From bbebdd92ad1028c0e5a90a8c6c2996b32823440f Mon Sep 17 00:00:00 2001 From: MULTidll Date: Mon, 13 Oct 2025 22:39:59 +0530 Subject: [PATCH 1/2] Resolves Image/gif render issue and added gitignore --- .gitignore | 160 +++++++ .idea/.gitignore | 3 - .idea/codeStyles/codeStyleConfig.xml | 5 - .idea/dbnavigator.xml | 436 ------------------ .idea/discord.xml | 7 - .idea/hacking-tutorial.iml | 10 - .../inspectionProfiles/profiles_settings.xml | 6 - .idea/material_theme_project_new.xml | 12 - .idea/misc.xml | 7 - .idea/modules.xml | 8 - .idea/vcs.xml | 6 - .vscode/settings.json | 22 - .../imgs/06f21a161921919.63cd7887d0a70.gif | Bin ...ttack-image-terrabytegroup.com_-scaled.jpg | Bin ...3-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif | Bin ...0-4c709398-a386-4761-84d7-9e10b98fbe6e.gif | Bin ...7-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif | Bin ...6-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif | Bin ...5-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif | Bin ...6-938b257b-266c-45a7-9af7-655341c0f58b.gif | Bin ...5-af37a709-8995-40d6-be59-724526e3c3d7.gif | Bin ...6-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif | Bin ...0-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif | Bin ...8-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif | Bin ...3-c9147cb2-cfee-4955-b591-52cac08f1f60.gif | Bin ...8-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif | Bin ...6-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif | Bin ...8-cf4d7bed-52aa-4740-8c67-1832472051ec.gif | Bin ...3-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif | Bin ...5-e00c1861-e964-4b4f-90ae-2592cad7b272.gif | Bin ...9-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif | Bin ...7-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif | Bin ...2-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif | Bin ...6-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif | Bin ...7-9b3a52af-79d3-418c-8789-579955588e68.gif | Bin ...5-017b0125-1bba-409d-b789-c04362c0adfb.gif | Bin ...9-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif | Bin ...8-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif | Bin ...3-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif | Bin ...7-3feb953e-cc01-482e-b732-311b2907991f.gif | Bin ...2-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif | Bin ...2-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif | Bin ...7-897cd757-ea1f-492d-aaf9-6d1674177e08.gif | Bin ...0-219bcc70-f5dc-466b-9a60-29653d8e8433.gif | Bin ...9-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif | 0 ...6-d48893bd-0757-481c-8d7e-ba3e163feae7.png | 0 ...4-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif | Bin ...8-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif | Bin ...8-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif | Bin ...1-7bb1e704-6026-48f9-8435-2f4d40101348.gif | Bin ...4-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif | Bin ...2-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif | Bin ...8-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif | Bin .../imgs/362d5c55859146c0c7debfca296ad321.gif | Bin ...vie on 27-07-25 at 9.36\342\200\257PM.mov" | Bin .../imgs/Screenshot (10).png | Bin .../imgs/Screenshot (11).png | Bin .../imgs/Screenshot (12).png | Bin .../imgs/Screenshot (13).png | Bin .../imgs/Screenshot (14).png | Bin .../imgs/Screenshot (6).png | Bin .../imgs/Screenshot (7).png | Bin .../imgs/Screenshot (8).png | Bin .../imgs/Screenshot (9).png | Bin ... 