWYRQxjeAb","title":"Reverse IP - Find websites hosted on the same IP address, server or subnet","index":62,"dateAdded":1598495734000000,"lastModified":1718788940000000,"id":421,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnslytics.com/reverse-ip"},{"guid":"RSZXGn7yQw9Z","title":"BGPStream","index":63,"dateAdded":1598392804000000,"lastModified":1718788940000000,"id":422,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgpstream.com/"},{"guid":"Lvl28fh59SK1","title":"Hurricane Electric BGP Toolkit","index":64,"dateAdded":1598484150000000,"lastModified":1718788940000000,"id":423,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgp.he.net/"},{"guid":"sem2IgnQaAFf","title":"BGP Ranking","index":65,"dateAdded":1598484142000000,"lastModified":1718788940000000,"id":424,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgpranking.circl.lu/"},{"guid":"owRcpWyNXuCc","title":"BGP Tools, BGP Software, BGP Utilities (BGP, Border Gateway Protocol / Advanced Internet Routing)","index":66,"dateAdded":1598484137000000,"lastModified":1718788940000000,"id":425,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.bgp4.as/tools"},{"guid":"SLBq-oQpItDe","title":"PeeringDB","index":67,"dateAdded":1598484130000000,"lastModified":1718788940000000,"id":426,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.peeringdb.com/advanced_search"},{"guid":"9DcKN3ozhs0q","title":"BGP IPv4/IPv6 Looking Glass Servers - BGP Route Servers (BGP, Border Gateway Protocol / Advanced Internet Routing)","index":68,"dateAdded":1629743852000000,"lastModified":1718788940000000,"id":427,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.bgp4.as/looking-glasses"},{"guid":"wvr6wJ06QEi3","title":"TG SCAN","index":69,"dateAdded":1690105040000000,"lastModified":1718788940000000,"id":428,"typeCode":1,"type":"text/x-moz-place","uri":"https://tgscan.xyz/"},{"guid":"gRWoJBH_70xO","title":"IP Address Abuse and Blacklist Reporting Site | Live IP Map","index":70,"dateAdded":1598489578000000,"lastModified":1718788940000000,"id":429,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.liveipmap.com/"},{"guid":"NOFjQg6rAYtX","title":"ExoneraTor – Tor Metrics","index":71,"dateAdded":1598489576000000,"lastModified":1718788940000000,"id":430,"typeCode":1,"type":"text/x-moz-place","uri":"https://metrics.torproject.org/exonerator.html"},{"guid":"c3ZXfXarT_Zi","title":"IP Address Tools, Network Tools, DNS Tools | IPVoid","index":72,"dateAdded":1598489573000000,"lastModified":1718788940000000,"id":431,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ipvoid.com/"},{"guid":"vQ84CaJo37I1","title":"Looking Glass - Hurricane Electric (AS6939)","index":73,"dateAdded":1629743882000000,"lastModified":1718788940000000,"id":432,"typeCode":1,"type":"text/x-moz-place","uri":"http://lg.he.net/"},{"guid":"EKhSOYeW7CMn","title":"IPv6 Ping | IPv6 Now","index":74,"dateAdded":1681325341000000,"lastModified":1718788940000000,"id":433,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.ipv6now.com.au/pingme.php"},{"guid":"56MIv1GqjpvR","title":"Major IP Address Blocks For Iran","index":75,"dateAdded":1675398122000000,"lastModified":1718788940000000,"id":434,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nirsoft.net/countryip/ir.html"},{"guid":"kk6sRY5CN_9T","title":"Network tools for every sys admin","index":76,"dateAdded":1610063809000000,"lastModified":1718788940000000,"id":435,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.dnsqueries.com/en/"},{"guid":"iyC4N8_QKEJZ","title":"ASN Number Lookup","index":77,"dateAdded":1689581857000000,"lastModified":1718788940000000,"id":436,"typeCode":1,"type":"text/x-moz-place","uri":"https://webtechsurvey.com/asn"},{"guid":"6A1lulWGG1uf","title":"BGP.Tools","index":78,"dateAdded":1687466868000000,"lastModified":1718788940000000,"id":437,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgp.tools/"},{"guid":"FHqgqqfN7ffU","title":"SSL Certificate Comparison and Reviews","index":79,"dateAdded":1642772200000000,"lastModified":1718788940000000,"id":438,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.sslshopper.com/"},{"guid":"aMgCD5_HOvD9","title":"SSL Lookup: Complete Digital Certificates Data | Spyse","index":80,"dateAdded":1598480785000000,"lastModified":1718788940000000,"id":439,"typeCode":1,"type":"text/x-moz-place","uri":"https://spyse.com/tools/ssl-lookup"},{"guid":"lHdroYYUxekF","title":"crt.sh | Certificate Search","index":81,"dateAdded":1598480857000000,"lastModified":1718788940000000,"id":440,"typeCode":1,"type":"text/x-moz-place","uri":"https://crt.sh/?"},{"guid":"ubmeQv22H1Dp","title":"DNSViz | A DNS visualization tool","index":82,"dateAdded":1598481625000000,"lastModified":1718788940000000,"id":441,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnsviz.net/"},{"guid":"-PQxRZ-qfxSU","title":"DNSSEC Analyzer","index":83,"dateAdded":1598481620000000,"lastModified":1718788940000000,"id":442,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnssec-analyzer.verisignlabs.com/"},{"guid":"j4AwvSoXzKSq","title":"Qualys SSL Labs","index":84,"dateAdded":1653596418000000,"lastModified":1718788940000000,"id":443,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ssllabs.com/"},{"guid":"wpGMygSQejNO","title":"WiGLE: Wireless Network Mapping","index":85,"dateAdded":1685897484000000,"lastModified":1718788940000000,"id":444,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.wigle.net/"},{"guid":"Ol1oK_up5K_c","title":"Mobile Number Tracker Find Owner Name and Location on Google Map.","index":86,"dateAdded":1658336534000000,"lastModified":1718788940000000,"id":445,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.emobiletracker.com/"},{"guid":"HrQ7KscdQFvu","title":"OpenCelliD - Largest Open Database of Cell Towers & Geolocation - by Unwired Labs","index":87,"dateAdded":1598496161000000,"lastModified":1718788940000000,"id":446,"typeCode":1,"type":"text/x-moz-place","uri":"https://opencellid.org/#zoom=16&lat=37.77889&lon=-122.41942"},{"guid":"PqBsp1pGYHhO","title":"Unwired Labs Location API - Geolocation, Geocoding & Maps - WiFi Positioning, Cell Tower Positioning, Locate IoT Devices, Location API & Cell Tower database","index":88,"dateAdded":1598399017000000,"lastModified":1718788940000000,"id":447,"typeCode":1,"type":"text/x-moz-place","uri":"https://unwiredlabs.com/home"},{"guid":"9cDSgoTi8vsa","title":"SIGINT | Advanced Interception Systems | Cellular Interception Systems | Passive GSM & Active GSM Interceptors | Equipment for law enforcement | GSM Interceptors | 2G Interceptors | 3G interceptors | 4G interceptors | LTE Interceptors | UMTS Interceptors | CDMA Intercept monitoring systems | Satellite Intercept monitoring systems | GSM intercept | 3G intercept | 4G intercept | Wi-Fi intercept | Iridium intercept |Thuraya intercept | Inmarsat intercept | VSAT intercept | car grabber","index":89,"dateAdded":1689633754000000,"lastModified":1718788940000000,"id":448,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.intercept.ws/"},{"guid":"Z2G0TxWLlx8-","title":"Insecam - World biggest online cameras directory","index":90,"dateAdded":1685904441000000,"lastModified":1718788940000000,"id":449,"typeCode":1,"type":"text/x-moz-place","uri":"http://insecam.org/"},{"guid":"sial4vsNjlJG","title":"EarthCam - Webcam Network","index":91,"dateAdded":1685904450000000,"lastModified":1718788940000000,"id":450,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.earthcam.com/"},{"guid":"-6p6V4EmfJFV","title":"Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6","index":92,"dateAdded":1598319222000000,"lastModified":1718788940000000,"id":451,"typeCode":1,"type":"text/x-moz-place","uri":"https://centralops.net/co/"},{"guid":"lSfy7mYrWQ0O","title":"domainIQ - Comprehensive domain name intelligence.","index":93,"dateAdded":1598319275000000,"lastModified":1718788940000000,"id":452,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.domainiq.com/"},{"guid":"jQpGlUFUbvRf","title":"Whois Lookup, Domain Availability & IP Search - DomainTools","index":94,"dateAdded":1598319282000000,"lastModified":1718788940000000,"id":453,"typeCode":1,"type":"text/x-moz-place","uri":"https://whois.domaintools.com/"},{"guid":"DYyfmWUuyL9o","title":"Free WHOIS - Domain Name Lookup | IP2WHOIS.com","index":95,"dateAdded":1598319301000000,"lastModified":1718788940000000,"id":454,"typeCode":1,"iconUri":"https://www.ip2whois.com/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.ip2whois.com/"},{"guid":"xAF6kSpUzYEa","title":"WHOIS Search, Domain Name, Website, and IP Tools - Who.is","index":96,"dateAdded":1598319325000000,"lastModified":1718788940000000,"id":455,"typeCode":1,"type":"text/x-moz-place","uri":"https://who.is/"},{"guid":"di8crxABaRsT","title":"Whoisology - Billions of archived domain name whois records","index":97,"dateAdded":1598319689000000,"lastModified":1718788940000000,"id":456,"typeCode":1,"type":"text/x-moz-place","uri":"https://whoisology.com/"},{"guid":"cE2mYkpdsoq2","title":"ViewDNS.info - Your one source for DNS related tools!","index":98,"dateAdded":1598319309000000,"lastModified":1718788940000000,"id":457,"typeCode":1,"type":"text/x-moz-place","uri":"https://viewdns.info/"},{"guid":"996vKtXEE811","title":"Toolbox | DNSstuff","index":99,"dateAdded":1598319608000000,"lastModified":1718788940000000,"id":458,"typeCode":1,"type":"text/x-moz-place","uri":"https://tools.dnsstuff.com/"},{"guid":"qoXWG3sG_sWo","title":"SEMrush - Online Visibility Management Platform","index":100,"dateAdded":1598328653000000,"lastModified":1718788940000000,"id":459,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.semrush.com/"},{"guid":"qb-zamXKfdt8","title":"DomainBigData.com - Online investigation tools","index":101,"dateAdded":1598319836000000,"lastModified":1718788940000000,"id":460,"typeCode":1,"type":"text/x-moz-place","uri":"https://domainbigdata.com/"},{"guid":"lVjDdMOEQN3d","title":"Whois API | Whois Lookup API | Domain Whois API","index":102,"dateAdded":1642070216000000,"lastModified":1718788940000000,"id":461,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.whoxy.com/"},{"guid":"IeaJVYjNuUSz","title":"Network tools and all website monitoring tools here","index":103,"dateAdded":1687386522000000,"lastModified":1718788940000000,"id":462,"typeCode":1,"iconUri":"https://www.host-tracker.com/Content/img/favicon.ico?v=2","type":"text/x-moz-place","uri":"https://www.host-tracker.com/en/ic"},{"guid":"keVgXoct2gTt","title":"ایرنیک (IRNIC) – ایرنیک","index":104,"dateAdded":1646969495000000,"lastModified":1718788940000000,"id":463,"typeCode":1,"iconUri":"https://www.nic.ir/images/dot-ir.01.16px.png","type":"text/x-moz-place","uri":"https://www.nic.ir/"},{"guid":"R2T7BCJEDDDL","title":"Online photo metadata and EXIF data viewer | Jimpl","index":105,"dateAdded":1677652313000000,"lastModified":1718788940000000,"id":464,"typeCode":1,"type":"text/x-moz-place","uri":"https://jimpl.com/"},{"guid":"k4OItUsGN_eR","title":"EXIF & Metadata Viewer","index":106,"dateAdded":1678592566000000,"lastModified":1718788940000000,"id":465,"typeCode":1,"type":"text/x-moz-place","uri":"https://exifmeta.com/"},{"guid":"5dLtYekbMg99","title":"NerdyData.com - Search The Web's Source Code for Technologies","index":107,"dateAdded":1606421320000000,"lastModified":1718788940000000,"id":466,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nerdydata.com/"},{"guid":"N7XKJMvAzYiy","title":"PDF SEARCH ENGINE - PDF,DOC,PPT,Ebook search ENGINE","index":108,"dateAdded":1609146646000000,"lastModified":1718788940000000,"id":467,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.findpdfdoc.com/"},{"guid":"bm7K87zr5w7X","title":"PDF Search Engine - Find free PDF books online","index":109,"dateAdded":1609146563000000,"lastModified":1718788940000000,"id":468,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.pdfsearchengine.info/"},{"guid":"Gr7sIzoSHxT1","title":"ExpertPages.com – Online Directory for Finding Experts","index":110,"dateAdded":1609185981000000,"lastModified":1718788940000000,"id":469,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.expertpages.com/"},{"guid":"Lwoi0SbLWXWX","title":"Expertise Finder | Expert Systems, Online Directory","index":111,"dateAdded":1609185986000000,"lastModified":1718788940000000,"id":470,"typeCode":1,"type":"text/x-moz-place","uri":"https://expertisefinder.com/"},{"guid":"f0SxZJXvtI3D","title":"Academia.edu - Share research","index":112,"dateAdded":1609185989000000,"lastModified":1718788940000000,"id":471,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.academia.edu/"},{"guid":"jfcSD20acvWn","title":"PDF Search Engine - soPDF.com","index":113,"dateAdded":1609146514000000,"lastModified":1718788940000000,"id":472,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.sopdf.com/"},{"guid":"RdxBX4W-pFqt","title":"PimEyes: Face Recognition Search Engine and Reverse Image Search","index":114,"dateAdded":1685897634000000,"lastModified":1718788940000000,"id":473,"typeCode":1,"type":"text/x-moz-place","uri":"https://pimeyes.com/en"},{"guid":"aEAFZZpBJJ0L","title":"Username Search - Social Media Profile Lookup - IDCrawl","index":115,"dateAdded":1685901799000000,"lastModified":1718788940000000,"id":474,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.idcrawl.com/username"},{"guid":"MptmtLfoRwXF","title":"CheckUsernames - Social Media Username Search by KnowEm","index":116,"dateAdded":1685901871000000,"lastModified":1718788940000000,"id":475,"typeCode":1,"type":"text/x-moz-place","uri":"https://checkusernames.com/"},{"guid":"GHb45Oip8h6s","title":"FaceCheck - Reverse Image Search - Face Recognition Search Engine","index":117,"dateAdded":1685902283000000,"lastModified":1718788940000000,"id":476,"typeCode":1,"type":"text/x-moz-place","uri":"https://facecheck.id/"},{"guid":"f1jXJy0bEEZF","title":"NameCheckup - Find Available Username","index":118,"dateAdded":1685902088000000,"lastModified":1718788940000000,"id":477,"typeCode":1,"type":"text/x-moz-place","uri":"https://namecheckup.com/"},{"guid":"Dr731DBkLAAt","title":"WhatsMyName Web","index":119,"dateAdded":1685901991000000,"lastModified":1718788940000000,"id":478,"typeCode":1,"type":"text/x-moz-place","uri":"https://whatsmyname.app/"},{"guid":"rPJgbXMoW0p6","title":"pictriev, face search engine","index":120,"dateAdded":1685903738000000,"lastModified":1718788940000000,"id":479,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.pictriev.com/"},{"guid":"4MArG_txbBUj","title":"Namechk | Username, Domain, and Trademark Search | Username Registration","index":121,"dateAdded":1598316623000000,"lastModified":1718788940000000,"id":480,"typeCode":1,"type":"text/x-moz-place","uri":"https://namechk.com/"},{"guid":"E1X7UTy2L6aZ","title":"namecheckr.com - Social and Domain Name Availability Search For Brand Professionals","index":122,"dateAdded":1598316793000000,"lastModified":1718788940000000,"id":481,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.namecheckr.com/"},{"guid":"Ojxr4osi5V2t","title":"Username Search | Social Network Search Engine | Find Anyone Online","index":123,"dateAdded":1598316888000000,"lastModified":1718788940000000,"id":482,"typeCode":1,"type":"text/x-moz-place","uri":"https://usersearch.org/"},{"guid":"1ZPIdzN6RLnE","title":"Instant Username Search","index":124,"dateAdded":1598316986000000,"lastModified":1718788940000000,"id":483,"typeCode":1,"type":"text/x-moz-place","uri":"https://instantusername.com/#/"},{"guid":"O5H6xrOIjMFu","title":"Fake Name Generator United States of America","index":125,"dateAdded":1650399378000000,"lastModified":1718788940000000,"id":484,"typeCode":1,"type":"text/x-moz-place","uri":"https://fakenamecreator.com/"},{"guid":"AIgeyfwtNvKa","title":"IID Generator & Validator - 3os","index":126,"dateAdded":1650399370000000,"lastModified":1718788940000000,"id":485,"typeCode":1,"type":"text/x-moz-place","uri":"https://3os.org/penetration-testing/utilities/idd-generator/"},{"guid":"TqEp5LbU6SZs","title":"Username Search - Social Media Profile Lookup - IDCrawl","index":127,"dateAdded":1658271131000000,"lastModified":1718788940000000,"id":486,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.idcrawl.com/username"},{"guid":"U01q5Occmdui","title":"Username Search | Search Dating Sites | Find User Profiles","index":128,"dateAdded":1658271408000000,"lastModified":1718788940000000,"id":487,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.usersearch.org/"},{"guid":"XzZFTWwhBX3p","title":"WhatsMyName Web","index":129,"dateAdded":1658271414000000,"lastModified":1718788940000000,"id":488,"typeCode":1,"type":"text/x-moz-place","uri":"https://whatsmyname.app/"},{"guid":"b5t3O49aVmVr","title":"Instagram Data Export, Analytics and Marketing","index":130,"dateAdded":1658263821000000,"lastModified":1718788940000000,"id":489,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.picodash.com/"},{"guid":"HOeqHkCf6xDZ","title":"StoryMapJS","index":131,"dateAdded":1658263953000000,"lastModified":1718788940000000,"id":490,"typeCode":1,"type":"text/x-moz-place","uri":"https://storymap.knightlab.com/"},{"guid":"XBPsyze-etff","title":"Search Reddit Comments by user and keyword - Free online tool","index":132,"dateAdded":1658267273000000,"lastModified":1718788940000000,"id":491,"typeCode":1,"type":"text/x-moz-place","uri":"https://randomtools.io/reddit-comment-search/"},{"guid":"ECGYFfrcnEBS","title":"subreddits","index":133,"dateAdded":1658267363000000,"lastModified":1718788940000000,"id":492,"typeCode":1,"type":"text/x-moz-place","uri":"http://subreddits.org/"},{"guid":"UyB9GI3dq0YP","title":"CheckUsernames - Social Media Username Search by KnowEm","index":134,"dateAdded":1658271126000000,"lastModified":1718788940000000,"id":493,"typeCode":1,"type":"text/x-moz-place","uri":"https://checkusernames.com/"},{"guid":"-FO-voDmS4Gd","title":"User Searcher: Free tool to search username in network","index":135,"dateAdded":1658271432000000,"lastModified":1718788940000000,"id":494,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.user-searcher.com/"},{"guid":"rKx_NZpMMjw5","title":"HEAVY.AI | Tweetmap","index":136,"dateAdded":1658323639000000,"lastModified":1718788940000000,"id":495,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.heavy.ai/demos/tweetmap"},{"guid":"MTkpQXysELQ1","title":"Sync.ME - Caller ID & Spam Call Blocker","index":137,"dateAdded":1658336505000000,"lastModified":1718788940000000,"id":496,"typeCode":1,"type":"text/x-moz-place","uri":"https://sync.me/"},{"guid":"pbMqn8PoNElB","title":"People Finder - Look up anyone! Try looking up a relative, friend, or you…","index":138,"dateAdded":1652639691000000,"lastModified":1718788940000000,"id":497,"typeCode":1,"type":"text/x-moz-place","uri":"https://ufind.name/"},{"guid":"JMoxugSG8I9_","title":"WHOIS Search, Domain Name, Website, and IP Tools - Who.is","index":139,"dateAdded":1685900590000000,"lastModified":1718788940000000,"id":498,"typeCode":1,"type":"text/x-moz-place","uri":"https://who.is/"},{"guid":"-rPqXDjAw3Gv","title":"intoDNS: checks DNS and mail servers health","index":140,"dateAdded":1685902717000000,"lastModified":1718788940000000,"id":499,"typeCode":1,"iconUri":"https://intodns.com/static/images/favicon.ico","type":"text/x-moz-place","uri":"https://intodns.com/"},{"guid":"ykn4pMZ8UNT4","title":"Webpage archive","index":141,"dateAdded":1685903233000000,"lastModified":1718788940000000,"id":500,"typeCode":1,"type":"text/x-moz-place","uri":"https://archive.is/"},{"guid":"uwP3pL1xMF8Y","title":"BuiltWith Technology Lookup","index":142,"dateAdded":1685901514000000,"lastModified":1718788940000000,"id":501,"typeCode":1,"iconUri":"https://d28rh9vvmrd65v.cloudfront.net/img/favicon.ico","type":"text/x-moz-place","uri":"https://builtwith.com/"},{"guid":"iooCaUIvb9OS","title":"Hurricane Electric BGP Toolkit","index":143,"dateAdded":1685907102000000,"lastModified":1718788940000000,"id":502,"typeCode":1,"type":"text/x-moz-place","uri":"https://bgp.he.net/"},{"guid":"k17wZe1dA2vW","title":"Entrust Certificate Search - Entrust, Inc.","index":144,"dateAdded":1686001743000000,"lastModified":1718788940000000,"id":503,"typeCode":1,"type":"text/x-moz-place","uri":"https://ui.ctsearch.entrust.com/ui/ctsearchui"},{"guid":"6c14bZLX0bTm","title":"IP and Domain Reputation Center || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","index":145,"dateAdded":1685901624000000,"lastModified":1718788940000000,"id":504,"typeCode":1,"type":"text/x-moz-place","uri":"https://talosintelligence.com/reputation_center/"},{"guid":"wgRZf9ITyVUB","title":"Crunchbase: Discover innovative companies and the people behind them","index":146,"dateAdded":1685902451000000,"lastModified":1718788940000000,"id":505,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.crunchbase.com/"},{"guid":"ZaAZWdL3FhLj","title":"OSINT.SH - All in one Information Gathering Tools","index":147,"dateAdded":1685906473000000,"lastModified":1718788940000000,"id":506,"typeCode":1,"type":"text/x-moz-place","uri":"https://osint.sh/"},{"guid":"WB12Laj-9PVq","title":"MAC Address Vendor Lookup | MAC Address Lookup","index":148,"dateAdded":1685906680000000,"lastModified":1718788940000000,"id":507,"typeCode":1,"type":"text/x-moz-place","uri":"https://maclookup.app/"},{"guid":"Ox6vaNciGubX","title":"Home | MAC Vendor Lookup Tool & API | MACVendors.com","index":149,"dateAdded":1685906700000000,"lastModified":1718788940000000,"id":508,"typeCode":1,"type":"text/x-moz-place","uri":"https://macvendors.com/"},{"guid":"o6Dyy8yQLdbO","title":"How Does Bitcoin Work?","index":150,"dateAdded":1692217150000000,"lastModified":1718788940000000,"id":509,"typeCode":1,"type":"text/x-moz-place","uri":"https://learnmeabitcoin.com/"},{"guid":"-p-Ex3vj8Evj","title":"Live Flight Tracker - Real-Time Flight Tracker Map | Flightradar24","index":151,"dateAdded":1694310849000000,"lastModified":1718788940000000,"id":510,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.flightradar24.com/"},{"guid":"UZYV0M7b_xvt","title":"Huntr - Job Application Tracker & CRM","index":152,"dateAdded":1680360155000000,"lastModified":1718788940000000,"id":511,"typeCode":1,"type":"text/x-moz-place","uri":"https://huntr.co/"},{"guid":"ezASVqKqiSnw","title":"See website cached version","index":153,"dateAdded":1658336933000000,"lastModified":1718788940000000,"id":512,"typeCode":1,"type":"text/x-moz-place","uri":"https://stored.website/"},{"guid":"F2asftXbUpi1","title":"Sitexpired","index":154,"dateAdded":1675917234000000,"lastModified":1718788940000000,"id":513,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.sitexpired.com/"},{"guid":"yPbAiTMQNTBo","title":"Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine","index":155,"dateAdded":1694160784000000,"lastModified":1718788940000000,"id":514,"typeCode":1,"iconUri":"https://archive.org/offshoot_assets/favicon.ico","type":"text/x-moz-place","uri":"https://archive.org/"},{"guid":"1Oka6ScMz2E5","title":"Free People Search Engine - IDCrawl","index":156,"dateAdded":1646073550000000,"lastModified":1718788940000000,"id":515,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.idcrawl.com/"},{"guid":"trrIK4Ej7aqy","title":"Free People Search | Reverse Phone Lookup | ThatsThem","index":157,"dateAdded":1650827264000000,"lastModified":1718788940000000,"id":516,"typeCode":1,"type":"text/x-moz-place","uri":"https://thatsthem.com/"},{"guid":"TAMpDYRsiWTc","title":"Have I Been Pwned: Check if your email has been compromised in a data breach","index":158,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":517,"typeCode":1,"type":"text/x-moz-place","uri":"https://haveibeenpwned.com/"},{"guid":"Oy6PiSwVaJap","title":"Temp Mail – The Best Temp Email Inbox","index":159,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":518,"typeCode":1,"type":"text/x-moz-place","uri":"https://tempmail.email/"},{"guid":"qdwkEE9Qsewz","title":"Temp Mail - Temporary Email","index":160,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":519,"typeCode":1,"type":"text/x-moz-place","uri":"https://tempail.com/en/"},{"guid":"0_7LuE83JVgw","title":"Find email addresses in seconds • Hunter (Email Hunter)","index":161,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":520,"typeCode":1,"iconUri":"https://hunter.io/assets/favicon/favicon-35c267ca9f2a39f1c9d7118c8533e74385d9e7a4fad1ced75fd51442ecfbceb2.ico","type":"text/x-moz-place","uri":"https://hunter.io/"},{"guid":"6mpYyL2KOIGY","title":"Epieos, the ultimate OSINT tool","index":162,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":521,"typeCode":1,"type":"text/x-moz-place","uri":"https://epieos.com/"},{"guid":"yXtqdqZp-Qhm","title":"Email Reputation Check, Email Risk Score Check | APIVoid","index":163,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":522,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.apivoid.com/tools/email-reputation-check/"},{"guid":"pofD1jEIwy9h","title":"Email Finder • Free email search for B2B sales | Snov.io","index":164,"dateAdded":1686013651000000,"lastModified":1718788940000000,"id":523,"typeCode":1,"type":"text/x-moz-place","uri":"https://snov.io/email-finder"},{"guid":"WI7dnxCfdFLZ","title":"Email Address Verifier - Validate and Check In Real Time | verifyemailaddress.io","index":165,"dateAdded":1658336674000000,"lastModified":1718788940000000,"id":524,"typeCode":1,"type":"text/x-moz-place","uri":"https://tools.emailhippo.com/"},{"guid":"5JDLdAp9JS4q","title":"Find email addresses in seconds • Hunter (Email Hunter)","index":166,"dateAdded":1598317169000000,"lastModified":1718788940000000,"id":525,"typeCode":1,"iconUri":"https://hunter.io/assets/favicon/favicon-35c267ca9f2a39f1c9d7118c8533e74385d9e7a4fad1ced75fd51442ecfbceb2.ico","type":"text/x-moz-place","uri":"https://hunter.io/"},{"guid":"8JqP5gFTLE6_","title":"Identity Information SEARCH & API for Professionals | Pipl","index":167,"dateAdded":1598317273000000,"lastModified":1718788940000000,"id":526,"typeCode":1,"type":"text/x-moz-place","uri":"https://pipl.com/"},{"guid":"CFqwVhgApTCq","title":"Find email addresses of companies and people - Skymem","index":168,"dateAdded":1598317331000000,"lastModified":1718788940000000,"id":527,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.skymem.info/"},{"guid":"Y2oj8cu-mwZK","title":"MailDB - Find and verify email addresses","index":169,"dateAdded":1598317644000000,"lastModified":1718788940000000,"id":528,"typeCode":1,"type":"text/x-moz-place","uri":"https://maildb.io/"},{"guid":"XT2duFZCiW2q","title":"Find email addresses in seconds • MailsHunt","index":170,"dateAdded":1598317669000000,"lastModified":1718788940000000,"id":529,"typeCode":1,"type":"text/x-moz-place","uri":"https://mailshunt.com/"},{"guid":"m-Noa_2DXbba","title":"Email Finder & Email Verification Tool - FindEmails.com","index":171,"dateAdded":1598317889000000,"lastModified":1718788940000000,"id":530,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.findemails.com/"},{"guid":"E9Og9DEBnwSB","title":"MailTester.com","index":172,"dateAdded":1598318120000000,"lastModified":1718788940000000,"id":531,"typeCode":1,"type":"text/x-moz-place","uri":"https://mailtester.com/testmail.php"},{"guid":"7NYggLaduybB","title":"Verify Email Address Online - Free Email Verifier - Free Email Address Verification","index":173,"dateAdded":1598318160000000,"lastModified":1718788940000000,"id":532,"typeCode":1,"type":"text/x-moz-place","uri":"https://verify-email.org/"},{"guid":"tBldnBF8kC9S","title":"Simple Email Reputation","index":174,"dateAdded":1598318290000000,"lastModified":1718788940000000,"id":533,"typeCode":1,"type":"text/x-moz-place","uri":"https://emailrep.io/"},{"guid":"HNsJUUXuDLK8","title":"Have I Been Pwned: Check if your email has been compromised in a data breach","index":175,"dateAdded":1598318358000000,"lastModified":1718788940000000,"id":534,"typeCode":1,"type":"text/x-moz-place","uri":"https://haveibeenpwned.com/"},{"guid":"YEaF3TK4sHrk","title":"Free Email Address Validation | MailboxValidator","index":176,"dateAdded":1598318303000000,"lastModified":1718788940000000,"id":535,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.mailboxvalidator.com/demo"},{"guid":"c7bB5FIuEx0i","title":"Emkei's Fake Mailer","index":177,"dateAdded":1600551348000000,"lastModified":1718788940000000,"id":536,"typeCode":1,"type":"text/x-moz-place","uri":"https://emkei.cz/?reCAPTCHAv2"},{"guid":"eqiZAH9R1V3q","title":"SPF Query Tool","index":178,"dateAdded":1600551669000000,"lastModified":1718788940000000,"id":537,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.kitterman.com/spf/validate.html"},{"guid":"FA0-3ToYqBR0","title":"VFEmail ™ - Quality Email Hosting (IMAP, Webmail, POP, SMTP) For Everyone","index":179,"dateAdded":1600898142000000,"lastModified":1718788940000000,"id":538,"typeCode":1,"type":"text/x-moz-place","uri":"https://vfemail.net/"},{"guid":"SjViapCEGQcb","title":"Email Validator: Real-Time Email Validation & Verification | Byteplant","index":180,"dateAdded":1609186028000000,"lastModified":1718788940000000,"id":539,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.email-validator.net/"},{"guid":"u1XRYVe2Ehma","title":"Find the email address format for millions of companies","index":181,"dateAdded":1609186030000000,"lastModified":1718788940000000,"id":540,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.email-format.com/"},{"guid":"5_p5jZ4j5AC9","title":"Email Address Verifier - Validate and Check In Real Time | verifyemailaddress.io","index":182,"dateAdded":1609186030000000,"lastModified":1718788940000000,"id":541,"typeCode":1,"type":"text/x-moz-place","uri":"https://tools.verifyemailaddress.io/"},{"guid":"_tKt5rbrErcY","title":"Reacher - Open-Source Email Verification API","index":183,"dateAdded":1609186033000000,"lastModified":1718788940000000,"id":542,"typeCode":1,"type":"text/x-moz-place","uri":"https://reacher.email/"},{"guid":"PZYffnYpAob6","title":"Email Checker | Hunter Email | Bounce Checker | Email Deliverability - MailTester","index":184,"dateAdded":1609186042000000,"lastModified":1718788940000000,"id":543,"typeCode":1,"type":"text/x-moz-place","uri":"https://mailtester.com/en/index.html"},{"guid":"iFZ57tXbXGjs","title":"Email Finder - Find anyone's email address — Norbert","index":185,"dateAdded":1609186046000000,"lastModified":1718788940000000,"id":544,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.voilanorbert.com/"},{"guid":"RUzUDnFDQU9o","title":"Fake Address Generator All Over the World - Fake Address, Random Address Generator","index":186,"dateAdded":1613873127000000,"lastModified":1718788940000000,"id":545,"typeCode":1,"iconUri":"https://www.fakeaddressgenerator.com/home/img/favicon.ico","type":"text/x-moz-place","uri":"https://www.fakeaddressgenerator.com/"},{"guid":"FvSZLVTaiB6Q","title":"Temp Mail - Free Temporary Disposable Email Address - Tempo Mail","index":187,"dateAdded":1650753883000000,"lastModified":1718788940000000,"id":546,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.tempo-mail.com/en"},{"guid":"oEDkexbILZfq","title":"Find People for Free Using an Email Address | ThatsThem","index":188,"dateAdded":1609186050000000,"lastModified":1718788940000000,"id":547,"typeCode":1,"type":"text/x-moz-place","uri":"https://thatsthem.com/reverse-email-lookup"},{"guid":"YNZRUSnjCqgm","title":"SPF Check & SPF Lookup - Sender Policy Framework (SPF) - MxToolBox","index":189,"dateAdded":1670830995000000,"lastModified":1718788940000000,"id":548,"typeCode":1,"type":"text/x-moz-place","uri":"https://mxtoolbox.com/spf.aspx"},{"guid":"_cuyE6YMjl7W","title":"Reverse Phone Lookup | Run Reverse Number Lookup - ReversePhoneCheck","index":190,"dateAdded":1598429768000000,"lastModified":1718788940000000,"id":549,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.reversephonecheck.com/"},{"guid":"HmeAnRZyZMtX","title":"Spokeo - People Search | White Pages | Reverse Phone Lookup","index":191,"dateAdded":1598429995000000,"lastModified":1718788940000000,"id":550,"typeCode":1,"iconUri":"https://assets.production.spokeo.com/assets/_next/static/media/favicon.bea8055e.ico","type":"text/x-moz-place","uri":"https://www.spokeo.com/"},{"guid":"TlkY07zcQPnX","title":"Free People Search, Reverse Phone Lookup, Business Telephone Directory | Canada411.ca","index":192,"dateAdded":1609186094000000,"lastModified":1718788940000000,"id":551,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.canada411.ca/"},{"guid":"6D-qFFVF5Hcr","title":"Google","index":193,"dateAdded":1686012478000000,"lastModified":1718788940000000,"id":552,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.google.com/"},{"guid":"cvi10KRP0Ej-","title":"Yandex","index":194,"dateAdded":1686012487000000,"lastModified":1718788940000000,"id":553,"typeCode":1,"iconUri":"https://yastatic.net/s3/home-static/_/nova/438e8052.png","type":"text/x-moz-place","uri":"https://yandex.com/"},{"guid":"C-1AJVfE_2Bd","title":"Yahoo Search - Web Search","index":195,"dateAdded":1686012508000000,"lastModified":1718788940000000,"id":554,"typeCode":1,"type":"text/x-moz-place","uri":"https://search.yahoo.com/"},{"guid":"-V8It6dhNuOm","title":"DuckDuckGo — Privacy, simplified.","index":196,"dateAdded":1686012516000000,"lastModified":1718788940000000,"id":555,"typeCode":1,"type":"text/x-moz-place","uri":"https://duckduckgo.com/"},{"guid":"EkxOppjuBMtb","title":"Home - ZoomEye really mapping,global leader of cyberspace mapping","index":197,"dateAdded":1685897807000000,"lastModified":1718788940000000,"id":556,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.zoomeye.org/"},{"guid":"2kJM7-Kqn_l8","title":"SerpApi: Google Search API","index":198,"dateAdded":1685906401000000,"lastModified":1718788940000000,"id":557,"typeCode":1,"type":"text/x-moz-place","uri":"https://serpapi.com/"},{"guid":"m4KEy5pKEyGG","title":"Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon","index":199,"dateAdded":1685907235000000,"lastModified":1718788940000000,"id":558,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.exploit-db.com/google-hacking-database"},{"guid":"5CCXyZSjxkwB","title":"Professional True People Search, Verify Phone Numbers, Batch, API","index":200,"dateAdded":1609186054000000,"lastModified":1718788940000000,"id":559,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.searchbug.com/"},{"guid":"ou9kcb9qaKNB","title":"Intelius - People Search, Reverse Phone Lookup, Reverse Address Lookup","index":201,"dateAdded":1651476034000000,"lastModified":1718788940000000,"id":560,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.intelius.com/"},{"guid":"U7NPdEsM2weC","title":"TruthFinder - People Search, Reverse Phone Lookup, Address Lookup","index":202,"dateAdded":1651476016000000,"lastModified":1718788940000000,"id":561,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.truthfinder.com/"},{"guid":"l529AqZvuEO5","title":"ThisNumber - International Phone Directories","index":203,"dateAdded":1598430730000000,"lastModified":1718788940000000,"id":562,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.thisnumber.com/"},{"guid":"9ZTrhHzqRUKm","title":"Trusted Communications Made Simple | OpenCNAM by Telo","index":204,"dateAdded":1598431183000000,"lastModified":1718788940000000,"id":563,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.opencnam.com/"},{"guid":"iG8pNyecUAQo","title":"Enterprise HLR Lookup Platform and API","index":205,"dateAdded":1598431192000000,"lastModified":1718788940000000,"id":564,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hlr-lookups.com/"},{"guid":"Rszu6rlYRFdS","title":"Data247 - We have a service for all of your data needs.","index":206,"dateAdded":1598431295000000,"lastModified":1718788940000000,"id":565,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.data247.com/"},{"guid":"dENh63E8vfay","title":"Phone Validator | Is it a Cell or is it a Landline?","index":207,"dateAdded":1598431399000000,"lastModified":1718788940000000,"id":566,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.phonevalidator.com/index.aspx"},{"guid":"Qf-c3eqk5xF3","title":"Free Reverse Phone Lookup - Cell Phone or Landline | Spy Dialer","index":208,"dateAdded":1598431421000000,"lastModified":1718788940000000,"id":567,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.spydialer.com/default.aspx"},{"guid":"lNQqQzgx1ia9","title":"Reverse Phone Lookup | Phone Number Lookup | 411","index":209,"dateAdded":1598431502000000,"lastModified":1718788940000000,"id":568,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.411.com/reverse-phone"},{"guid":"JWoEbTL7WQgr","title":"CallerID Test - Test your CallerID / CNAM for free","index":210,"dateAdded":1598431510000000,"lastModified":1718788940000000,"id":569,"typeCode":1,"type":"text/x-moz-place","uri":"https://calleridtest.com/"},{"guid":"Fc1dboc6ONZE","title":"The world's best Caller ID & Spam Blocking app | Truecaller","index":211,"dateAdded":1598431535000000,"lastModified":1718788940000000,"id":570,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.truecaller.com/"},{"guid":"1NnZUNyCatKG","title":"Twilio - Communication APIs for SMS, Voice, Video and Authentication","index":212,"dateAdded":1598431583000000,"lastModified":1718788940000000,"id":571,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.twilio.com/"},{"guid":"NEkjKk10UHKP","title":"نامبرلند | شماره مجازی ارزان | شماره مجازی تلگرام و سرویس های آنلاین virtual number","index":213,"dateAdded":1602176610000000,"lastModified":1718788940000000,"id":572,"typeCode":1,"iconUri":"https://numberland.ir/favicon-32x32.png","type":"text/x-moz-place","uri":"https://numberland.ir/"},{"guid":"Q1jpkSA0lxCn","title":"Most up to date list of MCC and MNC codes: mobile country codes – mobile network codes","index":214,"dateAdded":1605555024000000,"lastModified":1718788940000000,"id":573,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.mcc-mnc.com/"},{"guid":"O5b9cMDDCYnX","title":"Receive SMS Online | Temporary Phone Number","index":215,"dateAdded":1651517334000000,"lastModified":1718788940000000,"id":574,"typeCode":1,"type":"text/x-moz-place","uri":"https://receive-smss.com/"},{"guid":"Qwx5gmowIj9d","title":"Receive SMS Online for FREE - UK,Romania,USA,Spain,France,Germany,Russia","index":216,"dateAdded":1651517351000000,"lastModified":1718788940000000,"id":575,"typeCode":1,"type":"text/x-moz-place","uri":"http://receive-sms-online.info/"},{"guid":"8H7c7GEQ5uUu","title":"Receive SMS Online | Temporary Phone Number | Receive SMS Free","index":217,"dateAdded":1651517378000000,"lastModified":1718788940000000,"id":576,"typeCode":1,"type":"text/x-moz-place","uri":"https://receive-sms.cc/"},{"guid":"gCUM917i_zta","title":"Receive SMS online for free | Temporary Phone Numbers","index":218,"dateAdded":1651517383000000,"lastModified":1718788940000000,"id":577,"typeCode":1,"type":"text/x-moz-place","uri":"https://sms24.me/en/"},{"guid":"BOtw44_L2gYC","title":"Receive SMS Online | Temporary Phone Number","index":219,"dateAdded":1651517394000000,"lastModified":1718788940000000,"id":578,"typeCode":1,"type":"text/x-moz-place","uri":"https://freephonenum.com/"},{"guid":"fGhfYzI1M12k","title":"Receive SMS online for Free - without a Phone or Registration","index":220,"dateAdded":1651517400000000,"lastModified":1718788940000000,"id":579,"typeCode":1,"type":"text/x-moz-place","uri":"https://sms-online.co/receive-free-sms"},{"guid":"GUZ6_eiyBFW2","title":"Receive SMS online - France, Germany, Romania, Spain, United Kingdom, USA, and more ...","index":221,"dateAdded":1651517453000000,"lastModified":1718788940000000,"id":580,"typeCode":1,"type":"text/x-moz-place","uri":"http://sms-receive.net/"},{"guid":"5f1NbM1aV-On","title":"Receive SMS Online | Free SMS Verifications","index":222,"dateAdded":1651517460000000,"lastModified":1718788940000000,"id":581,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.receivesms.co/"},{"guid":"3nmSIhIZnUO1","title":"Free Receive SMS Online - GetFreeSMSNumber","index":223,"dateAdded":1651517467000000,"lastModified":1718788940000000,"id":582,"typeCode":1,"type":"text/x-moz-place","uri":"https://getfreesmsnumber.com/"},{"guid":"yAVcbWlWaDuj","title":"Receive SMS Online | Temporary and Disposable Phone Numbers","index":224,"dateAdded":1651517664000000,"lastModified":1718788940000000,"id":583,"typeCode":1,"type":"text/x-moz-place","uri":"https://smsreceivefree.com/"},{"guid":"HE8VMNN6LrIs","title":"Phone Validator API to Check Numbers & Look Up Carriers - Twilio","index":225,"dateAdded":1609185997000000,"lastModified":1718788940000000,"id":584,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.twilio.com/lookup"},{"guid":"BLu1Vv_OSZAa","title":"Cell Phone Number Lookup - Reverse Phone Lookup | National Cellular Directory","index":226,"dateAdded":1609186003000000,"lastModified":1718788940000000,"id":585,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nationalcellulardirectory.com/"},{"guid":"BBjtcPSWe-_c","title":"Free Reverse Phone Lookup - Cell Phone or Landline | Spy Dialer","index":227,"dateAdded":1609185999000000,"lastModified":1718788940000000,"id":586,"typeCode":1,"type":"text/x-moz-place","uri":"https://spydialer.com/default.aspx"},{"guid":"AiTNsh8bRHVG","title":"FREE to Lookup Unknown Callers - ReversePhoneLookup.com","index":228,"dateAdded":1609186001000000,"lastModified":1718788940000000,"id":587,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.reversephonelookup.com/"},{"guid":"N6naNIeIPuE7","title":"Fake address generator US - Random address generator , US address list","index":229,"dateAdded":1676825667000000,"lastModified":1718788940000000,"id":588,"typeCode":1,"iconUri":"https://www.fakexy.com/static/img/icon.png","type":"text/x-moz-place","uri":"https://www.fakexy.com/"},{"guid":"Cimwo6kZLevV","title":"All things telco in one MoreMins app! 1. Cheap International Calls 2. Cheap Virtual Phone Numbers. 3. Cheap eSIM Data for Travel. 