2025-07-21 at 11.11.34\342\200\257AM.png" | Bin ...t 2025-07-24 at 4.58.09\342\200\257AM.png" | Bin ...t 2025-07-24 at 6.49.53\342\200\257AM.png" | Bin ...t 2025-08-09 at 3.38.18\342\200\257PM.png" | Bin ...t 2025-08-09 at 3.47.22\342\200\257PM.png" | Bin ...t 2025-08-09 at 3.56.13\342\200\257PM.png" | Bin ...t 2025-08-09 at 5.54.42\342\200\257PM.png" | Bin .../imgs/WEP-encryption-algorithm-37.ppm.png | Bin .../imgs/What-is-MAC-Address.jpeg | Bin .../imgs/What-is-Packet-Sniffing-01.png.webp | Bin ...WhatsApp Image 2025-07-26 at 07.47.53.jpeg | Bin ...WhatsApp Image 2025-07-28 at 19.40.07.jpeg | Bin .../{src/content => public}/imgs/andoroid.gif | Bin .../imgs/async_port_scanner.jpg | Bin .../imgs/b1b55f18288795.562c702fe9883.gif | Bin .../imgs/bettercap_arp_spoofing_script.png | Bin ...rs-build-and-test-software-faster.jpg.webp | Bin .../imgs/https_data_fetcher_bettercap.png | Bin .../imgs/https_data_fetcher_bettercap1.png | Bin .../imgs/https_data_fetcher_bettercap2.png | Bin .../imgs/https_data_fetcher_bettercap3.png | Bin .../content => public}/imgs/ids_probe.png | Bin .../content => public}/imgs/ids_probe1.png | Bin .../content => public}/imgs/ids_probe2.png | Bin .../{src/content => public}/imgs/l1.png | Bin .../{src/content => public}/imgs/l2.png | Bin .../{src/content => public}/imgs/l3.png | Bin .../{src/content => public}/imgs/l4.png | Bin .../{src/content => public}/imgs/ll1.png | Bin .../{src/content => public}/imgs/ll2.png | Bin .../imgs/mac_address_change.jpg | Bin .../{src/content => public}/imgs/main.jpg | Bin .../imgs/mitm_attack_automator.png | Bin .../imgs/port-scanning1.png | Bin .../imgs/port-scanning2.png | Bin .../imgs/port-scanning3.png | Bin .../imgs/port-scanning4.png | Bin .../imgs/portscanner_test.png | Bin .../imgs/portscanner_test2.png | Bin .../imgs/quick scan plus.png | Bin .../imgs/remote_collect_via_ssh.jpg | Bin .../imgs/remote_collect_via_ssh2.jpg | Bin .../imgs/remote_collect_via_ssh3.jpg | Bin .../imgs/service_view_zenmap.png | Bin .../{src/content => public}/imgs/source.gif | Bin .../imgs/vmw-virtualization-defined.jpg | Bin .../imgs/weakencrpyption.png | Bin .../imgs/wep_wifi_hacking.png | Bin .../imgs/wordlist_generator.jpg | Bin .../imgs/wordlist_generator2.jpg | Bin .../imgs/wpa2_dictionary_attack.png | Bin .../Binary-Exploitation.MD | 10 +- .../MD_Content_ethical-hacking/lesson-01.md | 10 +- .../MD_Content_ethical-hacking/lesson-02.md | 6 +- .../MD_Content_ethical-hacking/lesson-03.md | 6 +- .../MD_Content_ethical-hacking/lesson-04.md | 8 +- .../MD_Content_ethical-hacking/lesson-05.md | 16 +- .../MD_Content_ethical-hacking/lesson-06.md | 24 +- .../lesson-cyberchef.md | 4 +- .../MD_Content_ethical-hacking/lesson-fing.md | 10 +- ...lesson-password_attack-and_hashcracking.md | 2 +- .../lesson-passwordcracking.md | 2 +- .../lesson-phising-toolkit.md | 2 +- .../A-guide-to-port-scanning.md | 14 +- .../python-for-eth-hacking/lesson-1.md | 8 +- .../python-scripts/async_port_scanner.md | 2 +- .../bettercap_arp_spoofing_script.md | 2 +- .../https_data_fetcher_bettercap.md | 8 +- .../src/content/python-scripts/ids_probe.md | 6 +- .../python-scripts/mac-address-change.md | 2 +- .../python-scripts/mitm_attack_automator.md | 2 +- .../python-scripts/portscanner_test.md | 4 +- .../python-scripts/remote_collect_via_ssh.md | 6 +- .../python-scripts/wep_wifi_hacking.md | 2 +- .../python-scripts/wordlist_generator.md | 4 +- .../python-scripts/wpa2_dictionary_attack.md | 2 +- 140 files changed, 241 insertions(+), 603 deletions(-) create mode 100644 .gitignore delete mode 100644 .idea/.gitignore delete mode 100644 .idea/codeStyles/codeStyleConfig.xml delete mode 100644 .idea/dbnavigator.xml delete mode 100644 .idea/discord.xml delete mode 100644 .idea/hacking-tutorial.iml delete mode 100644 .idea/inspectionProfiles/profiles_settings.xml delete mode 100644 .idea/material_theme_project_new.xml delete mode 100644 .idea/misc.xml delete mode 100644 .idea/modules.xml delete mode 100644 .idea/vcs.xml delete mode 100644 .vscode/settings.json rename UI/frontend/{src/content => public}/imgs/06f21a161921919.63cd7887d0a70.gif (100%) rename UI/frontend/{src/content => public}/imgs/13062024-man-in-the-middle-attack-image-terrabytegroup.com_-scaled.jpg (100%) rename UI/frontend/{src/content => public}/imgs/212747903-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif (100%) rename UI/frontend/{src/content => public}/imgs/212748830-4c709398-a386-4761-84d7-9e10b98fbe6e.gif (100%) rename UI/frontend/{src/content => public}/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif (100%) rename UI/frontend/{src/content => public}/imgs/212749726-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif (100%) rename UI/frontend/{src/content => public}/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif (100%) rename UI/frontend/{src/content => public}/imgs/212750996-938b257b-266c-45a7-9af7-655341c0f58b.gif (100%) rename UI/frontend/{src/content => public}/imgs/213910845-af37a709-8995-40d6-be59-724526e3c3d7.gif (100%) rename UI/frontend/{src/content => public}/imgs/216649426-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif (100%) rename UI/frontend/{src/content => public}/imgs/216649450-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif (100%) rename UI/frontend/{src/content => public}/imgs/216653728-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655813-c9147cb2-cfee-4955-b591-52cac08f1f60.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655818-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655846-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655848-cf4d7bed-52aa-4740-8c67-1832472051ec.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655853-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655855-e00c1861-e964-4b4f-90ae-2592cad7b272.gif (100%) rename UI/frontend/{src/content => public}/imgs/216655859-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif (100%) rename UI/frontend/{src/content => public}/imgs/216656977-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif (100%) rename UI/frontend/{src/content => public}/imgs/216656982-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif (100%) rename UI/frontend/{src/content => public}/imgs/216656986-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif (100%) rename UI/frontend/{src/content => public}/imgs/216656987-9b3a52af-79d3-418c-8789-579955588e68.gif (100%) rename UI/frontend/{src/content => public}/imgs/216658115-017b0125-1bba-409d-b789-c04362c0adfb.gif (100%) rename UI/frontend/{src/content => public}/imgs/219923809-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif (100%) rename UI/frontend/{src/content => public}/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif (100%) rename UI/frontend/{src/content => public}/imgs/226127923-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif (100%) rename UI/frontend/{src/content => public}/imgs/226127927-3feb953e-cc01-482e-b732-311b2907991f.gif (100%) rename UI/frontend/{src/content => public}/imgs/227779362-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif (100%) rename UI/frontend/{src/content => public}/imgs/238200842-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif (100%) rename UI/frontend/{src/content => public}/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif (100%) rename UI/frontend/{src/content => public}/imgs/238353480-219bcc70-f5dc-466b-9a60-29653d8e8433.gif (100%) rename UI/frontend/{src/content => public}/imgs/238355349-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif (100%) rename UI/frontend/{src/content => public}/imgs/240304586-d48893bd-0757-481c-8d7e-ba3e163feae7.png (100%) rename UI/frontend/{src/content => public}/imgs/240307504-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif (100%) rename UI/frontend/{src/content => public}/imgs/240308118-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif (100%) rename UI/frontend/{src/content => public}/imgs/240815068-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif (100%) rename UI/frontend/{src/content => public}/imgs/241763891-7bb1e704-6026-48f9-8435-2f4d40101348.gif (100%) rename UI/frontend/{src/content => public}/imgs/242390524-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif (100%) rename UI/frontend/{src/content => public}/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif (100%) rename UI/frontend/{src/content => public}/imgs/250967618-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif (100%) rename UI/frontend/{src/content => public}/imgs/362d5c55859146c0c7debfca296ad321.gif (100%) rename "UI/frontend/src/content/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" => "UI/frontend/public/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (10).