4. Cheap SMS Abroad.","index":230,"dateAdded":1676817100000000,"lastModified":1718788940000000,"id":589,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.moremins.com/en"},{"guid":"Ziy76TLz0X3_","title":"Receive SMS Online for FREE - UK,Romania,USA,Spain,France,Germany,Russia","index":231,"dateAdded":1677724781000000,"lastModified":1718788940000000,"id":590,"typeCode":1,"type":"text/x-moz-place","uri":"https://receive-sms-online.info/"},{"guid":"dWllkiiMEIl-","title":"Whitepages - Official Site | Find People, Phone Numbers, Addresses & More","index":232,"dateAdded":1609186089000000,"lastModified":1718788940000000,"id":591,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.whitepages.com/"},{"guid":"xYW_J5aX8n2s","title":"Instagram editor and viewer - Picuki.com","index":233,"dateAdded":1695222868000000,"lastModified":1718788940000000,"id":592,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.picuki.com/"},{"guid":"iBUXptC1_LO3","title":"Imginn: Viewer And Downloader Photo, Video On Instagram","index":234,"dateAdded":1695222863000000,"lastModified":1718788940000000,"id":593,"typeCode":1,"type":"text/x-moz-place","uri":"https://imginn.io/"},{"guid":"SSanDzO3Qgs4","title":"Instagram Downloader - Download Instagram Video, Reels, Story, Photo, IGTV online - Snapinsta","index":235,"dateAdded":1695222846000000,"lastModified":1718788940000000,"id":594,"typeCode":1,"iconUri":"https://snapinsta.app/img/icon_100.png","type":"text/x-moz-place","uri":"https://snapinsta.app/"},{"guid":"wZLyCjwoFire","title":"Trending Hashtags Instagram Twitter Facebook | HashAtIt","index":236,"dateAdded":1695222709000000,"lastModified":1718788940000000,"id":595,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hashatit.com/"},{"guid":"Da14Jz418CSG","title":"Instagram Integrations - Connect Your Apps with IFTTT","index":237,"dateAdded":1695222894000000,"lastModified":1718788940000000,"id":596,"typeCode":1,"type":"text/x-moz-place","uri":"https://ifttt.com/instagram"},{"guid":"HmkqHSmwoaZO","title":"Followerwonk: Tools for Twitter Analytics, Bio Search and More","index":238,"dateAdded":1695226407000000,"lastModified":1718788940000000,"id":597,"typeCode":1,"type":"text/x-moz-place","uri":"https://followerwonk.com/"},{"guid":"1ehYeX8M2nF9","title":"Pinterest Images Download - Save Pinterest Images - Pinterest Photo Save","index":239,"dateAdded":1695226421000000,"lastModified":1718788940000000,"id":598,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.expertsphp.com/pinterest-photo-downloader.html"},{"guid":"7fnYa0ZlgwIE","title":"Telegram channels and groups catalog / Russia — TGStat","index":240,"dateAdded":1694160671000000,"lastModified":1718788940000000,"id":599,"typeCode":1,"type":"text/x-moz-place","uri":"https://tgstat.ru/en"},{"guid":"IEb3j7uolzPS","title":"Find my Facebook ID | Find Facebook Group ID | Find Facebook Page ID","index":241,"dateAdded":1658324579000000,"lastModified":1718788940000000,"id":600,"typeCode":1,"type":"text/x-moz-place","uri":"https://lookup-id.com/"},{"guid":"pwQH57rEMDRY","title":"Twitter. It’s what’s happening / Twitter","index":242,"dateAdded":1658324317000000,"lastModified":1718788940000000,"id":601,"typeCode":1,"type":"text/x-moz-place","uri":"https://twitter.com/"},{"guid":"F1WUxYFHiGLV","title":"Twitter Audit | How many of your followers are real?","index":243,"dateAdded":1658324370000000,"lastModified":1718788940000000,"id":602,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.twitteraudit.com/"},{"guid":"absj7yjy3UVl","title":"Find Facebook ID in two simple steps | Find Facebook ID","index":244,"dateAdded":1658324568000000,"lastModified":1718788940000000,"id":603,"typeCode":1,"type":"text/x-moz-place","uri":"https://randomtools.io/"},{"guid":"4A_qaiQIZx4H","title":"Search people by name and birth year | VK","index":245,"dateAdded":1658268249000000,"lastModified":1718788940000000,"id":604,"typeCode":1,"type":"text/x-moz-place","uri":"https://vk.com/people"},{"guid":"sTMb6aepccGf","title":"VK.watch – история профилей ВКонтакте","index":246,"dateAdded":1658268219000000,"lastModified":1718788940000000,"id":605,"typeCode":1,"type":"text/x-moz-place","uri":"https://vk.watch/"},{"guid":"U1ZQh_DEQyMm","title":"Find A Discord","index":247,"dateAdded":1692504997000000,"lastModified":1718788940000000,"id":606,"typeCode":1,"type":"text/x-moz-place","uri":"https://findadiscord.com/"},{"guid":"KZahy8KqsbjZ","title":"Home","index":248,"dateAdded":1692504796000000,"lastModified":1718788940000000,"id":607,"typeCode":1,"type":"text/x-moz-place","uri":"https://lyzem.com/"},{"guid":"okgkWlN3S0GR","title":"Find my Facebook ID","index":249,"dateAdded":1598418920000000,"lastModified":1718788940000000,"id":608,"typeCode":1,"type":"text/x-moz-place","uri":"https://findmyfbid.com/"},{"guid":"o6rG_0ApOdio","title":"Twoogel Search Engine","index":250,"dateAdded":1598419258000000,"lastModified":1718788940000000,"id":609,"typeCode":1,"type":"text/x-moz-place","uri":"http://twoogel.com/"},{"guid":"EBEC8PPNlkqH","title":"Twitterfall","index":251,"dateAdded":1598419313000000,"lastModified":1718788940000000,"id":610,"typeCode":1,"type":"text/x-moz-place","uri":"https://twitterfall.com/"},{"guid":"dSytVVhb-x3z","title":"tinfoleak | Free dossier of a twitter user","index":252,"dateAdded":1598419566000000,"lastModified":1718788940000000,"id":611,"typeCode":1,"type":"text/x-moz-place","uri":"https://tinfoleak.com/"},{"guid":"L5Q5HPn5gQwi","title":"Twitter Analytics for Tweets, Timelines & Twitter Maps | Social Bearing","index":253,"dateAdded":1598420164000000,"lastModified":1718788940000000,"id":612,"typeCode":1,"type":"text/x-moz-place","uri":"https://socialbearing.com/"},{"guid":"TKgJnteptoPB","title":"Twitter Trending Hashtags and Topics - Trendsmap","index":254,"dateAdded":1598420090000000,"lastModified":1718788940000000,"id":613,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.trendsmap.com/"},{"guid":"TeQfMuzuvxmm","title":"Mentionmapp Analytics | Social Network Analysis & Insights","index":255,"dateAdded":1598420220000000,"lastModified":1718788940000000,"id":614,"typeCode":1,"type":"text/x-moz-place","uri":"https://mentionmapp.com/"},{"guid":"cR5hfMovKZBi","title":"Foller.me Analytics for Twitter","index":256,"dateAdded":1598420232000000,"lastModified":1718788940000000,"id":615,"typeCode":1,"type":"text/x-moz-place","uri":"https://foller.me/"},{"guid":"lZG5B89NXF_g","title":"Reddit Investigator","index":257,"dateAdded":1598420652000000,"lastModified":1718788940000000,"id":616,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.redditinvestigator.com/"},{"guid":"J5BCeJ9ctWaL","title":"Graph Reddit Comments","index":258,"dateAdded":1598420648000000,"lastModified":1718788940000000,"id":617,"typeCode":1,"type":"text/x-moz-place","uri":"https://roadtolarissa.com/javascript/reddit-comment-visualizer/"},{"guid":"IfpM9O5nUhem","title":"SnoopSnoo - reddit user and subreddit analytics","index":259,"dateAdded":1598420643000000,"lastModified":1718788940000000,"id":618,"typeCode":1,"type":"text/x-moz-place","uri":"https://snoopsnoo.com/"},{"guid":"1tVZQeds2LUO","title":"YouTube, Twitch, Twitter, & Instagram Statistics - SocialBlade.com","index":260,"dateAdded":1598429333000000,"lastModified":1718788940000000,"id":619,"typeCode":1,"type":"text/x-moz-place","uri":"https://socialblade.com/"},{"guid":"SWUTAZJ7d-Cb","title":"Social Searcher - Free Social Media Search Engine","index":261,"dateAdded":1598429369000000,"lastModified":1718788940000000,"id":620,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.social-searcher.com/"},{"guid":"XqTJU0EV04eO","title":"Ловим целевую аудиторию ВКонтакте — TargetHunter","index":262,"dateAdded":1609173426000000,"lastModified":1718788940000000,"id":621,"typeCode":1,"type":"text/x-moz-place","uri":"https://targethunter.ru/"},{"guid":"hnu8FsIX5k0t","title":"Social Data from Millions of Sources - Twingly","index":263,"dateAdded":1609173428000000,"lastModified":1718788940000000,"id":622,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.twingly.com/"},{"guid":"sOfOaXTnrQIL","title":"Search Reddit Comments by User","index":264,"dateAdded":1609173432000000,"lastModified":1718788940000000,"id":623,"typeCode":1,"type":"text/x-moz-place","uri":"https://redditcommentsearch.com/"},{"guid":"8N6Ahkrgcxhg","title":"Iconosquare - Instagram, Facebook & Twitter Analytics and Management Platform","index":265,"dateAdded":1609173432000000,"lastModified":1718788940000000,"id":624,"typeCode":1,"type":"text/x-moz-place","uri":"https://pro.iconosquare.com/"},{"guid":"25PdVWwMdayi","title":"SocialRank","index":266,"dateAdded":1609173434000000,"lastModified":1718788940000000,"id":625,"typeCode":1,"type":"text/x-moz-place","uri":"https://socialrank.com/"},{"guid":"KUEB9UN7wllI","title":"Receive Custom Twitter Alerts for Important Tweets | MyTweetAlerts.com","index":267,"dateAdded":1609173436000000,"lastModified":1718788940000000,"id":626,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.mytweetalerts.com/"},{"guid":"dekaIka1gG9u","title":"ManageFlitter - Twitter Management Tool | Work Faster & Smarter","index":268,"dateAdded":1609173437000000,"lastModified":1718788940000000,"id":627,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.manageflitter.com/"},{"guid":"AUxRWhCJbsfa","title":"Twitter Account Analytics by burrrd.","index":269,"dateAdded":1609173439000000,"lastModified":1718788940000000,"id":628,"typeCode":1,"type":"text/x-moz-place","uri":"https://burrrd.com/"},{"guid":"6g8AR7NWW5fk","title":"Twitter Search — BackTweets","index":270,"dateAdded":1609173441000000,"lastModified":1718788940000000,"id":629,"typeCode":1,"type":"text/x-moz-place","uri":"http://backtweets.com/"},{"guid":"quALU3dYT192","title":"LeakCheck - Find out if your credentials have been compromised","index":271,"dateAdded":1609186004000000,"lastModified":1718788940000000,"id":630,"typeCode":1,"type":"text/x-moz-place","uri":"https://leakcheck.io/"},{"guid":"MWVKqc6zJHue","title":"DeHashed — #FreeThePassword","index":272,"dateAdded":1609186024000000,"lastModified":1718788940000000,"id":631,"typeCode":1,"type":"text/x-moz-place","uri":"https://dehashed.com/"},{"guid":"tb-rLhQlJVAN","title":"Beeceptor - Zero Coding Rest API Mocking - Rest API Mock Server","index":273,"dateAdded":1610946388000000,"lastModified":1718788940000000,"id":632,"typeCode":1,"type":"text/x-moz-place","uri":"https://beeceptor.com/"},{"guid":"K0cVyp_9J-0I","title":"DKIM, SPF, and Spam Assassin Validator - dkimvalidator.com","index":274,"dateAdded":1621039406000000,"lastModified":1718788940000000,"id":633,"typeCode":1,"type":"text/x-moz-place","uri":"https://dkimvalidator.com/"},{"guid":"0cysKIcqeg-5","title":"واتساپ","index":275,"dateAdded":1647218702000000,"lastModified":1718788940000000,"id":634,"typeCode":1,"type":"text/x-moz-place","uri":"https://web.whatsapp.com/"},{"guid":"g2iiFn2VOOf1","title":"Telegram channels and groups catalog / Iran — TGStat","index":276,"dateAdded":1673899489000000,"lastModified":1718788940000000,"id":635,"typeCode":1,"type":"text/x-moz-place","uri":"https://ir.tgstat.com/"},{"guid":"j_5ckYXBBTpX","title":"socialpanel24","index":277,"dateAdded":1688958838000000,"lastModified":1718788940000000,"id":636,"typeCode":1,"type":"text/x-moz-place","uri":"https://socialpanel24.com/"},{"guid":"zxWw-c3-twD1","title":"SMM Panel - Cheapest SMM Services reseller | nicesmmpanel","index":278,"dateAdded":1688958818000000,"lastModified":1718788940000000,"id":637,"typeCode":1,"type":"text/x-moz-place","uri":"https://nicesmmpanel.com/"},{"guid":"2MlVGIdsKwu6","title":"Advertising & Digital Marketing Agency","index":279,"dateAdded":1688958718000000,"lastModified":1718788940000000,"id":638,"typeCode":1,"type":"text/x-moz-place","uri":"https://bestofpanel.com/"},{"guid":"n9ckGOZAgRaw","title":"#1 SMM PANEL IN THE WORLD FOR 5 YEARS! | JustAnotherPanel.com","index":280,"dateAdded":1688958714000000,"lastModified":1718788940000000,"id":639,"typeCode":1,"type":"text/x-moz-place","uri":"https://justanotherpanel.com/"},{"guid":"-2DmzRHPkfkM","title":"Random Test Credit Card Numbers Generator - NamsoGen","index":281,"dateAdded":1688859977000000,"lastModified":1718788940000000,"id":640,"typeCode":1,"type":"text/x-moz-place","uri":"https://namso-gen.com/"},{"guid":"70vkBMuTgo5W","title":"Reputation Profiles & Scores | Background & Contact Info | MyLife.com","index":282,"dateAdded":1609186056000000,"lastModified":1718788940000000,"id":641,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.mylife.com/"},{"guid":"ei4Afi63QpaG","title":"Netlas","index":283,"dateAdded":1676462900000000,"lastModified":1718788940000000,"id":642,"typeCode":1,"type":"text/x-moz-place","uri":"https://netlas.io/"},{"guid":"03dUIARuY3Ro","title":"SocioViz is a free Social Network Analysis tool for Twitter. Do you need a social media analytics software for Social Media Marketing, Digital Journalism or Social Research? Have a try and jump on board!","index":284,"dateAdded":1643663339000000,"lastModified":1718788940000000,"id":643,"typeCode":1,"type":"text/x-moz-place","uri":"https://socioviz.net/"},{"guid":"aWMMFNZA3XQg","title":"OSINT Framework","index":285,"dateAdded":1676299351000000,"lastModified":1718788940000000,"id":644,"typeCode":1,"type":"text/x-moz-place","uri":"https://osintframework.com/"},{"guid":"eHc-0n8d2KT8","title":"Shodan Search Engine","index":286,"dateAdded":1685897101000000,"lastModified":1718788940000000,"id":645,"typeCode":1,"iconUri":"https://www.shodan.io/static/img/favicon-60c1b1cd.png","type":"text/x-moz-place","uri":"https://www.shodan.io/"},{"guid":"nI8LA2Qht2Xz","title":"FOFA Search Engine","index":287,"dateAdded":1680360175000000,"lastModified":1718788940000000,"id":646,"typeCode":1,"type":"text/x-moz-place","uri":"https://fofa.info/"},{"guid":"JA5zLnSUVRCj","title":"Cybersecurity Search Engine | Criminal IP","index":288,"dateAdded":1674595541000000,"lastModified":1718788940000000,"id":647,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.criminalip.io/"},{"guid":"T2g_z0g6bNEU","title":"OSINT.SH - All in one Information Gathering Tools","index":289,"dateAdded":1659238224000000,"lastModified":1718788940000000,"id":648,"typeCode":1,"type":"text/x-moz-place","uri":"https://osint.sh/"},{"guid":"ks_HkttZ-gOc","title":"Entry Level Jobs and Internships","index":290,"dateAdded":1658336844000000,"lastModified":1718788940000000,"id":649,"typeCode":1,"type":"text/x-moz-place","uri":"https://campuscareercenter.com/"},{"guid":"ZEsFEpp2tFE8","title":"Find a Job | CareerBuilder","index":291,"dateAdded":1658336864000000,"lastModified":1718788940000000,"id":650,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.careerbuilder.com/"},{"guid":"yanIP5XFTYCJ","title":"Comparably - Transparent Cultures, Brands & Salaries","index":292,"dateAdded":1658336799000000,"lastModified":1718788940000000,"id":651,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.comparably.com/"},{"guid":"SGXUmlDxeXPw","title":"GuideStar nonprofit reports and Forms 990 for donors, grantmakers, and businesses","index":293,"dateAdded":1658336819000000,"lastModified":1718788940000000,"id":652,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.guidestar.org/"},{"guid":"3Gdbl94zPnT1","title":"Find 1000s of UK Jobs. Start your job search with Jobsite UK","index":294,"dateAdded":1658336828000000,"lastModified":1718788940000000,"id":653,"typeCode":1,"iconUri":"https://www.jobsite.co.uk/sharedassets/favicon/jobsite/favicon.png","type":"text/x-moz-place","uri":"https://www.jobsite.co.uk/"},{"guid":"q4hewyfTJnUd","title":"JOBS.pl - Twój serwis pracy","index":295,"dateAdded":1658336833000000,"lastModified":1718788940000000,"id":654,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.jobs.pl/"},{"guid":"dGxe9oWjKJxT","title":"Entry Level Jobs | Internships for Students | College Recruiter","index":296,"dateAdded":1658336869000000,"lastModified":1718788940000000,"id":655,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.collegerecruiter.com/"},{"guid":"6pzX7nd_tPlD","title":"Find Jobs in Technology","index":297,"dateAdded":1658336880000000,"lastModified":1718788940000000,"id":656,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.dice.com/"},{"guid":"nnL6cYywcQ5R","title":"Programmable Search Engine","index":298,"dateAdded":1658268182000000,"lastModified":1718788940000000,"id":657,"typeCode":1,"type":"text/x-moz-place","uri":"https://cse.google.com/cse?&cx=006368593537057042503:efxu7xprihg#gsc.tab=0"},{"guid":"1gf7auWfs8uo","title":"Hashtagify.me - Search And Find The Best Twitter Hashtags - Free","index":299,"dateAdded":1658324693000000,"lastModified":1718788940000000,"id":658,"typeCode":1,"type":"text/x-moz-place","uri":"https://hashtagify.me/"},{"guid":"YhPekf4fsTRS","title":"Welcome to FreeCarrierLookup.com","index":300,"dateAdded":1658336499000000,"lastModified":1718788940000000,"id":659,"typeCode":1,"type":"text/x-moz-place","uri":"https://freecarrierlookup.com/"},{"guid":"bWIXikTqOn9L","title":"Keyword Tool ⚠️ Google Keyword Planner【Search FREE】","index":301,"dateAdded":1658336915000000,"lastModified":1718788940000000,"id":660,"typeCode":1,"type":"text/x-moz-place","uri":"https://keywordtool.io/"},{"guid":"clfJHHMawo_R","title":"Free Keyword Research Tool from Wordtracker","index":302,"dateAdded":1658336920000000,"lastModified":1718788940000000,"id":661,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.wordtracker.com/"},{"guid":"BWvNvuM531RP","title":"DataLead - Industry Leading B2B Contact Database","index":303,"dateAdded":1675936335000000,"lastModified":1718788940000000,"id":662,"typeCode":1,"type":"text/x-moz-place","uri":"https://data-lead.com/"},{"guid":"iwc1Z-Anomtg","title":"AsINT_Collection - start.me","index":304,"dateAdded":1684074135000000,"lastModified":1718788940000000,"id":663,"typeCode":1,"type":"text/x-moz-place","uri":"https://start.me/p/b5Aow7/asint_collection"},{"guid":"lOfLQ5CVX3iP","title":"DorkSearch - Speed up your Google Dorking","index":305,"dateAdded":1694159800000000,"lastModified":1718788940000000,"id":664,"typeCode":1,"iconUri":"https://dorksearch.com/static/img/favicon.ico","type":"text/x-moz-place","uri":"https://dorksearch.com/"},{"guid":"PX-yAo00d_XX","title":"DeHashed — #FreeThePassword","index":306,"dateAdded":1694159833000000,"lastModified":1718788940000000,"id":665,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.dehashed.com/"},{"guid":"af1AMmrlwjUs","title":"Sourcinglab Boolean X-Ray Search Tool | Sourcinglab","index":307,"dateAdded":1698128212000000,"lastModified":1718788940000000,"id":666,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.sourcinglab.io/"},{"guid":"M_MKYtQHPrMS","title":"WikiLeaks","index":308,"dateAdded":1598418369000000,"lastModified":1718788940000000,"id":667,"typeCode":1,"type":"text/x-moz-place","uri":"https://wikileaks.org/"},{"guid":"zsWhN54o_tfQ","title":"Search People Find Friends Find Anyone People Search - MyLife.com","index":309,"dateAdded":1609186061000000,"lastModified":1718788940000000,"id":668,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.mylife.com/people-search/"},{"guid":"1QxbtY3rxzMa","title":"استعلام آنلاین","index":310,"dateAdded":1626343994000000,"lastModified":1718788940000000,"id":669,"typeCode":1,"iconUri":"https://www.searchline.ir/images/icon.png","type":"text/x-moz-place","uri":"https://www.searchline.ir/"},{"guid":"swSJBotZH81W","title":"People and Business search - Public records - Background check","index":311,"dateAdded":1598429943000000,"lastModified":1718788940000000,"id":670,"typeCode":1,"type":"text/x-moz-place","uri":"https://radaris.com/"},{"guid":"v80_BHl7cVSq","title":"PeekYou - People Search Made Easy","index":312,"dateAdded":1598430040000000,"lastModified":1718788940000000,"id":671,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.peekyou.com/"},{"guid":"nv0IP_tkn2tO","title":"FamilySearch • Free Family Trees and Genealogy Archives — FamilySearch.org","index":313,"dateAdded":1609186079000000,"lastModified":1718788940000000,"id":672,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.familysearch.org/en/"},{"guid":"O-mb3oQ0m1za","title":"Instant Checkmate - People Search & Reverse Phone Lookup","index":314,"dateAdded":1651476026000000,"lastModified":1718788940000000,"id":673,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.instantcheckmate.com/"},{"guid":"_bR41cMt3w1D","title":"Free Public Records Search - judyrecords","index":315,"dateAdded":1609186061000000,"lastModified":1718788940000000,"id":674,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.judyrecords.com/"},{"guid":"5fv_E93mo093","title":"searchcode | source code search engine","index":316,"dateAdded":1598471946000000,"lastModified":1718788940000000,"id":676,"typeCode":1,"iconUri":"https://searchcode.com/static/favicon.ico","type":"text/x-moz-place","uri":"https://searchcode.com/"},{"guid":"kNrL6LKtzSOX","title":"New Report | NerdyData.com","index":317,"dateAdded":1598471942000000,"lastModified":1718788940000000,"id":677,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nerdydata.com/reports/new"},{"guid":"UJFTPJRJz2bN","title":"Dataset Search","index":318,"dateAdded":1684851227000000,"lastModified":1718788940000000,"id":678,"typeCode":1,"type":"text/x-moz-place","uri":"https://datasetsearch.research.google.com/"},{"guid":"Z7ty-e4cgske","title":"Search Engine for Source Code - PublicWWW.com","index":319,"dateAdded":1598471983000000,"lastModified":1718788940000000,"id":679,"typeCode":1,"type":"text/x-moz-place","uri":"https://publicwww.com/"},{"guid":"rWBwD-N6sCcy","title":"IEEE Xplore","index":320,"dateAdded":1676398612000000,"lastModified":1718788940000000,"id":680,"typeCode":1,"type":"text/x-moz-place","uri":"https://ieeexplore.ieee.org/Xplore/home.jsp"},{"guid":"7_KFMiM3YyQz","title":"Snusbase - Database Search Engine","index":321,"dateAdded":1598499710000000,"lastModified":1718788940000000,"id":681,"typeCode":1,"type":"text/x-moz-place","uri":"https://snusbase.com/"},{"guid":"-CKSBjTVm8hR","title":"Locate IP Address Lookup","index":322,"dateAdded":1685902645000000,"lastModified":1718788940000000,"id":682,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.infosniper.net/"},{"guid":"zSXpFA6Y2vg-","title":"Online photo metadata and EXIF data viewer | Jimpl","index":323,"dateAdded":1685904412000000,"lastModified":1718788940000000,"id":683,"typeCode":1,"type":"text/x-moz-place","uri":"https://jimpl.com/"},{"guid":"mG-_QdRDIRNZ","title":"Photo Location & Online EXIF Data Viewer - Pic 2 Map","index":324,"dateAdded":1685904546000000,"lastModified":1718788940000000,"id":684,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.pic2map.com/"},{"guid":"3DmzFWJYkwo2","title":"IP Address to Identify Geolocation Information | IP2Location","index":325,"dateAdded":1598340169000000,"lastModified":1718788940000000,"id":685,"typeCode":1,"iconUri":"https://cdn.ip2location.com/assets/img/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.ip2location.com/"},{"guid":"dx4s5oDVlxRG","title":"IPv4/IPv6 address block lists by country code","index":326,"dateAdded":1598340190000000,"lastModified":1718788940000000,"id":686,"typeCode":1,"type":"text/x-moz-place","uri":"http://ipverse.net/"},{"guid":"nEX8XA2QYRlU","title":"IP Locator | IP Location Finder | Locate Network Address | Internet Protocol Tools","index":327,"dateAdded":1598340495000000,"lastModified":1718788940000000,"id":687,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.ipfingerprints.com/"},{"guid":"pjN0WNedaDII","title":"IP Geolocation and Online Fraud Prevention | MaxMind","index":328,"dateAdded":1598481854000000,"lastModified":1718788940000000,"id":688,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.maxmind.com/en/home"},{"guid":"PiWhU9Bqxker","title":"IP Geolocation API & Free Address Database | DB-IP","index":329,"dateAdded":1598340592000000,"lastModified":1718788940000000,"id":689,"typeCode":1,"iconUri":"https://db-ip.com/favicon-32x32.png","type":"text/x-moz-place","uri":"https://db-ip.com/"},{"guid":"numfEWolY-Yy","title":"Where is my IP location? (Geolocation)","index":330,"dateAdded":1598340616000000,"lastModified":1718788940000000,"id":690,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.iplocation.net/"},{"guid":"NrKGDB7tW15_","title":"Locate IP Address Lookup Show on Map City of the IP 5.237.166.52","index":331,"dateAdded":1598340677000000,"lastModified":1718788940000000,"id":691,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.infosniper.net/"},{"guid":"zmXa4NREVMXi","title":"Track any ip address find out where it comes from.","index":332,"dateAdded":1598340852000000,"lastModified":1718788940000000,"id":692,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.iptrackeronline.com/"},{"guid":"l4duK1g_Vt5z","title":"The Best IP Geolocation Database | IPIP.NET","index":333,"dateAdded":1610059674000000,"lastModified":1718788940000000,"id":693,"typeCode":1,"type":"text/x-moz-place","uri":"https://en.ipip.net/"},{"guid":"_VqxLBKEtNse","title":"Soar | Discover your Earth","index":334,"dateAdded":1659238344000000,"lastModified":1718788940000000,"id":694,"typeCode":1,"type":"text/x-moz-place","uri":"https://soar.earth/"},{"guid":"L8rR4ly5XAaM","title":"Polymaps","index":335,"dateAdded":1659235776000000,"lastModified":1718788940000000,"id":695,"typeCode":1,"type":"text/x-moz-place","uri":"http://polymaps.org/"},{"guid":"A-yRC5xkiLQ6","title":"GeoGuessr - Let's explore the world!","index":336,"dateAdded":1675643580000000,"lastModified":1718788940000000,"id":696,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.geoguessr.com/"},{"guid":"vnZWps86sSv9","title":"GreyNoise","index":337,"dateAdded":1657953277000000,"lastModified":1718788940000000,"id":697,"typeCode":1,"type":"text/x-moz-place","uri":"https://viz.greynoise.io/"},{"guid":"ACkd1Gayz07N","title":"Flightradar24: Live Flight Tracker - Real-Time Flight Tracker Map","index":338,"dateAdded":1598467068000000,"lastModified":1718788940000000,"id":698,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.flightradar24.com/35.7,51.42/8"},{"guid":"HhlTi_6H0aM6","title":"Live Flight Tracker - FlightAware","index":339,"dateAdded":1598467054000000,"lastModified":1718788940000000,"id":699,"typeCode":1,"type":"text/x-moz-place","uri":"https://flightaware.com/live/"},{"guid":"NqzvfJOpTyii","title":"Hivemapper - Build smarter maps that see and understand changes.","index":340,"dateAdded":1598468128000000,"lastModified":1718788940000000,"id":700,"typeCode":1,"type":"text/x-moz-place","uri":"https://hivemapper.com/"},{"guid":"X4SGaja_lLak","title":"Bing Maps - Directions, trip planning, traffic cameras & more","index":341,"dateAdded":1598469650000000,"lastModified":1718788940000000,"id":701,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.bing.com/maps/"},{"guid":"ekGNJVYLhvbl","title":"Google Maps","index":342,"dateAdded":1598469653000000,"lastModified":1718788940000000,"id":702,"typeCode":1,"iconUri":"https://www.google.com/images/branding/product/ico/maps15_bnuw3a_32dp.ico","type":"text/x-moz-place","uri":"https://www.google.com/maps/"},{"guid":"guC1gc8JLbx6","title":"Official MapQuest - Maps, Driving Directions, Live Traffic","index":343,"dateAdded":1598467969000000,"lastModified":1718788940000000,"id":703,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.mapquest.com/"},{"guid":"aQVVDeCsw7rT","title":"BatchGeo: Make a map from your data","index":344,"dateAdded":1598470553000000,"lastModified":1718788940000000,"id":704,"typeCode":1,"type":"text/x-moz-place","uri":"https://batchgeo.com/"},{"guid":"YiYRKMHjHlNg","title":"OpenStreetMap Hike & Bike Map","index":345,"dateAdded":1598467817000000,"lastModified":1718788940000000,"id":705,"typeCode":1,"type":"text/x-moz-place","uri":"http://hikebikemap.org/"},{"guid":"dQDSTp6G5B6_","title":"Censys Search","index":346,"dateAdded":1711510615000000,"lastModified":1718788940000000,"id":706,"typeCode":1,"iconUri":"https://search.censys.io/static/img/favicon-2025-32x32.png","type":"text/x-moz-place","uri":"https://search.censys.io/"}]},{"guid":"156W9jsP98kf","title":"Resource Development","index":1,"dateAdded":1698206354000000,"lastModified":1746943965000000,"id":707,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"xf3ZXgUr0ltF","title":"vxunderground/MalwareSourceCode: Collection of malware source code for a variety of platforms in an array of different programming languages.","index":0,"dateAdded":1685909911000000,"lastModified":1718788940000000,"id":708,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/vxunderground/MalwareSourceCode"},{"guid":"aZJRah6AO2Tt","title":"AI Red Teaming Roadmap - roadmap.sh","index":1,"dateAdded":1746566354000000,"lastModified":1746943965000000,"id":709,"typeCode":1,"iconUri":"https://roadmap.sh/manifest/icon32.png","type":"text/x-moz-place","uri":"https://roadmap.sh/ai-red-teaming"},{"guid":"XJ0AQYrcPYpw","title":"Home","index":2,"dateAdded":1715283775000000,"lastModified":1718788940000000,"id":710,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.redteams.fyi/"},{"guid":"ju2lhm44jrE5","title":"LOLESXi","index":3,"dateAdded":1728028866000000,"lastModified":1728050448000000,"id":711,"typeCode":1,"iconUri":"https://lolesxi-project.github.io/LOLESXi/assets/logo.png","type":"text/x-moz-place","uri":"https://lolesxi-project.github.io/LOLESXi/#"},{"guid":"q0qDskSyXKmj","title":"NoRed0x","index":4,"dateAdded":1726603217000000,"lastModified":1726646743000000,"id":712,"typeCode":1,"iconUri":"https://nored0x.github.io/assets/images/site_data/favicon-32x32.png","type":"text/x-moz-place","uri":"https://nored0x.github.io/"},{"guid":"FcBBWkCZiSxU","title":"Attack Flow Builder","index":5,"dateAdded":1714594237000000,"lastModified":1718788940000000,"id":713,"typeCode":1,"type":"text/x-moz-place","uri":"https://center-for-threat-informed-defense.github.io/attack-flow/ui/"},{"guid":"8EMq8UPzlxq8","title":"7etsuo/windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.","index":6,"dateAdded":1723929286000000,"lastModified":1723982625000000,"id":714,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/7etsuo/windows-api-function-cheatsheets"},{"guid":"MHmIsV8GONRF","title":"Windows | Pentesting & Red Teaming Notes","index":7,"dateAdded":1725572462000000,"lastModified":1725624704000000,"id":715,"typeCode":1,"iconUri":"https://notes.morph3.blog/~gitbook/icon?size=small&theme=dark","type":"text/x-moz-place","uri":"https://notes.morph3.blog/"},{"guid":"-oh4-p5UsxPm","title":"RedTeams’s gists · GitHub","index":8,"dateAdded":1670648381000000,"lastModified":1718788940000000,"id":716,"typeCode":1,"type":"text/x-moz-place","uri":"https://gist.github.com/RedTeams"},{"guid":"-Fq2BIROuUwS","title":"EgeBalci/EGESPLOIT: EGESPLOIT is a golang library for malware development","index":9,"dateAdded":1685910151000000,"lastModified":1718788940000000,"id":717,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/EgeBalci/EGESPLOIT"},{"guid":"nMdAyhflKTTJ","title":"dmdhrumilmistry/pyhtools: A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.","index":10,"dateAdded":1685910198000000,"lastModified":1718788940000000,"id":718,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/dmdhrumilmistry/pyhtools"},{"guid":"TB1k-MjpOAio","title":"Mahmoud7Osman/CVenom: CVenom is An Ultra Easy-To-Use Cross-Platform Malware Development Framework For Advanced Malware Development","index":11,"dateAdded":1685910298000000,"lastModified":1718788940000000,"id":719,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Mahmoud7Osman/CVenom"},{"guid":"TcAmg34DxZkJ","title":"rootkit-io/awesome-malware-development: Organized list of my malware development resources","index":12,"dateAdded":1685910685000000,"lastModified":1718788940000000,"id":720,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/rootkit-io/awesome-malware-development"},{"guid":"nzPFBoYSJQNQ","title":"Malware Development – Welcome to the Dark Side: Part 1 - Checkmate","index":13,"dateAdded":1685910554000000,"lastModified":1718788940000000,"id":721,"typeCode":1,"type":"text/x-moz-place","uri":"https://niiconsulting.com/checkmate/2018/02/malware-development-welcome-dark-side-part-1/"},{"guid":"URXKqMts7tsk","title":"jas502n/sangfor: 个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup","index":14,"dateAdded":1718739542000000,"lastModified":1718788940000000,"id":722,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/jas502n/sangfor"},{"guid":"j0fPGXcgEn3y","title":"What is ired.team notes? | Red Team Notes","index":15,"dateAdded":1712490703000000,"lastModified":1718788940000000,"id":723,"typeCode":1,"iconUri":"https://386337598-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/spaces%2F-LFEMnER3fywgFHoroYn%2Favatar.png?generation=1536436814766237&alt=media","type":"text/x-moz-place","uri":"https://www.ired.team/"},{"guid":"a354gBRu0sqU","title":"The Art of Malware","index":16,"dateAdded":1685910575000000,"lastModified":1718788940000000,"id":724,"typeCode":1,"type":"text/x-moz-place","uri":"https://danusminimus.github.io/2020/03/04/The-Art-of-Malware.html"},{"guid":"He-QHl2CskzV","title":"(6) TheSphinx - YouTube","index":17,"dateAdded":1686009902000000,"lastModified":1718788940000000,"id":725,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/c/TheSphinx"},{"guid":"54-CkkcmydIW","title":"(6) Cosmodium CyberSecurity - YouTube","index":18,"dateAdded":1686009902000000,"lastModified":1718788940000000,"id":726,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@CosmodiumCS"},{"guid":"q9hTMrX7jgEW","title":"(6) crow - YouTube","index":19,"dateAdded":1686009902000000,"lastModified":1718788940000000,"id":727,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@crr0ww"},{"guid":"xZNLDsiEYQjB","title":"(6) ActiveXSploit - YouTube","index":20,"dateAdded":1686009902000000,"lastModified":1718788940000000,"id":728,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@ActiveXSploit"},{"guid":"8AZaAOYGm-IS","title":"zerosum0x0","index":21,"dateAdded":1685910062000000,"lastModified":1718788940000000,"id":729,"typeCode":1,"type":"text/x-moz-place","uri":"https://zerosum0x0.blogspot.com/"},{"guid":"NNStejPaeawK","title":"Hacking Articles - Raj Chandel's Blog","index":22,"dateAdded":1685896497000000,"lastModified":1718788940000000,"id":730,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hackingarticles.in/"}]},{"guid":"mZyg3jJy-HDQ","title":"Initial Access","index":2,"dateAdded":1698206363000000,"lastModified":1746045227000000,"id":731,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"jWpVZvijJmYg","title":"sevagas/macro_pack: macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.","index":0,"dateAdded":1686002604000000,"lastModified":1718788940000000,"id":732,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/sevagas/macro_pack"},{"guid":"Fxfy_rHWPWnw","title":"Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine | by S2W | S2W BLOG | Medium","index":1,"dateAdded":1737544617000000,"lastModified":1737661066000000,"id":733,"typeCode":1,"iconUri":"https://miro.medium.com/v2/5d8de952517e8160e40ef9841c781cdc14a5db313057fa3c3de41c6f5b494b19","type":"text/x-moz-place","uri":"https://medium.com/s2wblog/unmasking-cve-2024-38178-the-silent-threat-of-windows-scripting-engine-91ad954dbf83"},{"guid":"_q5mLpaMfVZ9","title":"outflanknl/EvilClippy: A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.","index":2,"dateAdded":1686002615000000,"lastModified":1718788940000000,"id":734,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/outflanknl/EvilClippy"},{"guid":"4rPAp75fZWCR","title":"Generate a Random Name - Fake Name Generator","index":3,"dateAdded":1598566785000000,"lastModified":1718788940000000,"id":735,"typeCode":1,"iconUri":"https://www.fakenamegenerator.com/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.fakenamegenerator.com/"},{"guid":"YUUbmLQHVelf","title":"Just Delete Me | A directory of direct links to delete your account from web services.","index":4,"dateAdded":1598566788000000,"lastModified":1718788940000000,"id":736,"typeCode":1,"type":"text/x-moz-place","uri":"https://backgroundchecks.org/justdeleteme/fake-identity-generator/"},{"guid":"YsnG2-wzyvgT","title":"Emkei's Fake Mailer","index":5,"dateAdded":1716136091000000,"lastModified":1718788940000000,"id":737,"typeCode":1,"type":"text/x-moz-place","uri":"https://emkei.cz/"},{"guid":"HRMTYY-K67cr","title":"Deepfakes Web | Make Your Own Deepfake! [Online App]","index":6,"dateAdded":1746042525000000,"lastModified":1746045227000000,"id":738,"typeCode":1,"iconUri":"https://deepfakesweb.com/favicon-32x32.png","type":"text/x-moz-place","uri":"https://deepfakesweb.com/"},{"guid":"iRJrWTHTq1ub","title":"Punycode converter (IDN converter), Punycode to Unicode 🔧🛠🧰","index":7,"dateAdded":1716304135000000,"lastModified":1718788940000000,"id":739,"typeCode":1,"iconUri":"https://www.punycoder.com/_next/static/media/icon32x32.1132c72a.png","type":"text/x-moz-place","uri":"https://www.punycoder.com/"},{"guid":"2MIJATWu11LP","title":"Random User Generator | Home","index":8,"dateAdded":1598566790000000,"lastModified":1718788940000000,"id":740,"typeCode":1,"type":"text/x-moz-place","uri":"https://randomuser.me/"},{"guid":"-i2g6U87kHSb","title":"Temp Mail - Disposable Temporary Email","index":9,"dateAdded":1640359947000000,"lastModified":1718788940000000,"id":741,"typeCode":1,"iconUri":"https://temp-mail.org/images/favicon.ico","type":"text/x-moz-place","uri":"https://temp-mail.org/"},{"guid":"CcrJuz7gvspd","title":"Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit - CVE-2023-21608 - HackSys Inc","index":10,"dateAdded":1680314888000000,"lastModified":1718788940000000,"id":742,"typeCode":1,"type":"text/x-moz-place","uri":"https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608"},{"guid":"tMRwiIm3WcCb","title":"binary-offensive | Mariusz Banach","index":11,"dateAdded":1681634716000000,"lastModified":1718788940000000,"id":743,"typeCode":1,"type":"text/x-moz-place","uri":"https://binary-offensive.com/initial-access-framework"},{"guid":"S3aiibRNIJHa","title":"URL Expander — Unshorten Any Short URL To A Long URL","index":12,"dateAdded":1598481502000000,"lastModified":1718788940000000,"id":744,"typeCode":1,"type":"text/x-moz-place","uri":"https://urlex.org/"}]},{"guid":"5gfgwpAi5RTF","title":"Execution","index":3,"dateAdded":1698206398000000,"lastModified":1728407173000000,"id":745,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"LiRZuGVrB3a4","title":"GTFOBins","index":0,"dateAdded":1685900768000000,"lastModified":1718788940000000,"id":746,"typeCode":1,"iconUri":"https://gtfobins.github.io/assets/logo.png","type":"text/x-moz-place","uri":"https://gtfobins.github.io/"},{"guid":"KT03O0eWJpKp","title":"LOLBAS","index":1,"dateAdded":1685900800000000,"lastModified":1718788940000000,"id":747,"typeCode":1,"iconUri":"https://lolbas-project.github.io/assets/favicon.png","type":"text/x-moz-place","uri":"https://lolbas-project.github.io/#"},{"guid":"7BkHl-G86ldR","title":"googleprojectzero/fuzzilli: A JavaScript Engine Fuzzer","index":2,"dateAdded":1710883142000000,"lastModified":1718788940000000,"id":748,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/googleprojectzero/fuzzilli"},{"guid":"wk87b6-FUn15","title":"explainshell.com - match command-line arguments to their help text","index":3,"dateAdded":1686002273000000,"lastModified":1718788940000000,"id":749,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.explainshell.com/"},{"guid":"8CwCfmLJtDMV","title":"cocomelonc/peekaboo: Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.","index":4,"dateAdded":1685910216000000,"lastModified":1718788940000000,"id":750,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/cocomelonc/peekaboo"},{"guid":"UZmiuPql-HLa","title":"EddieIvan01/memexec: A library for loading and executing PE (Portable Executable) from memory without ever touching the disk","index":5,"dateAdded":1685910275000000,"lastModified":1718788940000000,"id":751,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/EddieIvan01/memexec"},{"guid":"kDg1-qottE8Y","title":"s9rA16Bf4/go-evil: Customizing evil has never been so easy","index":6,"dateAdded":1685911854000000,"lastModified":1718788940000000,"id":752,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/s9rA16Bf4/go-evil"},{"guid":"ELXaYacANp9Z","title":"S3cur3Th1sSh1t/OffensiveVBA: This repo covers some code execution and AV Evasion methods for Macros in Office documents","index":7,"dateAdded":1685921444000000,"lastModified":1718788940000000,"id":753,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/S3cur3Th1sSh1t/OffensiveVBA"},{"guid":"Hym4DIeGzBGT","title":"Malicious Macros for Script Kiddies - TrustedSec","index":8,"dateAdded":1686002570000000,"lastModified":1718788940000000,"id":754,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.trustedsec.com/blog/malicious-macros-for-script-kiddies/"},{"guid":"rpITyAbInSun","title":"CyberSecurityUP/Offensivesecurity-Checklists: Checklists for Testing Security environment","index":9,"dateAdded":1728407157000000,"lastModified":1728407173000000,"id":755,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/CyberSecurityUP/Offensivesecurity-Checklists"},{"guid":"7AYjM9Nt0Itc","title":"Shell is Only the Beginning","index":10,"dateAdded":1685896578000000,"lastModified":1718788940000000,"id":756,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.darkoperator.com/"},{"guid":"wzfJE6qMSAZ6","title":"GitHub - tunz/js-vuln-db: A collection of JavaScript engine CVEs with PoCs","index":11,"dateAdded":1681631597000000,"lastModified":1718788940000000,"id":757,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tunz/js-vuln-db"},{"guid":"qJl4b9v_zvYy","title":"Browser Exploitation | OffensiveCon","index":12,"dateAdded":1691509463000000,"lastModified":1718788940000000,"id":758,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.offensivecon.org/trainings/2022/browser-exploitation.html"},{"guid":"uzdrLB0ezeSS","title":"GitHub - jhalon/CVE-2018-17463: Working Proof of Concept Exploit for CVE-2018-17463","index":13,"dateAdded":1678805581000000,"lastModified":1718788940000000,"id":759,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/jhalon/CVE-2018-17463"},{"guid":"AuFCx_1PMmt0","title":"Browser exploitation - YouTube","index":14,"dateAdded":1704830774000000,"lastModified":1718788940000000,"id":760,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PLiInfmFzqSMoZMzYSsgxnGhETOSLStyyo"},{"guid":"U98fFbBrci_S","title":"browser > pwn","index":15,"dateAdded":1654720348000000,"lastModified":1718788940000000,"id":761,"typeCode":1,"type":"text/x-moz-place","uri":"https://pwn.browser.rip/"}]},{"guid":"WuYbiKoAl0n1","title":"Persistence","index":4,"dateAdded":1698206406000000,"lastModified":1726264200000000,"id":762,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"VsMFcNmrjcmq","title":"tkmru/awesome-linux-rootkits: a summary of linux rootkits published on GitHub","index":0,"dateAdded":1685911713000000,"lastModified":1718788940000000,"id":763,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tkmru/awesome-linux-rootkits"},{"guid":"xMUykWv74w3v","title":"Bootloaders.io","index":1,"dateAdded":1726241832000000,"lastModified":1726264200000000,"id":764,"typeCode":1,"iconUri":"https://www.bootloaders.io/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.bootloaders.io/"},{"guid":"3dfA9ZGGWNaM","title":"README | Pentester's Promiscuous Notebook","index":2,"dateAdded":1715400312000000,"lastModified":1718788940000000,"id":765,"typeCode":1,"type":"text/x-moz-place","uri":"https://ppn.snovvcrash.rocks/"},{"guid":"nZMYfCrF-ygd","title":"TheXcellerator","index":3,"dateAdded":1685907652000000,"lastModified":1718788940000000,"id":766,"typeCode":1,"iconUri":"https://xcellerator.github.io/img/favicon/blue.png","type":"text/x-moz-place","uri":"https://xcellerator.github.io/"},{"guid":"KEru5UoS1Fct","title":"Creating a Rootkit to Learn C - The Human Machine Interface","index":4,"dateAdded":1685910939000000,"lastModified":1718788940000000,"id":767,"typeCode":1,"type":"text/x-moz-place","uri":"https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/#"},{"guid":"MHGPbjimr-rz","title":"(nearly) Complete Linux Loadable Kernel Modules","index":5,"dateAdded":1685911032000000,"lastModified":1718788940000000,"id":768,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.ouah.org/LKM_HACKING.html"},{"guid":"dwgngzO6lagL","title":"(6) Joey Abrams - YouTube","index":6,"dateAdded":1686009902000000,"lastModified":1718788940000000,"id":769,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/channel/UCIjKM-9G9r2Og2E080Wfbvw"}]},{"guid":"IdGhT1w5C2tY","title":"Privilege Escalation","index":5,"dateAdded":1686001262000000,"lastModified":1718788940000000,"id":770,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"Jg6iuDv6lV5d","title":"PEASS-ng/winPEAS at master · carlospolop/PEASS-ng · GitHub","index":0,"dateAdded":1686002769000000,"lastModified":1718788940000000,"id":771,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS"},{"guid":"ZkCRswoiz5GW","title":"itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows","index":1,"dateAdded":1686002778000000,"lastModified":1718788940000000,"id":772,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/itm4n/PrivescCheck"},{"guid":"f61Z-rtZ7fPQ","title":"bitsadmin/wesng: Windows Exploit Suggester - Next Generation","index":2,"dateAdded":1686002788000000,"lastModified":1718788940000000,"id":773,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/bitsadmin/wesng"},{"guid":"CyN7-yRU_bdD","title":"GhostPack/Seatbelt: Seatbelt is a C# project that performs a number of security oriented host-survey \"safety checks\" relevant from both offensive and defensive security perspectives.","index":3,"dateAdded":1686003989000000,"lastModified":1718788940000000,"id":774,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/GhostPack/Seatbelt"},{"guid":"qvtvoLfS6ZTz","title":"PEASS-ng/linPEAS at master · carlospolop/PEASS-ng · GitHub","index":4,"dateAdded":1686001305000000,"lastModified":1718788940000000,"id":775,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS"},{"guid":"C0Ve0C0qGCq4","title":"rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks","index":5,"dateAdded":1686001354000000,"lastModified":1718788940000000,"id":776,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/rebootuser/LinEnum"},{"guid":"aA86bOYyc0dM","title":"The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing tool","index":6,"dateAdded":1686001373000000,"lastModified":1718788940000000,"id":777,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/The-Z-Labs/linux-exploit-suggester"},{"guid":"5TzIY8Poz_4P","title":"diego-treitos/linux-smart-enumeration: Linux enumeration tool for pentesting and CTFs with verbosity levels","index":7,"dateAdded":1686001419000000,"lastModified":1718788940000000,"id":778,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/diego-treitos/linux-smart-enumeration"},{"guid":"qBIjrxWz28_W","title":"linted/linuxprivchecker: linuxprivchecker.py -- a Linux Privilege Escalation Check Script","index":8,"dateAdded":1686001433000000,"lastModified":1718788940000000,"id":779,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/linted/linuxprivchecker"},{"guid":"j09YLXjBxcbO","title":"gentilkiwi/mimikatz: A little tool to play with Windows security","index":9,"dateAdded":1686003305000000,"lastModified":1718788940000000,"id":780,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/gentilkiwi/mimikatz"},{"guid":"b5YAQQX0C6La","title":"skelsec/pypykatz: Mimikatz implementation in pure Python","index":10,"dateAdded":1686003344000000,"lastModified":1718788940000000,"id":781,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/skelsec/pypykatz"},{"guid":"A-ov8YMjnDcS","title":"hfiref0x/UACME: Defeating Windows User Account Control","index":11,"dateAdded":1685921573000000,"lastModified":1718788940000000,"id":782,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/hfiref0x/UACME"},{"guid":"zxPUurqxg3Wf","title":"Andrey Konovalov | Andrey Konovalov","index":12,"dateAdded":1685911492000000,"lastModified":1718788940000000,"id":783,"typeCode":1,"type":"text/x-moz-place","uri":"https://xairy.io/"}]},{"guid":"C3WtBMjqdMFj","title":"Defense Evasion","index":6,"dateAdded":1698206419000000,"lastModified":1731059415000000,"id":784,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"-v6t-EwkgOH4","title":"adamyaxley/Obfuscate: Guaranteed compile-time string literal obfuscation header-only library for C++14","index":0,"dateAdded":1685895952000000,"lastModified":1718788940000000,"id":785,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/adamyaxley/Obfuscate"},{"guid":"dpiAyd_AUdx1","title":"JustasMasiulis/inline_syscall: Inline syscalls made easy for windows on clang","index":1,"dateAdded":1685895986000000,"lastModified":1718788940000000,"id":786,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/JustasMasiulis/inline_syscall"},{"guid":"Bc-lGmMS664A","title":"cinzinga/Evasion-Practice: A variety of AV evasion techniques written in C# for practice.","index":2,"dateAdded":1685900453000000,"lastModified":1718788940000000,"id":787,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/cinzinga/Evasion-Practice"},{"guid":"Bm4yjnF2yUpq","title":"jthuraisamy/SysWhispers: AV/EDR evasion via direct system calls.","index":3,"dateAdded":1685900893000000,"lastModified":1718788940000000,"id":788,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/jthuraisamy/SysWhispers"},{"guid":"wOs62Zx8zSyj","title":"alichtman/malware-techniques: A collection of techniques commonly used in malware to accomplish core tasks.","index":4,"dateAdded":1685910332000000,"lastModified":1718788940000000,"id":789,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/alichtman/malware-techniques"},{"guid":"BqON277MFE1S","title":"govolution/avet: AntiVirus Evasion Tool","index":5,"dateAdded":1686003008000000,"lastModified":1718788940000000,"id":790,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/govolution/avet"},{"guid":"q15M_l33Y-4Q","title":"mkaring/ConfuserEx: An open-source, free protector for .NET applications","index":6,"dateAdded":1686004472000000,"lastModified":1718788940000000,"id":791,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/mkaring/ConfuserEx"},{"guid":"CZqesISrL03C","title":"CheckPointSW/Evasions: Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.","index":7,"dateAdded":1685911725000000,"lastModified":1718788940000000,"id":792,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/CheckPointSW/Evasions"},{"guid":"5HqZernc_M9a","title":"3intermute/linux_syscall_hook: system call hooking on arm64 linux via a variety of methods","index":8,"dateAdded":1685911738000000,"lastModified":1718788940000000,"id":793,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/3intermute/linux_syscall_hook"},{"guid":"ouBlfDZ3k6ci","title":"packing-box/awesome-executable-packing: A curated list of awesome resources related to executable packing","index":9,"dateAdded":1685911768000000,"lastModified":1718788940000000,"id":794,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/packing-box/awesome-executable-packing"},{"guid":"0IbZJWqL6mUH","title":"S3cur3Th1sSh1t/Amsi-Bypass-Powershell: This repo contains some Amsi Bypass methods i found on different Blog Posts.","index":10,"dateAdded":1685921508000000,"lastModified":1718788940000000,"id":795,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell"},{"guid":"INS3s0Sg9Jja","title":"Offensive Security Notes | OffSec Notes","index":11,"dateAdded":1731025518000000,"lastModified":1731059415000000,"id":796,"typeCode":1,"iconUri":"https://4202329566-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRgqxyHYKgpkWPzVQe9zk%2Ficon%2F32rik6cTt41g9DqUVpJI%2F67056331.png?alt=media&token=8b38d377-3024-4620-86d0-dafa2aac73c0","type":"text/x-moz-place","uri":"https://cel1s0.gitbook.io/offsec-notes"},{"guid":"CasrIogIAb6b","title":"GitHub - lem0nSec/ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end.","index":12,"dateAdded":1699921448000000,"lastModified":1718788940000000,"id":797,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/lem0nSec/ShellGhost"},{"guid":"8YoOgp8mXdPi","title":"0xHossam/Killer: Is a tool created to evade AVs and EDRs or security tools.","index":13,"dateAdded":1711987810000000,"lastModified":1718788940000000,"id":798,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/0xHossam/Killer"},{"guid":"LhrrWLa8CtCG","title":"The Wover – Red Teaming, .NET, and random computing topics","index":14,"dateAdded":1685907794000000,"lastModified":1718788940000000,"id":799,"typeCode":1,"type":"text/x-moz-place","uri":"https://thewover.github.io/"},{"guid":"7An_EHgCEUBw","title":"AntiScan.Me | Online Virus Scanner Without Result Distribution","index":15,"dateAdded":1698502065000000,"lastModified":1718788940000000,"id":800,"typeCode":1,"type":"text/x-moz-place","uri":"https://antiscan.me/"},{"guid":"qgyxfbs8urVE","title":"Pyobfuscate - Advanced Python Obfuscator Online","index":16,"dateAdded":1698719171000000,"lastModified":1718788940000000,"id":801,"typeCode":1,"type":"text/x-moz-place","uri":"https://pyobfuscate.com/"},{"guid":"ce6Ck3f2fRHf","title":"The (Anti-)EDR Compendium","index":17,"dateAdded":1725863230000000,"lastModified":1725904117000000,"id":802,"typeCode":1,"type":"text/x-moz-place","uri":"https://blog.deeb.ch/posts/how-edr-works/"},{"guid":"Slb8s1n7UY1T","title":"deeb blog","index":18,"dateAdded":1725862904000000,"lastModified":1725862914000000,"id":803,"typeCode":1,"type":"text/x-moz-place","uri":"https://blog.deeb.ch/"},{"guid":"OyyoOo8kovqC","title":"cocomelonc","index":19,"dateAdded":1685909682000000,"lastModified":1718788940000000,"id":804,"typeCode":1,"type":"text/x-moz-place","uri":"https://cocomelonc.github.io/"},{"guid":"k682OdV0OKfm","title":"C2Matrix - Google Sheets","index":20,"dateAdded":1714909859000000,"lastModified":1718788940000000,"id":805,"typeCode":1,"type":"text/x-moz-place","uri":"https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0"},{"guid":"shb81icb_KT6","title":"Evasion techniques","index":21,"dateAdded":1685910662000000,"lastModified":1718788940000000,"id":806,"typeCode":1,"type":"text/x-moz-place","uri":"https://evasions.checkpoint.com/"},{"guid":"5PMU2tm-tV0J","title":"How to Build Obfuscated Macros for your Next Social Engineering Campaign","index":22,"dateAdded":1686002549000000,"lastModified":1718788940000000,"id":807,"typeCode":1,"type":"text/x-moz-place","uri":"https://blog.focal-point.com/how-to-build-obfuscated-macros-for-your-next-social-engineering-campaign"},{"guid":"UMswHLXBCRR7","title":"Linux.Midrashim: Assembly x64 ELF virus | TMZ Lair - Underground Coding","index":23,"dateAdded":1685910921000000,"lastModified":1718788940000000,"id":808,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.guitmz.com/linux-midrashim-elf-virus/"},{"guid":"Ttkb4n2_llF3","title":"Engineering antivirus evasion – Sec Team Blog","index":24,"dateAdded":1685911124000000,"lastModified":1718788940000000,"id":809,"typeCode":1,"type":"text/x-moz-place","uri":"https://blog.scrt.ch/2020/06/19/engineering-antivirus-evasion/"},{"guid":"tUUumpklCkan","title":"Hidden in PEB Sight: Hiding Windows API Imports With a Custom Loader","index":25,"dateAdded":1685911327000000,"lastModified":1718788940000000,"id":810,"typeCode":1,"type":"text/x-moz-place","uri":"https://blog.christophetd.fr/hiding-windows-api-imports-with-a-customer-loader/"},{"guid":"XPhqyXLpbmB1","title":"A Brief Survey of Code Obfuscation Techniques","index":26,"dateAdded":1685911341000000,"lastModified":1718788940000000,"id":811,"typeCode":1,"type":"text/x-moz-place","uri":"https://chris124567.github.io/2021-06-23-survey-obfuscation/"},{"guid":"QFBhKh6rhvy1","title":"100% evasion - Write a crypter in any language to bypass AV – Sam's Hacking Wonderland","index":27,"dateAdded":1685911514000000,"lastModified":1718788940000000,"id":812,"typeCode":1,"type":"text/x-moz-place","uri":"https://netsec.expert/posts/write-a-crypter-in-any-language/"},{"guid":"eKOGc6WaAc9z","title":"AMSI.fail","index":28,"dateAdded":1685921405000000,"lastModified":1718788940000000,"id":813,"typeCode":1,"type":"text/x-moz-place","uri":"http://amsi.fail/"},{"guid":"5M4ABFlJ0iRf","title":"Home | S3cur3Th1sSh1t","index":29,"dateAdded":1685909706000000,"lastModified":1718788940000000,"id":814,"typeCode":1,"type":"text/x-moz-place","uri":"https://s3cur3th1ssh1t.github.io/"},{"guid":"E6Zv2hoFcmyu","title":"danielbohannon/Invoke-DOSfuscation: Cmd.exe Command Obfuscation Generator & Detection Test Harness","index":30,"dateAdded":1685920825000000,"lastModified":1718788940000000,"id":815,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/danielbohannon/Invoke-DOSfuscation"},{"guid":"x7UetkipcA5N","title":"Oxyry Python Obfuscator - The most reliable python obfuscator in the world","index":31,"dateAdded":1685920866000000,"lastModified":1718788940000000,"id":816,"typeCode":1,"type":"text/x-moz-place","uri":"https://pyob.oxyry.com/"},{"guid":"v58TUAsv3-UD","title":"pyarmor · PyPI","index":32,"dateAdded":1686002952000000,"lastModified":1718788940000000,"id":817,"typeCode":1,"type":"text/x-moz-place","uri":"https://pypi.org/project/pyarmor/"},{"guid":"5e789ayZ8F9J","title":"PyObfx/PyObfx: Python Obfuscator & Packer","index":33,"dateAdded":1686002964000000,"lastModified":1718788940000000,"id":818,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/PyObfx/PyObfx"},{"guid":"JQAqDlV8_QD8","title":"tokyoneon/Chimera: Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.","index":34,"dateAdded":1686002933000000,"lastModified":1718788940000000,"id":819,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tokyoneon/Chimera"},{"guid":"22lcVZNmaJCC","title":"danielbohannon/Invoke-Obfuscation: PowerShell Obfuscator","index":35,"dateAdded":1685920804000000,"lastModified":1718788940000000,"id":820,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/danielbohannon/Invoke-Obfuscation"},{"guid":"gow3GETybcZO","title":"JoelGMSec/Invoke-Stealth: Simple & Powerful PowerShell Script Obfuscator","index":36,"dateAdded":1685921203000000,"lastModified":1718788940000000,"id":821,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/JoelGMSec/Invoke-Stealth"},{"guid":"pjgqv5RbY-Iy","title":"C/C++ Obfuscator - Obfuscate your C/C++ source code for free and online","index":37,"dateAdded":1685921267000000,"lastModified":1718788940000000,"id":822,"typeCode":1,"type":"text/x-moz-place","uri":"https://picheta.me/obfuscator"},{"guid":"__FF7-N7kt74","title":"yck1509/ConfuserEx: An open-source, free protector for .NET applications","index":38,"dateAdded":1686002974000000,"lastModified":1718788940000000,"id":823,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/yck1509/ConfuserEx"},{"guid":"jtZEarVPJK4y","title":"undetectable backdooring PE file","index":39,"dateAdded":1679863621000000,"lastModified":1718788940000000,"id":824,"typeCode":1,"type":"text/x-moz-place","uri":"https://haiderm.com/undetectable-backdooring-pe-file/"},{"guid":"KRiRJZp0yJPA","title":"GitHub - itaymigdal/awesome-injection: Centralized resource for listing and organizing known injection techniques and POCs","index":40,"dateAdded":1695910357000000,"lastModified":1718788940000000,"id":825,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/itaymigdal/awesome-injection"}]},{"guid":"bVzUbINksj_U","title":"Credential Access","index":7,"dateAdded":1698206425000000,"lastModified":1718788940000000,"id":826,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"vLbBtSPEUy6a","title":"huntergregal/mimipenguin: A tool to dump the login password from the current linux user","index":0,"dateAdded":1686003326000000,"lastModified":1718788940000000,"id":827,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/huntergregal/mimipenguin"}]},{"guid":"BmVpo0bNiHvz","title":"Discovery","index":8,"dateAdded":1698206430000000,"lastModified":1743647199000000,"id":828,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"5heiCqn5vmrT","title":"Home - Unprotect Project","index":0,"dateAdded":1698776714000000,"lastModified":1718788940000000,"id":829,"typeCode":1,"iconUri":"https://unprotect.it/static/img/favicon.ico","type":"text/x-moz-place","uri":"https://unprotect.it/"},{"guid":"J-zy2XAgp3W7","title":"Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.","index":1,"dateAdded":1743477932000000,"lastModified":1743647199000000,"id":830,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet"}]},{"guid":"G1X7XFBpTWzj","title":"Lateral Movement","index":9,"dateAdded":1698206435000000,"lastModified":1718788940000000,"id":831,"typeCode":2,"type":"text/x-moz-place-container"},{"guid":"k3zQtoWi_xxh","title":"Collection","index":10,"dateAdded":1698206441000000,"lastModified":1745688823000000,"id":832,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"vIqYjrOCVJOT","title":"HackTricks - HackTricks","index":0,"dateAdded":1685907402000000,"lastModified":1718788940000000,"id":833,"typeCode":1,"type":"text/x-moz-place","uri":"https://book.hacktricks.xyz/welcome/readme"},{"guid":"jfjjW8D0YEFD","title":"blackc03r/OSCP-Cheatsheets: OSCP Cheatsheets","index":1,"dateAdded":1685921495000000,"lastModified":1718788940000000,"id":834,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/blackc03r/OSCP-Cheatsheets/tree/master"},{"guid":"D_sncvw00ycg","title":"Red Teaming Toolkit Collection -","index":2,"dateAdded":1685918332000000,"lastModified":1718788940000000,"id":835,"typeCode":1,"type":"text/x-moz-place","uri":"https://0xsp.com/offensive/red-teaming-toolkit-collection/"},{"guid":"JWmkFdtWzCgT","title":"cobbr/SharpSploit: SharpSploit is a .NET post-exploitation library written in C#","index":3,"dateAdded":1685910164000000,"lastModified":1718788940000000,"id":836,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/cobbr/SharpSploit"},{"guid":"6HbY0kaVr9QN","title":"MrTuxx/OffensiveGolang: A collection of offensive Go packages inspired by different Go repositories.","index":4,"dateAdded":1685910267000000,"lastModified":1718788940000000,"id":837,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/MrTuxx/OffensiveGolang"},{"guid":"SBfoPgvgMDVu","title":"0xPat blog – Red/purple teamer","index":5,"dateAdded":1685907686000000,"lastModified":1718788940000000,"id":838,"typeCode":1,"type":"text/x-moz-place","uri":"https://0xpat.github.io/"},{"guid":"sHPAkJknZG8h","title":"Capt. Meelo","index":6,"dateAdded":1685911286000000,"lastModified":1718788940000000,"id":839,"typeCode":1,"type":"text/x-moz-place","uri":"https://captmeelo.com/"},{"guid":"0WR36uF-OXSu","title":"XIT – Medium","index":7,"dateAdded":1685912185000000,"lastModified":1718788940000000,"id":840,"typeCode":1,"type":"text/x-moz-place","uri":"https://x-it.medium.com/"},{"guid":"DUd9BTl9iP-D","title":"NCC Group Research Blog | Making the world safer and more secure","index":8,"dateAdded":1685911171000000,"lastModified":1718788940000000,"id":841,"typeCode":1,"type":"text/x-moz-place","uri":"https://research.nccgroup.com/"},{"guid":"eUTnrB_gXTJL","title":"(6) Black Hat - YouTube","index":9,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":842,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/9e7b5b42/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/@BlackHatOfficialYT"},{"guid":"v5RAprr2j_e5","title":"(6) DEFCONConference - YouTube","index":10,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":843,"typeCode":1,"iconUri":"https://www.youtube.com/s/desktop/12ffe8f8/img/logos/favicon_32x32.png","type":"text/x-moz-place","uri":"https://www.youtube.com/@DEFCONConference"},{"guid":"vgs0BKt-eNXD","title":"(6) John Hammond - YouTube","index":11,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":844,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@_JohnHammond"},{"guid":"28PmMeaGV1Bj","title":"(6) HackerSploit - YouTube","index":12,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":845,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@HackerSploit"},{"guid":"YSVzexaY9Z8f","title":"(6) Hak5 - YouTube","index":13,"dateAdded":1686009860000000,"lastModified":1718788940000000,"id":846,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/@hak5"},{"guid":"4dRC2SxCif8q","title":"GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques","index":14,"dateAdded":1739671268000000,"lastModified":1739741269000000,"id":847,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/mantvydasb/RedTeaming-Tactics-and-Techniques"},{"guid":"pZk501i2BLQm","title":"Hack The Box: Hacking Training For The Best | Individuals & Companies","index":15,"dateAdded":1686014411000000,"lastModified":1718788940000000,"id":848,"typeCode":1,"iconUri":"https://www.hackthebox.com/images/landingv3/favicon.png","type":"text/x-moz-place","uri":"https://www.hackthebox.com/"},{"guid":"yTOd-l3we9Qf","title":"ARM - AttackRuleMap","index":16,"dateAdded":1737629651000000,"lastModified":1737660670000000,"id":849,"typeCode":1,"iconUri":"https://attackrulemap.netlify.app/assets/images/favicon/apple-touch-icon.png","type":"text/x-moz-place","uri":"https://attackrulemap.netlify.app/"},{"guid":"LqjRxmqQlqeZ","title":"TryHackMe | Cyber Security Training","index":17,"dateAdded":1686014398000000,"lastModified":1718788940000000,"id":850,"typeCode":1,"iconUri":"https://tryhackme.com/favicon.svg","type":"text/x-moz-place","uri":"https://tryhackme.com/"},{"guid":"MrURh8DD8tFR","title":"Vulnerable By Design ~ VulnHub","index":18,"dateAdded":1686014422000000,"lastModified":1718788940000000,"id":851,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.vulnhub.com/"},{"guid":"-BF37la9yCX7","title":"OverTheWire: Wargames","index":19,"dateAdded":1686014458000000,"lastModified":1718788940000000,"id":852,"typeCode":1,"type":"text/x-moz-place","uri":"https://overthewire.org/wargames/"},{"guid":"tcch2Aai4xTN","title":"Command Challenge!","index":20,"dateAdded":1686014477000000,"lastModified":1718788940000000,"id":853,"typeCode":1,"type":"text/x-moz-place","uri":"https://cmdchallenge.com/"},{"guid":"gSt0bUO5_KFX","title":"https://amanhardikar.com/mindmaps/Practice.html","index":21,"dateAdded":1686053059000000,"lastModified":1718788940000000,"id":854,"typeCode":1,"type":"text/x-moz-place","uri":"https://amanhardikar.com/mindmaps/Practice.html"},{"guid":"yZTJV_EOM9eS","title":"Hide01 – Free Learning","index":22,"dateAdded":1691616565000000,"lastModified":1718788940000000,"id":855,"typeCode":1,"iconUri":"https://hide01.ir/storage/2023/08/favicon.png","type":"text/x-moz-place","uri":"https://hide01.ir/"},{"guid":"9swD6y84-ZQY","title":"Security Research | security-research","index":23,"dateAdded":1689762760000000,"lastModified":1718788940000000,"id":856,"typeCode":1,"type":"text/x-moz-place","uri":"https://google.github.io/security-research/"},{"guid":"E_VahkXnuA8n","title":"Learn Contemporary C++ | Concise&Visual Examples | hacking C++","index":24,"dateAdded":1685993396000000,"lastModified":1718788940000000,"id":857,"typeCode":1,"type":"text/x-moz-place","uri":"https://hackingcpp.com/"},{"guid":"0FMp94ibpx_u","title":"GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team / Penetration Testing","index":25,"dateAdded":1680629590000000,"lastModified":1718788940000000,"id":858,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/A-poc/RedTeam-Tools"},{"guid":"V2Ba-yZ3KPI8","title":"GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.","index":26,"dateAdded":1671481166000000,"lastModified":1718788940000000,"id":859,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/infosecn1nja/Red-Teaming-Toolkit"},{"guid":"bSP7h54ZPa9G","title":"Advanced Persistent Threats and Nation-State Actors | Cybersecurity and Infrastructure Security Agency CISA","index":27,"dateAdded":1702913899000000,"lastModified":1718788940000000,"id":860,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats-and-nation-state-actors"},{"guid":"zcqaJAXMJv0G","title":"MITRE ATT&CK®","index":28,"dateAdded":1598561708000000,"lastModified":1718788940000000,"id":861,"typeCode":1,"iconUri":"https://attack.mitre.org/theme/favicon.ico","type":"text/x-moz-place","uri":"https://attack.mitre.org/"},{"guid":"thXAQbUdWYbv","title":"MITRE | ATLAS™","index":29,"dateAdded":1708129578000000,"lastModified":1718788940000000,"id":862,"typeCode":1,"iconUri":"https://atlas.mitre.org/atlas.ico","type":"text/x-moz-place","uri":"https://atlas.mitre.org/"},{"guid":"bb6Ei4MGKwIt","title":"PEN-300 - OSEP - Hide01.ir","index":30,"dateAdded":1668121387000000,"lastModified":1718788940000000,"id":863,"typeCode":1,"type":"text/x-moz-place","uri":"https://pen300.hide01.ir/"},{"guid":"-5lN1jp7LPw1","title":"Telebit™ Cloud","index":31,"dateAdded":1681445423000000,"lastModified":1718788940000000,"id":864,"typeCode":1,"type":"text/x-moz-place","uri":"https://telebit.cloud/"},{"guid":"J1tuOHjk3QaJ","title":"PowerShell Gallery | Home","index":32,"dateAdded":1624914547000000,"lastModified":1718788940000000,"id":865,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.powershellgallery.com/"},{"guid":"1zLm6kUVt0Nn","title":"GitHub - mandiant/commando-vm: Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com","index":33,"dateAdded":1672410282000000,"lastModified":1718788940000000,"id":866,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/mandiant/commando-vm"},{"guid":"vRObuulicIbp","title":"GitHub - 0xMrNiko/Awesome-Red-Teaming: List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.","index":34,"dateAdded":1661715310000000,"lastModified":1718788940000000,"id":867,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/0xMrNiko/Awesome-Red-Teaming"}]},{"guid":"Tzt1dpsjx6vs","title":"Command and Control","index":11,"dateAdded":1698206446000000,"lastModified":1737631037000000,"id":868,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"zh8_J8O5k7xG","title":"The C2 Matrix - C2 Matrix","index":0,"dateAdded":1707750059000000,"lastModified":1718788940000000,"id":869,"typeCode":1,"type":"text/x-moz-place","uri":"https://howto.thec2matrix.com/"},{"guid":"UbZVualLh4B9","title":"https://sliver.sh/","index":1,"dateAdded":1737631028000000,"lastModified":1737631037000000,"id":870,"typeCode":1,"type":"text/x-moz-place","uri":"https://sliver.sh/"},{"guid":"pboB64EW8uHM","title":"not-sekiun/PyIris: PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.","index":2,"dateAdded":1685910178000000,"lastModified":1718788940000000,"id":871,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/not-sekiun/PyIris"},{"guid":"JHL5ix1-Rero","title":"safesploit/PythonRAT: Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3","index":3,"dateAdded":1685910249000000,"lastModified":1718788940000000,"id":872,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/safesploit/PythonRAT"},{"guid":"N6szppUNKrZN","title":"ElliotAlderson51/Fsociety-RAT: Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)","index":4,"dateAdded":1685911845000000,"lastModified":1718788940000000,"id":873,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/ElliotAlderson51/Fsociety-RAT"},{"guid":"kA3vTptfxqzD","title":"Brute Ratel C4 | Badger doesn’t care. It takes what it wants!","index":5,"dateAdded":1695821969000000,"lastModified":1718788940000000,"id":874,"typeCode":1,"type":"text/x-moz-place","uri":"https://bruteratel.com/"}]},{"guid":"qqrP0YLzHfkb","title":"Exfiltration","index":12,"dateAdded":1698206451000000,"lastModified":1737235132000000,"id":875,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"7sMwR6hdGLyG","title":"Pastebin.com - #1 paste tool since 2002!","index":0,"dateAdded":1685905887000000,"lastModified":1718788940000000,"id":876,"typeCode":1,"type":"text/x-moz-place","uri":"https://pastebin.com/"},{"guid":"VHOySD384msB","title":"Free Dynamic DNS - Managed DNS - Managed Email - Domain Registration - No-IP","index":1,"dateAdded":1737232087000000,"lastModified":1737235132000000,"id":877,"typeCode":1,"iconUri":"https://d2qr50rz2oof04.cloudfront.net/assets/img/2013/favicon.ico","type":"text/x-moz-place","uri":"https://www.noip.com/"},{"guid":"CaMqMks4ile5","title":"Postimages — free image hosting / image upload","index":2,"dateAdded":1716304927000000,"lastModified":1718788940000000,"id":878,"typeCode":1,"type":"text/x-moz-place","uri":"https://postimages.org/"},{"guid":"n6Vaaqly_bmJ","title":"Serveo: expose local servers to the internet using SSH","index":3,"dateAdded":1707323623000000,"lastModified":1718788940000000,"id":879,"typeCode":1,"type":"text/x-moz-place","uri":"https://serveo.net/"},{"guid":"aLYodumqmBzh","title":"4shared.com - free file sharing and storage","index":4,"dateAdded":1685905451000000,"lastModified":1718788940000000,"id":880,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.4shared.com/"},{"guid":"xewqKn7pQxxn","title":"SSL/TLS Tunneling to Bypass Filters & Avoid Detection - Red Team Blog","index":5,"dateAdded":1680921698000000,"lastModified":1718788940000000,"id":881,"typeCode":1,"type":"text/x-moz-place","uri":"https://synzack.github.io/Tunneling-Traffic-With-SSL-and-TLS/"},{"guid":"Bk3M-D6aYx-F","title":"Ufile.io - Upload files for free & share them without registration","index":6,"dateAdded":1659126789000000,"lastModified":1718788940000000,"id":882,"typeCode":1,"iconUri":"https://ufile.io/assets/icons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://ufile.io/"},{"guid":"qsRtXkUhGJMw","title":"IP Logger URL Shortener - Log and Track IP addresses","index":7,"dateAdded":1598496233000000,"lastModified":1718788940000000,"id":883,"typeCode":1,"iconUri":"https://cdn.iplogger.org/favicon.ico","type":"text/x-moz-place","uri":"https://iplogger.org/"},{"guid":"TvPeKP13gH6y","title":"Grabify IP Logger & URL Shortener","index":8,"dateAdded":1598399711000000,"lastModified":1718788940000000,"id":884,"typeCode":1,"type":"text/x-moz-place","uri":"https://grabify.link/"},{"guid":"_3_Xg-R6Idok","title":"Website Hosting and Free Domain - Cybrancee","index":9,"dateAdded":1707263585000000,"lastModified":1718788940000000,"id":885,"typeCode":1,"type":"text/x-moz-place","uri":"https://cybrancee.com/"},{"guid":"TdA-BI8o54it","title":"Free Domain","index":10,"dateAdded":1707265313000000,"lastModified":1718788940000000,"id":886,"typeCode":1,"type":"text/x-moz-place","uri":"https://freedns.afraid.org/signup/?plan=starter"},{"guid":"no3zwhQCaqk0","title":"Canarytokens","index":11,"dateAdded":1643868036000000,"lastModified":1718788940000000,"id":887,"typeCode":1,"type":"text/x-moz-place","uri":"http://canarytokens.com/generate"},{"guid":"SpoohdAAfa81","title":"transfer.sh - Easy and fast file sharing from the command-line.","index":12,"dateAdded":1662631198000000,"lastModified":1718788940000000,"id":888,"typeCode":1,"type":"text/x-moz-place","uri":"https://transfer.sh/"}]},{"guid":"eprXmTa1hRPt","title":"Impact","index":13,"dateAdded":1698206456000000,"lastModified":1718788940000000,"id":889,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"9rl-_m82M9zO","title":"tarcisio-marinho/GonnaCry: A Linux Ransomware","index":0,"dateAdded":1685910134000000,"lastModified":1718788940000000,"id":890,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tarcisio-marinho/GonnaCry"},{"guid":"v28ypJ5XZJod","title":"cdong1012/Rust-Ransomware: Ransomware written in Rust","index":1,"dateAdded":1685910206000000,"lastModified":1718788940000000,"id":891,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/cdong1012/Rust-Ransomware"},{"guid":"uty1BBzAuRSe","title":"MalDev101/Loveware: Community driven computer worm","index":2,"dateAdded":1685910436000000,"lastModified":1718788940000000,"id":892,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/MalDev101/Loveware"}]}]},{"guid":"YRl98prdfyiO","title":"ICS Security","index":4,"dateAdded":1698124162000000,"lastModified":1747142109332000,"id":893,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"2K378GeGbG79","title":"Penetration Testing","index":0,"dateAdded":1698206558000000,"lastModified":1736209631000000,"id":894,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"xbV0OdgNVVju","title":"Blog | hackers-arise","index":0,"dateAdded":1685897433000000,"lastModified":1718788940000000,"id":895,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hackers-arise.com/"},{"guid":"Uajy9m5zT8Ei","title":"امنیت سایبری سیستم های کنترل صنعتی و اسکادا","index":1,"dateAdded":1736121936000000,"lastModified":1736209631000000,"id":896,"typeCode":1,"type":"text/x-moz-place","uri":"https://ahmadian.blog.ir/"},{"guid":"-Z8tS_juglcV","title":"Help Net Security - Cybersecurity News","index":2,"dateAdded":1685896714000000,"lastModified":1718788940000000,"id":897,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.helpnetsecurity.com/"}]},{"guid":"6kQRqoKQJvaM","title":"Red Team","index":1,"dateAdded":1698206565000000,"lastModified":1718788940000000,"id":898,"typeCode":2,"type":"text/x-moz-place-container"},{"guid":"9AaOhQDe-Gd-","title":"Digital Forensic","index":2,"dateAdded":1698206571000000,"lastModified":1718788940000000,"id":899,"typeCode":2,"type":"text/x-moz-place-container"},{"guid":"hjIIPAVpCTC5","title":"Blue Team","index":3,"dateAdded":1698206578000000,"lastModified":1718788940000000,"id":900,"typeCode":2,"type":"text/x-moz-place-container"}]},{"guid":"EyZB8qA9gmMg","title":"Digital Forensic","index":5,"dateAdded":1698124210000000,"lastModified":1747142111405000,"id":901,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"IQB81O63icso","title":"Reverse Engineering","index":0,"dateAdded":1698206592000000,"lastModified":1737812873000000,"id":902,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"UNvFa5KNV8qr","title":"Vitali Kremez | Ethical Hacker | Reverse Engineer","index":0,"dateAdded":1685909996000000,"lastModified":1718788940000000,"id":903,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.vkremez.com/"},{"guid":"i8GlLDP9fn4e","title":"Software Supply Chain Security & Threat Intelligence | ReversingLabs","index":1,"dateAdded":1684619325000000,"lastModified":1718788940000000,"id":904,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.reversinglabs.com/"},{"guid":"ZVj4WkG9MY8r","title":"NTAPI Undocumented Functions","index":2,"dateAdded":1675933098000000,"lastModified":1718788940000000,"id":905,"typeCode":1,"type":"text/x-moz-place","uri":"http://undocumented.ntinternals.net/"},{"guid":"ozskuZ3tl1RT","title":"Anti-Debug Tricks","index":3,"dateAdded":1680902386000000,"lastModified":1718788940000000,"id":906,"typeCode":1,"type":"text/x-moz-place","uri":"https://anti-debug.checkpoint.com/"},{"guid":"bih-JMIK7jA3","title":"Java decompiler online / APK decompiler - Decompiler.com","index":4,"dateAdded":1678603274000000,"lastModified":1718788940000000,"id":907,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.decompiler.com/"},{"guid":"1iY_cBwS7PvD","title":"Rayanfam Blog","index":5,"dateAdded":1737630885000000,"lastModified":1737660653000000,"id":908,"typeCode":1,"iconUri":"https://rayanfam.com/assets/img/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://rayanfam.com/"},{"guid":"UNRg4jk_RUFX","title":"Koodous","index":6,"dateAdded":1598561121000000,"lastModified":1718788940000000,"id":909,"typeCode":1,"iconUri":"https://koodous.com/assets/images/icon-32x32.png","type":"text/x-moz-place","uri":"https://koodous.com/"},{"guid":"nayYhzP0M4P5","title":"National Software Reference Library - MD5/SHA1/File Name search","index":7,"dateAdded":1598560316000000,"lastModified":1718788940000000,"id":910,"typeCode":1,"type":"text/x-moz-place","uri":"http://nsrl.hashsets.com/national_software_reference_library1_search.php"},{"guid":"n_v-bE6vGh4x","title":"Reverss","index":8,"dateAdded":1598561455000000,"lastModified":1718788940000000,"id":911,"typeCode":1,"type":"text/x-moz-place","uri":"https://sandbox.anlyz.io/dashboard"},{"guid":"GXEyrekEL7Nq","title":"Crackmes","index":9,"dateAdded":1678357864000000,"lastModified":1718788940000000,"id":912,"typeCode":1,"type":"text/x-moz-place","uri":"https://crackmes.one/"},{"guid":"i2KPNnsnOeAt","title":"NirLauncher - Collection of more than 200 portable utilities from NirSoft","index":10,"dateAdded":1696814531000000,"lastModified":1718788940000000,"id":913,"typeCode":1,"type":"text/x-moz-place","uri":"https://launcher.nirsoft.net/"}]},{"guid":"kU1YsZzzuPRD","title":"Malware Analysis","index":1,"dateAdded":1698206597000000,"lastModified":1746707223000000,"id":914,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"URYEtvP-KZn4","title":"File Signatures","index":0,"dateAdded":1686001919000000,"lastModified":1718788940000000,"id":915,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.garykessler.net/library/file_sigs.html"},{"guid":"jjrjtHe-xdrP","title":"Barcode Reader. Free Online Web Application","index":1,"dateAdded":1598521640000000,"lastModified":1718788940000000,"id":916,"typeCode":1,"type":"text/x-moz-place","uri":"https://online-barcode-reader.inliteresearch.com/"},{"guid":"HHKcG9_UHVoG","title":"FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation","index":2,"dateAdded":1598495170000000,"lastModified":1718788940000000,"id":917,"typeCode":1,"type":"text/x-moz-place","uri":"http://iplists.firehol.org/"},{"guid":"KLCM-nbXj0_y","title":"CyberChef","index":3,"dateAdded":1598515520000000,"lastModified":1718788940000000,"id":918,"typeCode":1,"iconUri":"https://gchq.github.io/CyberChef/assets/aecc661b69309290f600.ico","type":"text/x-moz-place","uri":"https://gchq.github.io/CyberChef/"},{"guid":"HEsa6sR_yQD4","title":"Image Steganography","index":4,"dateAdded":1589884807000000,"lastModified":1718788940000000,"id":919,"typeCode":1,"type":"text/x-moz-place","uri":"https://incoherency.co.uk/image-steganography/"},{"guid":"88ScrPjIvfpo","title":"Memory Forensics جرم یابی حافظه - لیستهای پخش","index":5,"dateAdded":1736764882000000,"lastModified":1736818864000000,"id":920,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.aparat.com/playlist/1569341"},{"guid":"M4NeVYIFJFL_","title":"Online converter - convert video, images, audio and documents for free","index":6,"dateAdded":1746704129000000,"lastModified":1746707223000000,"id":921,"typeCode":1,"iconUri":"https://www.online-convert.com/assets/favicon/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.online-convert.com/"},{"guid":"8vCAFldoN0Qd","title":"Objective-See: Tools","index":7,"dateAdded":1745139694000000,"lastModified":1745499617000000,"id":922,"typeCode":1,"iconUri":"https://objective-see.org/images/favicon.png","type":"text/x-moz-place","uri":"https://objective-see.org/tools.html"},{"guid":"by1DsIrsRYCF","title":"Cheat-Sheets — Malware Archaeology","index":8,"dateAdded":1745433218000000,"lastModified":1745499588000000,"id":923,"typeCode":1,"iconUri":"https://images.squarespace-cdn.com/content/v1/552092d5e4b0661088167e5c/1428205676402-CIPU51Q74V0PI4ASURUM/favicon.ico?format=100w","type":"text/x-moz-place","uri":"https://www.malwarearchaeology.com/cheat-sheets"},{"guid":"bTgYKyDRr7We","title":"Live Proxy/VPN Detection","index":9,"dateAdded":1737666625000000,"lastModified":1737666635000000,"id":924,"typeCode":1,"type":"text/x-moz-place","uri":"https://proxy.incolumitas.com/proxy_detect.html"},{"guid":"PVadTCm6c5PQ","title":"Welcome | Windows Forensic Handbook","index":10,"dateAdded":1731058444000000,"lastModified":1731059399000000,"id":925,"typeCode":1,"iconUri":"https://psmths.gitbook.io/windows-forensics/~gitbook/icon?size=small&theme=dark","type":"text/x-moz-place","uri":"https://psmths.gitbook.io/windows-forensics"},{"guid":"DigM4LIRGjcn","title":"Koodous — Collaborative Platform for Android Malware Analysts","index":11,"dateAdded":1726342617000000,"lastModified":1726342626000000,"id":926,"typeCode":1,"iconUri":"https://koodous.com/assets/images/icon-32x32.png","type":"text/x-moz-place","uri":"https://koodous.com/?tab=koodous"},{"guid":"uVJy_K9JBuKA","title":"EDR Telemetry Tracking for Windows - Google Sheets","index":12,"dateAdded":1714909850000000,"lastModified":1718788940000000,"id":927,"typeCode":1,"type":"text/x-moz-place","uri":"https://docs.google.com/spreadsheets/d/1ZMFrD6F6tvPtf_8McC-kWrNBBec_6Si3NW6AoWf3Kbg/edit#gid=1993314609"},{"guid":"xnzGJmh-uWqq","title":"Online Calculators & Tools - RapidTables.com","index":13,"dateAdded":1601084302000000,"lastModified":1718788940000000,"id":928,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.rapidtables.com/"},{"guid":"PKS1MnY0nt_H","title":"Unicode Text Steganography Encoders/Decoders","index":14,"dateAdded":1601743956000000,"lastModified":1718788940000000,"id":929,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.irongeek.com/i.php?page=security/unicode-steganography-homoglyph-encoder"},{"guid":"0ut5D0INXNWT","title":"TinEye Reverse Image Search","index":15,"dateAdded":1602528640000000,"lastModified":1718788940000000,"id":930,"typeCode":1,"type":"text/x-moz-place","uri":"https://tineye.com/"},{"guid":"Oh_BQA8QkvmP","title":"quipqiup - cryptoquip and cryptogram solver","index":16,"dateAdded":1601897691000000,"lastModified":1718788940000000,"id":931,"typeCode":1,"type":"text/x-moz-place","uri":"https://quipqiup.com/"},{"guid":"FhOID5nPPlB0","title":"The DFIR Report – Real Intrusions by Real Attackers, The Truth Behind the Intrusion","index":17,"dateAdded":1727642125000000,"lastModified":1727647331000000,"id":932,"typeCode":1,"iconUri":"https://thedfirreport.com/wp-content/uploads/2020/04/cropped-dfir-v1-w-32x32.png","type":"text/x-moz-place","uri":"https://thedfirreport.com/"},{"guid":"feBAD64Rn_s5","title":"The Indoctrination | Malcore Malware Bible","index":18,"dateAdded":1729332475000000,"lastModified":1729578117000000,"id":933,"typeCode":1,"type":"text/x-moz-place","uri":"https://bible.malcore.io/"},{"guid":"H-nJaoPu5nTn","title":"rot13.com","index":19,"dateAdded":1601897788000000,"lastModified":1718788940000000,"id":934,"typeCode":1,"type":"text/x-moz-place","uri":"https://rot13.com/"},{"guid":"fk0LF29bYFjw","title":"Online Tools","index":20,"dateAdded":1601897729000000,"lastModified":1718788940000000,"id":935,"typeCode":1,"iconUri":"https://emn178.github.io/online-tools/images/logo.svg","type":"text/x-moz-place","uri":"https://emn178.github.io/online-tools/"},{"guid":"bXl7LOK9KgjM","title":"Cipher Tools","index":21,"dateAdded":1601897990000000,"lastModified":1718788940000000,"id":936,"typeCode":1,"type":"text/x-moz-place","uri":"http://rumkin.com/tools/cipher/"},{"guid":"apNFnNanyVgv","title":"YOMI","index":22,"dateAdded":1705060855000000,"lastModified":1718788940000000,"id":937,"typeCode":1,"type":"text/x-moz-place","uri":"https://yomi.yoroi.company/upload"},{"guid":"wuTZnUu5HU9O","title":"Convert morse code to text - Converters","index":23,"dateAdded":1601898411000000,"lastModified":1718788940000000,"id":938,"typeCode":1,"type":"text/x-moz-place","uri":"http://www.unit-conversion.info/texttools/morse-code/"},{"guid":"wGjEZgv-DunF","title":"Modular conversion, encoding and encryption online — Cryptii","index":24,"dateAdded":1601897734000000,"lastModified":1718788940000000,"id":939,"typeCode":1,"type":"text/x-moz-place","uri":"https://cryptii.com/"},{"guid":"lwN7uBUm9EMC","title":"Let's Encrypt - Free SSL/TLS Certificates","index":25,"dateAdded":1603141981000000,"lastModified":1718788940000000,"id":940,"typeCode":1,"type":"text/x-moz-place","uri":"https://letsencrypt.org/"},{"guid":"Qkgo2wQ7bKfa","title":"Detect DTMF Tones","index":26,"dateAdded":1604014118000000,"lastModified":1718788940000000,"id":941,"typeCode":1,"type":"text/x-moz-place","uri":"http://dialabc.com/sound/detect/index.html"},{"guid":"prRBQUkxZzwR","title":"Steganography Online","index":27,"dateAdded":1604013129000000,"lastModified":1718788940000000,"id":942,"typeCode":1,"type":"text/x-moz-place","uri":"http://stylesuxx.github.io/steganography/"},{"guid":"nUfKzRK12JF7","title":"Aperi'Solve","index":28,"dateAdded":1625788405000000,"lastModified":1718788940000000,"id":943,"typeCode":1,"type":"text/x-moz-place","uri":"https://aperisolve.fr/"},{"guid":"Q59aLLtmIbnF","title":"Steganography Online","index":29,"dateAdded":1625788144000000,"lastModified":1718788940000000,"id":944,"typeCode":1,"type":"text/x-moz-place","uri":"https://stylesuxx.github.io/steganography/"},{"guid":"95NO-dd9xOnm","title":"StegOnline","index":30,"dateAdded":1625788116000000,"lastModified":1718788940000000,"id":945,"typeCode":1,"type":"text/x-moz-place","uri":"https://stegonline.georgeom.net/upload"},{"guid":"warXnQjEJsh9","title":"Hash Cracker","index":31,"dateAdded":1680729087000000,"lastModified":1718788940000000,"id":946,"typeCode":1,"type":"text/x-moz-place","uri":"https://hash-cracker.hdks.org/"},{"guid":"jW_H5qFqwgqf","title":"AST explorer","index":32,"dateAdded":1679506529000000,"lastModified":1718788940000000,"id":947,"typeCode":1,"type":"text/x-moz-place","uri":"https://astexplorer.net/"},{"guid":"j33T55_tUCND","title":"UUID Decoder | UUIDTools.com","index":33,"dateAdded":1675941486000000,"lastModified":1718788940000000,"id":948,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.uuidtools.com/decode"},{"guid":"QuoBqC-yuWf9","title":"LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.","index":34,"dateAdded":1685910638000000,"lastModified":1718788940000000,"id":949,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/LordNoteworthy/al-khaser"},{"guid":"j1brOoKxlOc-","title":"vx-underground","index":35,"dateAdded":1685895401000000,"lastModified":1718788940000000,"id":950,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.vx-underground.org/"},{"guid":"D0XmmHx7dv5P","title":"Sysinternals Utilities - Sysinternals | Microsoft Learn","index":36,"dateAdded":1686004005000000,"lastModified":1718788940000000,"id":951,"typeCode":1,"type":"text/x-moz-place","uri":"https://learn.microsoft.com/en-us/sysinternals/downloads/"},{"guid":"mwQX6662eQCy","title":"URLhaus | Malware URL exchange","index":37,"dateAdded":1686003665000000,"lastModified":1718788940000000,"id":952,"typeCode":1,"type":"text/x-moz-place","uri":"https://urlhaus.abuse.ch/"},{"guid":"xXJdJmrL385r","title":"SSLBL | Detecting malicious SSL connections","index":38,"dateAdded":1686003656000000,"lastModified":1718788940000000,"id":953,"typeCode":1,"type":"text/x-moz-place","uri":"https://sslbl.abuse.ch/"},{"guid":"GYSRrH9Z4uIJ","title":"ANY.RUN - Interactive Online Malware Sandbox","index":39,"dateAdded":1685886356000000,"lastModified":1718788940000000,"id":954,"typeCode":1,"iconUri":"https://any.run/favicon.png","type":"text/x-moz-place","uri":"https://any.run/"},{"guid":"J5b6IGtKoL5Q","title":"Free Automated Malware Analysis Service - powered by Falcon Sandbox","index":40,"dateAdded":1685886387000000,"lastModified":1718788940000000,"id":955,"typeCode":1,"type":"text/x-moz-place","uri":"https://hybrid-analysis.com/"},{"guid":"R1S2g-nOBKNW","title":"VirusTotal - Home","index":41,"dateAdded":1685886485000000,"lastModified":1718788940000000,"id":956,"typeCode":1,"iconUri":"https://www.virustotal.com/gui/images/favicon.svg","type":"text/x-moz-place","uri":"https://www.virustotal.com/gui/home/upload"},{"guid":"E48QGk3cckTV","title":"MalShare","index":42,"dateAdded":1685911561000000,"lastModified":1718788940000000,"id":957,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.malshare.com/"},{"guid":"Yb2tHwQclwKl","title":"MalwareTech","index":43,"dateAdded":1685910077000000,"lastModified":1718788940000000,"id":958,"typeCode":1,"type":"text/x-moz-place","uri":"https://malwaretech.com/"},{"guid":"_JPrGjhJPRrx","title":"albertzsigovits/malware-writeups: Personal research and publication on malware families","index":44,"dateAdded":1685910240000000,"lastModified":1718788940000000,"id":959,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/albertzsigovits/malware-writeups"},{"guid":"ZoBrfkahLCpG","title":"MalwareBazaar | Malware sample exchange","index":45,"dateAdded":1685907818000000,"lastModified":1718788940000000,"id":960,"typeCode":1,"type":"text/x-moz-place","uri":"https://bazaar.abuse.ch/"},{"guid":"zM9DF0FenBFf","title":"ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.","index":46,"dateAdded":1685907714000000,"lastModified":1718788940000000,"id":961,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/ytisf/theZoo"},{"guid":"xi85TivDMYKy","title":"Malpedia (Fraunhofer FKIE)","index":47,"dateAdded":1685907732000000,"lastModified":1718788940000000,"id":962,"typeCode":1,"type":"text/x-moz-place","uri":"https://malpedia.caad.fkie.fraunhofer.de/"},{"guid":"wfBD8a-7qiHN","title":"CyberChef","index":48,"dateAdded":1685900733000000,"lastModified":1718788940000000,"id":963,"typeCode":1,"iconUri":"https://cyberchef.io/assets/aecc661b69309290f600.ico","type":"text/x-moz-place","uri":"https://cyberchef.io/"},{"guid":"UqnEiQmd_QRC","title":"Research | Trellix Stories","index":49,"dateAdded":1685911190000000,"lastModified":1718788940000000,"id":964,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.trellix.com/en-us/about/newsroom/stories/research.html"},{"guid":"Vx_F9lwRjzGz","title":"https://phishfinder.io/","index":50,"dateAdded":1632521531000000,"lastModified":1718788940000000,"id":965,"typeCode":1,"type":"text/x-moz-place","uri":"https://phishfinder.io/"},{"guid":"R4rNOXPTnvf4","title":"Trend Micro Site Safety Center","index":51,"dateAdded":1598481490000000,"lastModified":1718788940000000,"id":966,"typeCode":1,"type":"text/x-moz-place","uri":"https://global.sitesafety.trendmicro.com/"},{"guid":"uDh8MokmN-P_","title":"Free Website Malware Scanner | Scan Your Website Today","index":52,"dateAdded":1598321866000000,"lastModified":1718788940000000,"id":967,"typeCode":1,"type":"text/x-moz-place","uri":"https://webinspector.com/website-malware-scanner/"},{"guid":"UaMoNMDX90OW","title":"URLhaus | Malware URL exchange","index":53,"dateAdded":1681083370000000,"lastModified":1718788940000000,"id":968,"typeCode":1,"type":"text/x-moz-place","uri":"https://urlhaus.abuse.ch/"},{"guid":"LybEe4jydCPg","title":"VirusShare.com","index":54,"dateAdded":1598559851000000,"lastModified":1718788940000000,"id":969,"typeCode":1,"type":"text/x-moz-place","uri":"https://virusshare.com/"},{"guid":"7x08ym7CXY6h","title":"Automated Malware Analysis - Joe Sandbox Cloud Basic","index":55,"dateAdded":1598560514000000,"lastModified":1718788940000000,"id":970,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.joesandbox.com/"},{"guid":"0vorFTHmPu06","title":"Free Automated Malware Analysis Service - powered by Falcon Sandbox","index":56,"dateAdded":1598560573000000,"lastModified":1718788940000000,"id":971,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hybrid-analysis.com/"},{"guid":"8qef3HPAETw7","title":"VirusTotal","index":57,"dateAdded":1598560564000000,"lastModified":1718788940000000,"id":972,"typeCode":1,"iconUri":"https://www.virustotal.com/gui/images/favicon.svg","type":"text/x-moz-place","uri":"https://www.virustotal.com/gui/"},{"guid":"8wzhAHmMvxaT","title":"Interactive Online Malware Analysis Sandbox - ANY.RUN","index":58,"dateAdded":1598560829000000,"lastModified":1718788940000000,"id":973,"typeCode":1,"type":"text/x-moz-place","uri":"https://app.any.run/"},{"guid":"rv-y_zLEIxqj","title":"Cuckoo Sandbox","index":59,"dateAdded":1598560856000000,"lastModified":1718788940000000,"id":974,"typeCode":1,"type":"text/x-moz-place","uri":"https://sandbox.pikker.ee/"},{"guid":"7RQgjSU-FjIK","title":"REMnux: A Linux Toolkit for Malware Analysis - REMnux Documentation","index":60,"dateAdded":1633574600000000,"lastModified":1718788940000000,"id":975,"typeCode":1,"type":"text/x-moz-place","uri":"https://docs.remnux.org/"},{"guid":"HfX8r1MOil4H","title":"CAPE Sandbox","index":61,"dateAdded":1642073262000000,"lastModified":1718788940000000,"id":976,"typeCode":1,"type":"text/x-moz-place","uri":"https://capesandbox.com/analysis/"},{"guid":"w-zhl642PmlX","title":"de4js | JavaScript Deobfuscator and Unpacker","index":62,"dateAdded":1647387067000000,"lastModified":1718788940000000,"id":977,"typeCode":1,"type":"text/x-moz-place","uri":"https://lelinhtinh.github.io/de4js/"},{"guid":"ldp8EnXOcFNf","title":"MalAPI.io","index":63,"dateAdded":1653303829000000,"lastModified":1718788940000000,"id":978,"typeCode":1,"iconUri":"https://malapi.io/css/images/main.png","type":"text/x-moz-place","uri":"https://malapi.io/"},{"guid":"uWeYQjjGSWnT","title":"ANY.RUN - Interactive Online Malware Sandbox","index":64,"dateAdded":1657947602000000,"lastModified":1718788940000000,"id":979,"typeCode":1,"iconUri":"https://any.run/favicon.png","type":"text/x-moz-place","uri":"https://any.run/"},{"guid":"WJCqEwrbsuud","title":"vx-underground","index":65,"dateAdded":1670877579000000,"lastModified":1718788940000000,"id":980,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.vx-underground.org/index.html"},{"guid":"3lMeKr5R0AEc","title":"LOLDrivers","index":66,"dateAdded":1680713204000000,"lastModified":1718788940000000,"id":981,"typeCode":1,"iconUri":"https://www.loldrivers.io/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://www.loldrivers.io/"},{"guid":"OFTbLOX1N-zu","title":"Jotti's malware scan","index":67,"dateAdded":1684929331000000,"lastModified":1718788940000000,"id":982,"typeCode":1,"type":"text/x-moz-place","uri":"https://virusscan.jotti.org/"},{"guid":"1jb9lVbnfhx0","title":"LOFLCAB","index":68,"dateAdded":1694054469000000,"lastModified":1718788940000000,"id":983,"typeCode":1,"type":"text/x-moz-place","uri":"https://lofl-project.github.io/"},{"guid":"GGfKVD-6Zzlx","title":"GitHub - mandiant/flare-vm","index":69,"dateAdded":1672321583000000,"lastModified":1718788940000000,"id":984,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/mandiant/flare-vm"},{"guid":"sgzREj9UmsZz","title":"Hunter Search Engine","index":70,"dateAdded":1692505000000000,"lastModified":1718788940000000,"id":985,"typeCode":1,"iconUri":"https://hunter.how/hunter/favicon.ico","type":"text/x-moz-place","uri":"https://hunter.how/"},{"guid":"LSFzI54EcoRH","title":"malware-traffic-analysis.net","index":71,"dateAdded":1695815232000000,"lastModified":1718788940000000,"id":986,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.malware-traffic-analysis.net/"}]},{"guid":"SpbvrP2k487p","title":"Threat Hunting","index":2,"dateAdded":1698206601000000,"lastModified":1727639075000000,"id":987,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"Gayvmg5qPuPD","title":"rasta-mouse/ThreatCheck: Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.","index":0,"dateAdded":1686003046000000,"lastModified":1718788940000000,"id":988,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/rasta-mouse/ThreatCheck"},{"guid":"4aN_QAhpXwmQ","title":"matterpreter/DefenderCheck: Identifies the bytes that Microsoft Defender flags on.","index":1,"dateAdded":1686003039000000,"lastModified":1718788940000000,"id":989,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/matterpreter/DefenderCheck"},{"guid":"UZxxkn5dqNFV","title":"Nation-State Cyber Actors | Cybersecurity and Infrastructure Security Agency CISA","index":2,"dateAdded":1713108303000000,"lastModified":1718788940000000,"id":990,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors"},{"guid":"QmK-NhUoj9mv","title":"Feodo Tracker","index":3,"dateAdded":1686003645000000,"lastModified":1718788940000000,"id":991,"typeCode":1,"type":"text/x-moz-place","uri":"https://feodotracker.abuse.ch/"},{"guid":"QGn4TzsCDhih","title":"capa Explorer Web","index":4,"dateAdded":1727613928000000,"lastModified":1727639075000000,"id":992,"typeCode":1,"iconUri":"https://mandiant.github.io/capa/explorer/favicon.ico","type":"text/x-moz-place","uri":"https://mandiant.github.io/capa/explorer/#/"},{"guid":"7HgoLTs6yCXj","title":"Enterprise Detection & Response","index":5,"dateAdded":1715283717000000,"lastModified":1718788940000000,"id":993,"typeCode":1,"type":"text/x-moz-place","uri":"http://detect-respond.blogspot.com/"},{"guid":"oKS94URYYBKg","title":"kh4sh3i/Ransomware-Samples: Small collection of Ransomware organized by family.","index":6,"dateAdded":1685910357000000,"lastModified":1718788940000000,"id":994,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/kh4sh3i/Ransomware-Samples"},{"guid":"bMY-VzHHwAM3","title":"Filesec.io","index":7,"dateAdded":1653303899000000,"lastModified":1718788940000000,"id":995,"typeCode":1,"iconUri":"https://filesec.io/css/images/main.png","type":"text/x-moz-place","uri":"https://filesec.io/"},{"guid":"FXHogzVR6YWL","title":"Swagger Editor","index":8,"dateAdded":1657317189000000,"lastModified":1718788940000000,"id":996,"typeCode":1,"iconUri":"https://editor.swagger.io/dist/favicon-32x32.png","type":"text/x-moz-place","uri":"https://editor.swagger.io/"},{"guid":"i1iB9qFIDqb7","title":"LOTS Project - Living Off Trusted Sites","index":9,"dateAdded":1661025374000000,"lastModified":1718788940000000,"id":997,"typeCode":1,"type":"text/x-moz-place","uri":"https://lots-project.com/"},{"guid":"sf3McqZD3rqV","title":"PacketTotal - A free, online PCAP analysis engine","index":10,"dateAdded":1672303005000000,"lastModified":1718788940000000,"id":998,"typeCode":1,"type":"text/x-moz-place","uri":"https://packettotal.com/"},{"guid":"QqI-gq_Uxi5p","title":"ATT&CK® Navigator","index":11,"dateAdded":1604727826000000,"lastModified":1718788940000000,"id":999,"typeCode":1,"type":"text/x-moz-place","uri":"https://mitre-attack.github.io/attack-navigator/"},{"guid":"H-4GdkI6EUJl","title":"Yara Toolkit","index":12,"dateAdded":1704830458000000,"lastModified":1718788940000000,"id":1000,"typeCode":1,"type":"text/x-moz-place","uri":"https://yaratoolkit.securitybreak.io/"},{"guid":"z5n0VHx57_7o","title":"PolySwarm - Crowdsourced threat detection","index":13,"dateAdded":1694159746000000,"lastModified":1718788940000000,"id":1001,"typeCode":1,"type":"text/x-moz-place","uri":"https://polyswarm.io/"},{"guid":"vY48Io9BGoQf","title":"GitHub - blackorbird/APT_REPORT: Interesting apt report collection and some special ioc express","index":14,"dateAdded":1641448101000000,"lastModified":1718788940000000,"id":1002,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/blackorbird/APT_REPORT"},{"guid":"sRU_XhcXsaeF","title":"FullHunt | Expose Your Attack Surface","index":15,"dateAdded":1657953874000000,"lastModified":1718788940000000,"id":1003,"typeCode":1,"type":"text/x-moz-place","uri":"https://fullhunt.io/"},{"guid":"pYQiXgZP-TBq","title":"YARAify | YARA scan engine","index":16,"dateAdded":1683507535000000,"lastModified":1718788940000000,"id":1004,"typeCode":1,"type":"text/x-moz-place","uri":"https://yaraify.abuse.ch/"},{"guid":"ZsEkQfMAy1W5","title":"dnstwist | phishing domain scanner","index":17,"dateAdded":1598327536000000,"lastModified":1718788940000000,"id":1005,"typeCode":1,"type":"text/x-moz-place","uri":"https://dnstwist.it/"}]},{"guid":"JPAekLDAn3OF","title":"Incident Response","index":3,"dateAdded":1698206605000000,"lastModified":1718788940000000,"id":1006,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"gLpdhyvNRfSI","title":"Malicious IPs | By Last Bad Event | Project Honey Pot","index":0,"dateAdded":1598495166000000,"lastModified":1718788940000000,"id":1007,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.projecthoneypot.org/list_of_ips.php"},{"guid":"3kbqU8e4RkC3","title":"Welcome to the Cyber Analytics Repository | MITRE Cyber Analytics Repository","index":1,"dateAdded":1650573619000000,"lastModified":1718788940000000,"id":1008,"typeCode":1,"type":"text/x-moz-place","uri":"https://car.mitre.org/"},{"guid":"DVU2Qm8rHZX8","title":"Home - SOCRadar® Extended Threat Intelligence","index":2,"dateAdded":1657953852000000,"lastModified":1718788940000000,"id":1009,"typeCode":1,"iconUri":"https://socradar.io/wp-content/uploads/2024/03/favicon.png.webp","type":"text/x-moz-place","uri":"https://socradar.io/"},{"guid":"snTe6D3jA26p","title":"RE&CT Framework (EN) - RE&CT","index":3,"dateAdded":1701699680000000,"lastModified":1718788940000000,"id":1010,"typeCode":1,"iconUri":"https://atc-project.github.io/atc-react/img/favicon.ico","type":"text/x-moz-place","uri":"https://atc-project.github.io/atc-react/"},{"guid":"sy03hNWkkQhe","title":"React Navigator","index":4,"dateAdded":1701699907000000,"lastModified":1718788940000000,"id":1011,"typeCode":1,"iconUri":"https://atc-project.github.io/react-navigator/favicon.ico","type":"text/x-moz-place","uri":"https://atc-project.github.io/react-navigator/"},{"guid":"9YBxiqjhOHbw","title":"ONYPHE - Your Internet SIEM","index":5,"dateAdded":1598343691000000,"lastModified":1718788940000000,"id":1012,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.onyphe.io/"},{"guid":"Kw_GaXYlfbWt","title":"cyberdefenders/DetectionLabELK: DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.","index":6,"dateAdded":1655965390000000,"lastModified":1718788940000000,"id":1013,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/cyberdefenders/DetectionLabELK"},{"guid":"e9lBVLoujDuU","title":"Shuffle Automation - An Open Source SOAR solution","index":7,"dateAdded":1695016523000000,"lastModified":1718788940000000,"id":1014,"typeCode":1,"iconUri":"https://shuffler.io/images/favicon.png","type":"text/x-moz-place","uri":"https://shuffler.io/"}]},{"guid":"HkmxgOFZ-GIA","title":"Threat Intelligence","index":4,"dateAdded":1698206609000000,"lastModified":1744896928000000,"id":1015,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"jOioaZeVa00n","title":"Kaspersky Threat Intelligence Portal — Analysis","index":0,"dateAdded":1698318931000000,"lastModified":1718788940000000,"id":1016,"typeCode":1,"type":"text/x-moz-place","uri":"https://opentip.kaspersky.com/"},{"guid":"wksKqHDYcTCr","title":"ThreatFox | Share Indicators Of Compromise (IOCs)","index":1,"dateAdded":1686003696000000,"lastModified":1718788940000000,"id":1017,"typeCode":1,"type":"text/x-moz-place","uri":"https://threatfox.abuse.ch/"},{"guid":"PWDyqsMAK4Af","title":"Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","index":2,"dateAdded":1686003743000000,"lastModified":1718788940000000,"id":1018,"typeCode":1,"type":"text/x-moz-place","uri":"https://talosintelligence.com/"},{"guid":"a_drDYt8McfJ","title":"DShield API","index":3,"dateAdded":1598495160000000,"lastModified":1718788940000000,"id":1019,"typeCode":1,"type":"text/x-moz-place","uri":"https://isc.sans.edu/api/"},{"guid":"4o3-wWzte0kl","title":"VX Vault","index":4,"dateAdded":1598559871000000,"lastModified":1718788940000000,"id":1020,"typeCode":1,"type":"text/x-moz-place","uri":"http://vxvault.net/ViriList.php"},{"guid":"YCampMV0Djqz","title":"Intezer","index":5,"dateAdded":1725721510000000,"lastModified":1725723783000000,"id":1021,"typeCode":1,"iconUri":"https://analyze.intezer.com/favicon.png","type":"text/x-moz-place","uri":"https://analyze.intezer.com/"},{"guid":"3mCPBwvp2v-w","title":"ID Ransomware","index":6,"dateAdded":1598559935000000,"lastModified":1718788940000000,"id":1022,"typeCode":1,"type":"text/x-moz-place","uri":"https://id-ransomware.malwarehunterteam.com/"},{"guid":"N0QRQFzz93ei","title":"LeakBase.io - Powered by XenForo","index":7,"dateAdded":1744829784000000,"lastModified":1744896928000000,"id":1023,"typeCode":1,"iconUri":"https://leakbase.io/data/assets/logo/dreamstime_l_155219940-removebg-preview.png","type":"text/x-moz-place","uri":"https://leakbase.io/"},{"guid":"SfKoEW6rgEBF","title":"sigconverter.io - sigma rule converter","index":8,"dateAdded":1726241864000000,"lastModified":1726264181000000,"id":1024,"typeCode":1,"iconUri":"https://sigconverter.io/static/favicon.ico","type":"text/x-moz-place","uri":"https://sigconverter.io/"},{"guid":"_kO9gsTiii6N","title":"AlienVault - Open Threat Exchange","index":9,"dateAdded":1639227647000000,"lastModified":1718788940000000,"id":1025,"typeCode":1,"type":"text/x-moz-place","uri":"https://otx.alienvault.com/"},{"guid":"7HCYPMcq_9uT","title":"hslatman/awesome-threat-intelligence: A curated list of Awesome Threat Intelligence resources","index":10,"dateAdded":1726379302000000,"lastModified":1726379949000000,"id":1026,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/hslatman/awesome-threat-intelligence"},{"guid":"zPrO9J8edBY7","title":"Big Data Cloud API - Next Generation IP Geolocation Technology","index":11,"dateAdded":1637288873000000,"lastModified":1718788940000000,"id":1027,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.bigdatacloud.com/"},{"guid":"jzhHq1WnD4Br","title":"Malicious Domains Database, Threat Intelligence, Malware Domains | ThreatLog","index":12,"dateAdded":1681268788000000,"lastModified":1718788940000000,"id":1028,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.threatlog.com/"},{"guid":"IboE4Yh7yJ6_","title":"Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","index":13,"dateAdded":1598321984000000,"lastModified":1718788940000000,"id":1029,"typeCode":1,"type":"text/x-moz-place","uri":"https://talosintelligence.com/"},{"guid":"oNzBki4FHUEI","title":"MISP - Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing (formely known as Malware Information Sharing Platform)","index":14,"dateAdded":1598566170000000,"lastModified":1718788940000000,"id":1030,"typeCode":1,"iconUri":"https://www.misp-project.org/img/favicon.ico","type":"text/x-moz-place","uri":"https://www.misp-project.org/"},{"guid":"f-UkomnLRYn1","title":"بانک اطلاعات تهدیدات بدافزاری پادویش","index":15,"dateAdded":1640966409000000,"lastModified":1718788940000000,"id":1031,"typeCode":1,"type":"text/x-moz-place","uri":"https://threats.amnpardaz.com/"},{"guid":"FiW4l80pmHyv","title":"Threat Intelligence - Pulsedive","index":16,"dateAdded":1657953328000000,"lastModified":1718788940000000,"id":1032,"typeCode":1,"type":"text/x-moz-place","uri":"https://pulsedive.com/"},{"guid":"EOV5iVZ6xZm0","title":"Search Engine for Security Intelligence | Vulners","index":17,"dateAdded":1671003343000000,"lastModified":1718788940000000,"id":1033,"typeCode":1,"type":"text/x-moz-place","uri":"https://vulners.com/search"},{"guid":"0TkTaJsbiUzg","title":"Intelligence X","index":18,"dateAdded":1598318408000000,"lastModified":1718788940000000,"id":1034,"typeCode":1,"iconUri":"https://cdn.intelx.io/favicon/favicon-32x32.png","type":"text/x-moz-place","uri":"https://intelx.io/"},{"guid":"mFRckObWazM1","title":"Sigma Rules Search Engine for Threat Detection, Threat Hunting, and CTI","index":19,"dateAdded":1653302030000000,"lastModified":1718788940000000,"id":1035,"typeCode":1,"type":"text/x-moz-place","uri":"https://socprime.com/"},{"guid":"DbjvFe1_amJ_","title":"ZoomEye - Cyberspace Search Engine","index":20,"dateAdded":1598343352000000,"lastModified":1718788940000000,"id":1036,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.zoomeye.org/"},{"guid":"qO_BIOT7GZ-M","title":"ThreatMiner.org | Data Mining for Threat Intelligence","index":21,"dateAdded":1598322136000000,"lastModified":1718788940000000,"id":1037,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.threatminer.org/"},{"guid":"nipXm7gLqRl0","title":"Leakfa: Iranian Leakage Tracking System | لیکفا: سامانه ردیابی نشت اطلاعات ایرانیان","index":22,"dateAdded":1658440999000000,"lastModified":1718788940000000,"id":1038,"typeCode":1,"type":"text/x-moz-place","uri":"https://leakfa.com/"},{"guid":"Ovx8AaY1KLYr","title":"OSSEM","index":23,"dateAdded":1675049974000000,"lastModified":1718788940000000,"id":1039,"typeCode":1,"type":"text/x-moz-place","uri":"https://ossemproject.com/intro.html"},{"guid":"Ip42R8-yC1IF","title":"LeakIX","index":24,"dateAdded":1659066375000000,"lastModified":1718788940000000,"id":1040,"typeCode":1,"type":"text/x-moz-place","uri":"https://leakix.net/"}]}]},{"guid":"4EtRa80kQ02X","title":"Blue Team","index":6,"dateAdded":1698124220000000,"lastModified":1747142113227000,"id":1041,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"_VsEMq0b_MG_","title":"Harden","index":0,"dateAdded":1698206621000000,"lastModified":1738014958000000,"id":1042,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"oQXMT6bd1riJ","title":"Security + DevOps – DevSec Hardening Framework","index":0,"dateAdded":1658193605000000,"lastModified":1718788940000000,"id":1043,"typeCode":1,"type":"text/x-moz-place","uri":"https://dev-sec.io/"},{"guid":"8lQV1by4kchL","title":"Freely available Web-Based Virtual Browser - Browser.lol","index":1,"dateAdded":1723665850000000,"lastModified":1723736881000000,"id":1044,"typeCode":1,"type":"text/x-moz-place","uri":"https://browser.lol/"},{"guid":"lofOKtMd1Kxd","title":"Ansible Galaxy - devsec.hardening","index":2,"dateAdded":1737979739000000,"lastModified":1738014958000000,"id":1045,"typeCode":1,"type":"text/x-moz-place","uri":"https://galaxy.ansible.com/ui/repo/published/devsec/hardening/"},{"guid":"0SJJy-4mKtKb","title":"CIS Downloads","index":3,"dateAdded":1725354621000000,"lastModified":1725369366000000,"id":1046,"typeCode":1,"type":"text/x-moz-place","uri":"https://downloads.cisecurity.org/#/"},{"guid":"23mNJTmq53b8","title":"Tentang Penulis | Anggi's Notes","index":4,"dateAdded":1731058497000000,"lastModified":1731059392000000,"id":1047,"typeCode":1,"iconUri":"https://notes.anggipradana.com/~gitbook/icon?size=small&theme=dark","type":"text/x-moz-place","uri":"https://notes.anggipradana.com/"},{"guid":"zlWrCpgQd44C","title":"Password Generator - create a secure password online","index":5,"dateAdded":1706839705000000,"lastModified":1718788940000000,"id":1048,"typeCode":1,"type":"text/x-moz-place","uri":"https://pwgen.io/en/"}]},{"guid":"g8-pjfSMyVid","title":"Detect","index":1,"dateAdded":1698206625000000,"lastModified":1739049413000000,"id":1049,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"2it1Vi7UP6E9","title":"Introduction :: DetectionLab","index":0,"dateAdded":1697165355000000,"lastModified":1718788940000000,"id":1050,"typeCode":1,"type":"text/x-moz-place","uri":"https://detectionlab.network/"},{"guid":"IUkbDgeqo0JQ","title":"Cilium","index":1,"dateAdded":1737727939000000,"lastModified":1737806489000000,"id":1051,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/cilium"},{"guid":"xZvH55mFHC9i","title":"cisagov/Malcolm: Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.","index":2,"dateAdded":1737764075000000,"lastModified":1737806482000000,"id":1052,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/cisagov/Malcolm"},{"guid":"86eSARQgka-4","title":"Splunk Security Content","index":3,"dateAdded":1726340124000000,"lastModified":1726342551000000,"id":1053,"typeCode":1,"iconUri":"https://research.splunk.com/favicons/favicon-32x32.png","type":"text/x-moz-place","uri":"https://research.splunk.com/"},{"guid":"tBks5blcYLrd","title":"CybDetective's website","index":4,"dateAdded":1708896576000000,"lastModified":1718788940000000,"id":1054,"typeCode":1,"type":"text/x-moz-place","uri":"https://cybdetective.com/"},{"guid":"LggYgjshoFLH","title":"CVE2CAPEC","index":5,"dateAdded":1734215678000000,"lastModified":1734302671000000,"id":1055,"typeCode":1,"type":"text/x-moz-place","uri":"https://galeax.github.io/CVE2CAPEC/"},{"guid":"YgTHn_zTTfHW","title":"Matrix | MITRE Engage™","index":6,"dateAdded":1738975953000000,"lastModified":1739049413000000,"id":1056,"typeCode":1,"iconUri":"https://engage.mitre.org/wp-content/uploads/2022/02/cropped-Engage-Favicon-10-32x32.png","type":"text/x-moz-place","uri":"https://engage.mitre.org/matrix/"},{"guid":"e4ZymSpMZH30","title":"Opnsense Firewall Installation - Virtual Lab Building Series: Ep2 - YouTube","index":7,"dateAdded":1713209453000000,"lastModified":1718788940000000,"id":1057,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/watch?v=JRgVbA_mCDQ&list=PLjjkJroii8DDb0QZpWLo978VXcLp8-xW3"},{"guid":"bN9ZXzLu1SMo","title":"GitHub - A-poc/BlueTeam-Tools: Tools and Techniques for Blue Team / Incident Response","index":8,"dateAdded":1680629590000000,"lastModified":1718788940000000,"id":1058,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/A-poc/BlueTeam-Tools"},{"guid":"5-LJPefdb7X4","title":"Wazuh · The Open Source Security Platform","index":9,"dateAdded":1646773534000000,"lastModified":1718788940000000,"id":1059,"typeCode":1,"iconUri":"https://wazuh.com/wp-content/themes/wazuh-v3/assets/images/favicon.png?v=1735664783069","type":"text/x-moz-place","uri":"https://wazuh.com/"},{"guid":"PV6U470Kv325","title":"D3FEND Matrix | MITRE D3FEND™","index":10,"dateAdded":1633507785000000,"lastModified":1718788940000000,"id":1060,"typeCode":1,"type":"text/x-moz-place","uri":"https://d3fend.mitre.org/"},{"guid":"rfWfwcWOLGum","title":"AbuseIPDB - IP address abuse reports - Making the Internet safer, one IP at a time","index":11,"dateAdded":1726379462000000,"lastModified":1726379941000000,"id":1061,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.abuseipdb.com/"},{"guid":"BqAWhKanu6ox","title":"tsale/EDR-Telemetry: This project aims to compare and evaluate the telemetry of various EDR products.","index":12,"dateAdded":1711507060000000,"lastModified":1718788940000000,"id":1062,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/tsale/EDR-Telemetry"},{"guid":"PVsPuxn8G0rY","title":"samsclass.info: Sam Bowne Class Information","index":13,"dateAdded":1672210386000000,"lastModified":1718788940000000,"id":1063,"typeCode":1,"type":"text/x-moz-place","uri":"https://samsclass.info/"}]},{"guid":"x16YxtldujuS","title":"Isolate","index":2,"dateAdded":1698206630000000,"lastModified":1718788940000000,"id":1064,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"Vi2rBI7qeaib","title":"MITRE Engage™ | An Adversary Engagement Framework from MITRE","index":0,"dateAdded":1715297985000000,"lastModified":1718788940000000,"id":1065,"typeCode":1,"iconUri":"https://engage.mitre.org/wp-content/uploads/2022/02/cropped-Engage-Favicon-10-32x32.png","type":"text/x-moz-place","uri":"https://engage.mitre.org/"}]},{"guid":"s_2e608nrzvR","title":"Deceive","index":3,"dateAdded":1698206634000000,"lastModified":1726379932000000,"id":1066,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"Zlg4tDUYQ6-Y","title":"HoneyDB","index":0,"dateAdded":1726379478000000,"lastModified":1726379932000000,"id":1067,"typeCode":1,"iconUri":"https://honeydb.io/static/img/honeydb.png","type":"text/x-moz-place","uri":"https://honeydb.io/"}]},{"guid":"6_e7e_cgBgGL","title":"Evict","index":4,"dateAdded":1698206638000000,"lastModified":1718788940000000,"id":1068,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"WO5S4X4tZwNr","title":"The Web's Largest Community Tracking Online Fraud & Abuse | Project Honey Pot","index":0,"dateAdded":1716307530000000,"lastModified":1718788940000000,"id":1069,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.projecthoneypot.org/"}]}]},{"guid":"NwRIqMhYVb6B","title":"Security Audit","index":7,"dateAdded":1698124233000000,"lastModified":1747142114959000,"id":1070,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"FvvteQUDSQm6","title":"Preliminary Audit Assessment","index":0,"dateAdded":1698206647000000,"lastModified":1746354665000000,"id":1071,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"15ScNa9QQrYr","title":"Wordfence Vulnerability Database","index":0,"dateAdded":1675039094000000,"lastModified":1718788940000000,"id":1072,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.wordfence.com/threat-intel/vulnerabilities/"},{"guid":"qZwEE9IsvH0U","title":"Topic 1. Exploratory data analysis with Pandas — mlcourse.ai","index":1,"dateAdded":1746353551000000,"lastModified":1746354665000000,"id":1073,"typeCode":1,"iconUri":"https://mlcourse.ai/_static/favicon.ico","type":"text/x-moz-place","uri":"https://mlcourse.ai/book/topic01/topic01_intro.html"},{"guid":"hpelay8m-lNK","title":"استانداردهای امنیت و فناوری اطلاعات – آشنا ایمن","index":2,"dateAdded":1723910174000000,"lastModified":1723910593000000,"id":1074,"typeCode":1,"iconUri":"https://www.ashnasecure.com/wp-content/uploads/2016/02/favicon.png","type":"text/x-moz-place","uri":"https://www.ashnasecure.com/standards/"},{"guid":"FNh3RmGQe7Aj","title":"CompTIA Archives - HideZeroOneHideZeroOne","index":3,"dateAdded":1714834371000000,"lastModified":1718788940000000,"id":1075,"typeCode":1,"type":"text/x-moz-place","uri":"https://hide01.ir/category/courses/comptia/"},{"guid":"U0iCFPjQVaEH","title":"Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers","index":4,"dateAdded":1712530692000000,"lastModified":1718788940000000,"id":1076,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.exploit-db.com/"},{"guid":"JjRUd4sTvp0A","title":"CVEFeed.io: The Ultimate Hub for Vulnerability Insights and Intelligence","index":5,"dateAdded":1718306419000000,"lastModified":1718788940000000,"id":1077,"typeCode":1,"type":"text/x-moz-place","uri":"https://cvefeed.io/"},{"guid":"xEh9RY_U2Uav","title":"Knownsec Seebug Vulnerability Platform - Discovering Vulnerabilities & Providing First Hand Intelligence!","index":6,"dateAdded":1710745203000000,"lastModified":1718788940000000,"id":1078,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.seebug.org/"},{"guid":"S1Nb_9K6SJ3O","title":"Prompt Engineering Guide | Prompt Engineering Guide","index":7,"dateAdded":1711561479000000,"lastModified":1718788940000000,"id":1079,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.promptingguide.ai/"},{"guid":"yDZ2YHz-22f1","title":"Plenary 1: Global Leadership Plenary - YouTube","index":8,"dateAdded":1726839386000000,"lastModified":1727261662000000,"id":1080,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/watch?v=JdR_IyY2WxU&t=1830s"},{"guid":"-UzUlU4ImtGX","title":"SonarQube Data Center License Key Generator","index":9,"dateAdded":1730617835000000,"lastModified":1730631379000000,"id":1081,"typeCode":1,"iconUri":"https://www.blackhatlab.com/SonarQube/images/favicon.png","type":"text/x-moz-place","uri":"https://www.blackhatlab.com/SonarQube/"},{"guid":"F4YRrZJomBpZ","title":"Log in - SonarQube","index":10,"dateAdded":1730618150000000,"lastModified":1730622777000000,"id":1082,"typeCode":1,"type":"text/x-moz-place","uri":"http://127.0.0.1:9000/sessions/new?return_to=%2F"},{"guid":"wyc4oj9ek7VQ","title":"Shell-Storm","index":11,"dateAdded":1676232643000000,"lastModified":1718788940000000,"id":1083,"typeCode":1,"type":"text/x-moz-place","uri":"http://shell-storm.org/"},{"guid":"lF_PykS9r3aB","title":"Vulnerability Database 🛡","index":12,"dateAdded":1658700180000000,"lastModified":1718788940000000,"id":1084,"typeCode":1,"type":"text/x-moz-place","uri":"https://vuldb.com/"},{"guid":"OaF7HDnn-vhE","title":"SecurityFocus","index":13,"dateAdded":1598562653000000,"lastModified":1718788940000000,"id":1085,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.securityfocus.com/"},{"guid":"lOURMSaoVuGG","title":"TrustInSoft Analyzer","index":14,"dateAdded":1604724693000000,"lastModified":1718788940000000,"id":1086,"typeCode":1,"type":"text/x-moz-place","uri":"https://tsnippet.trust-in-soft.com/"},{"guid":"kTR8AvrfUI5D","title":"NVD - Home","index":15,"dateAdded":1598562268000000,"lastModified":1718788940000000,"id":1087,"typeCode":1,"type":"text/x-moz-place","uri":"https://nvd.nist.gov/"},{"guid":"NiSSG7CKFoyF","title":"Packet Storm","index":16,"dateAdded":1598561832000000,"lastModified":1718788940000000,"id":1088,"typeCode":1,"iconUri":"https://packetstormsecurity.com/img/pss.ico","type":"text/x-moz-place","uri":"https://packetstormsecurity.com/"},{"guid":"Zf3JJVs0LZrw","title":"Open Source Security Index","index":17,"dateAdded":1703551795000000,"lastModified":1718788940000000,"id":1089,"typeCode":1,"type":"text/x-moz-place","uri":"https://opensourcesecurityindex.io/"},{"guid":"kPiygEYIuKZh","title":"http://cve.mitre.org/","index":18,"dateAdded":1598561746000000,"lastModified":1718788940000000,"id":1090,"typeCode":1,"type":"text/x-moz-place","uri":"http://cve.mitre.org/"},{"guid":"MsUq9c7Of0KH","title":"A Tech Foundation for Public Good - MITRE Engenuity","index":19,"dateAdded":1677299861000000,"lastModified":1718788940000000,"id":1091,"typeCode":1,"type":"text/x-moz-place","uri":"https://mitre-engenuity.org/"},{"guid":"F6gSJVVodPm8","title":"Microsoft Cybersecurity Reference Architectures (MCRA) - YouTube","index":20,"dateAdded":1702165837000000,"lastModified":1718788940000000,"id":1092,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.youtube.com/playlist?list=PLtVMyW0H7aiOQwZSsn2d-tg2z729ce1BZ"}]},{"guid":"qsRjbIZKCb1f","title":"Planning and Preparation","index":1,"dateAdded":1698206651000000,"lastModified":1736818873000000,"id":1093,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"UtX8JGWYy7lx","title":"اتاق خبر امنپرداز","index":0,"dateAdded":1710086913000000,"lastModified":1718788940000000,"id":1094,"typeCode":1,"type":"text/x-moz-place","uri":"https://news.amnpardaz.com/"},{"guid":"76K6a90ns_9e","title":"Chief Information Security Officer (CISO) Workshop, Module 1: Microsoft Cybersecurity Briefing | Microsoft Learn","index":1,"dateAdded":1736590618000000,"lastModified":1736818873000000,"id":1095,"typeCode":1,"type":"text/x-moz-place","uri":"https://learn.microsoft.com/en-us/security/adoption/ciso-workshop-module-1"},{"guid":"gq5UwtsMfj3T","title":"Navigating NIST's CSF 2.0 Quick Start Guides | NIST","index":2,"dateAdded":1718626312000000,"lastModified":1718788940000000,"id":1096,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.nist.gov/quick-start-guides"},{"guid":"F0eVJ-U8_hd9","title":"Canny: Customer Feedback Management Software and Tools","index":3,"dateAdded":1715271958000000,"lastModified":1718788940000000,"id":1097,"typeCode":1,"type":"text/x-moz-place","uri":"https://canny.io/"}]},{"guid":"Cs4JwxoxOLww","title":"Establishing Audit Objectives","index":2,"dateAdded":1698206655000000,"lastModified":1734302613000000,"id":1098,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"TgeQgA0vy62V","title":"Chief Information Security Officer (CISO) Workshop | Microsoft Learn","index":0,"dateAdded":1714683995000000,"lastModified":1718788940000000,"id":1099,"typeCode":1,"type":"text/x-moz-place","uri":"https://learn.microsoft.com/en-us/security/adoption/ciso-workshop"},{"guid":"zrj_M5eiriJ6","title":"ATT&CK® Evaluations","index":1,"dateAdded":1734302223000000,"lastModified":1734302613000000,"id":1100,"typeCode":1,"iconUri":"https://attackevals.mitre-engenuity.org/static/img/cropped-favicon-32x32.png","type":"text/x-moz-place","uri":"https://attackevals.mitre-engenuity.org/"}]},{"guid":"gyAxH3Krnl-q","title":"Performing the Review","index":3,"dateAdded":1698206659000000,"lastModified":1718788940000000,"id":1101,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"cSclpNq0AepF","title":"GitHub - Hari-prasaanth/Web-App-Pentest-Checklist: A OWASP Based Checklist With 500+ Test Cases","index":0,"dateAdded":1682259305000000,"lastModified":1718788940000000,"id":1102,"typeCode":1,"iconUri":"https://github.githubassets.com/favicons/favicon.svg","type":"text/x-moz-place","uri":"https://github.com/Hari-prasaanth/Web-App-Pentest-Checklist"},{"guid":"1EjVUyalYZeP","title":"API-Security-Checklist/README-fa.md at master · shieldfy/API-Security-Checklist · GitHub","index":1,"dateAdded":1684855550000000,"lastModified":1718788940000000,"id":1103,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/shieldfy/API-Security-Checklist/blob/master/README-fa.md"},{"guid":"9lgjz0oVZOQB","title":"Chat Blackbox: AI Code Generation, Code Chat, Code Search - Blackbox","index":2,"dateAdded":1710793911000000,"lastModified":1718788940000000,"id":1104,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.blackbox.ai/"},{"guid":"WbKbDxd2NKLZ","title":"WEB APPLICATION PENTESTING CHECKLIST","index":3,"dateAdded":1683059350000000,"lastModified":1718788940000000,"id":1105,"typeCode":1,"iconUri":"https://hariprasaanth.notion.site/images/favicon.ico","type":"text/x-moz-place","uri":"https://hariprasaanth.notion.site/hariprasaanth/WEB-APPLICATION-PENTESTING-CHECKLIST-0f02d8074b9d4af7b12b8da2d46ac998"},{"guid":"_4SGqufr6Y_L","title":"HolyBugx/HolyTips: A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.","index":4,"dateAdded":1684431959000000,"lastModified":1718788940000000,"id":1106,"typeCode":1,"type":"text/x-moz-place","uri":"https://github.com/HolyBugx/HolyTips"}]},{"guid":"MIUCOmfXGu8O","title":"Preparing the Audit Report","index":4,"dateAdded":1698206665000000,"lastModified":1718788940000000,"id":1107,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"PVhoPwcpFbLj","title":"Gamma App: Generate AI Presentations, Webpages & Docs","index":0,"dateAdded":1709252376000000,"lastModified":1718788940000000,"id":1108,"typeCode":1,"iconUri":"https://gamma.app/favicons/favicon-192.svg","type":"text/x-moz-place","uri":"https://gamma.app/"}]},{"guid":"YRPN_axA5gxE","title":"Issuing the Review Report","index":5,"dateAdded":1698206668000000,"lastModified":1718788940000000,"id":1109,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"mZxHFUb1-CmL","title":"سایبرلا","index":0,"dateAdded":1694698989000000,"lastModified":1718788940000000,"id":1110,"typeCode":1,"type":"text/x-moz-place","uri":"https://cyber-law.ir/"},{"guid":"y7HFP6YscOdX","title":"باگدشت | پلتفرم باگ بانتی","index":1,"dateAdded":1708975633000000,"lastModified":1718788940000000,"id":1111,"typeCode":1,"iconUri":"https://bugdasht.ir/wp-content/uploads/2020/09/cropped-fav-1.png","type":"text/x-moz-place","uri":"https://bugdasht.ir/"},{"guid":"7aN2nKuEff2Z","title":"Windows security | Microsoft Learn","index":2,"dateAdded":1671587422000000,"lastModified":1718788940000000,"id":1112,"typeCode":1,"type":"text/x-moz-place","uri":"https://learn.microsoft.com/en-us/windows/security/"}]}]}]},{"guid":"unfiled_____","title":"unfiled","index":3,"dateAdded":1745156633936000,"lastModified":1745156634246000,"id":5,"typeCode":2,"type":"text/x-moz-place-container","root":"unfiledBookmarksFolder"},{"guid":"mobile______","title":"mobile","index":4,"dateAdded":1745156633943000,"lastModified":1745156634246000,"id":6,"typeCode":2,"type":"text/x-moz-place-container","root":"mobileFolder"}]}