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (11).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (12).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (13).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (14).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (6).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (7).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (8).png (100%) rename UI/frontend/{src/content => public}/imgs/Screenshot (9).png (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" => "UI/frontend/public/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" => "UI/frontend/public/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" => "UI/frontend/public/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" => "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" => "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" => "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" (100%) rename "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" => "UI/frontend/public/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" (100%) rename UI/frontend/{src/content => public}/imgs/WEP-encryption-algorithm-37.ppm.png (100%) rename UI/frontend/{src/content => public}/imgs/What-is-MAC-Address.jpeg (100%) rename UI/frontend/{src/content => public}/imgs/What-is-Packet-Sniffing-01.png.webp (100%) rename UI/frontend/{src/content => public}/imgs/WhatsApp Image 2025-07-26 at 07.47.53.jpeg (100%) rename UI/frontend/{src/content => public}/imgs/WhatsApp Image 2025-07-28 at 19.40.07.jpeg (100%) rename UI/frontend/{src/content => public}/imgs/andoroid.gif (100%) rename UI/frontend/{src/content => public}/imgs/async_port_scanner.jpg (100%) rename UI/frontend/{src/content => public}/imgs/b1b55f18288795.562c702fe9883.gif (100%) rename UI/frontend/{src/content => public}/imgs/bettercap_arp_spoofing_script.png (100%) rename UI/frontend/{src/content => public}/imgs/booting-up-developer-economy-how-tech-startups-are-helping-coders-build-and-test-software-faster.jpg.webp (100%) rename UI/frontend/{src/content => public}/imgs/https_data_fetcher_bettercap.png (100%) rename UI/frontend/{src/content => public}/imgs/https_data_fetcher_bettercap1.png (100%) rename UI/frontend/{src/content => public}/imgs/https_data_fetcher_bettercap2.png (100%) rename UI/frontend/{src/content => public}/imgs/https_data_fetcher_bettercap3.png (100%) rename UI/frontend/{src/content => public}/imgs/ids_probe.png (100%) rename UI/frontend/{src/content => public}/imgs/ids_probe1.png (100%) rename UI/frontend/{src/content => public}/imgs/ids_probe2.png (100%) rename UI/frontend/{src/content => public}/imgs/l1.png (100%) rename UI/frontend/{src/content => public}/imgs/l2.png (100%) rename UI/frontend/{src/content => public}/imgs/l3.png (100%) rename UI/frontend/{src/content => public}/imgs/l4.png (100%) rename UI/frontend/{src/content => public}/imgs/ll1.png (100%) rename UI/frontend/{src/content => public}/imgs/ll2.png (100%) rename UI/frontend/{src/content => public}/imgs/mac_address_change.jpg (100%) rename UI/frontend/{src/content => public}/imgs/main.jpg (100%) rename UI/frontend/{src/content => public}/imgs/mitm_attack_automator.png (100%) rename UI/frontend/{src/content => public}/imgs/port-scanning1.png (100%) rename UI/frontend/{src/content => public}/imgs/port-scanning2.png (100%) rename UI/frontend/{src/content => public}/imgs/port-scanning3.png (100%) rename UI/frontend/{src/content => public}/imgs/port-scanning4.png (100%) rename UI/frontend/{src/content => public}/imgs/portscanner_test.png (100%) rename UI/frontend/{src/content => public}/imgs/portscanner_test2.png (100%) rename UI/frontend/{src/content => public}/imgs/quick scan plus.png (100%) rename UI/frontend/{src/content => public}/imgs/remote_collect_via_ssh.jpg (100%) rename UI/frontend/{src/content => public}/imgs/remote_collect_via_ssh2.jpg (100%) rename UI/frontend/{src/content => public}/imgs/remote_collect_via_ssh3.jpg (100%) rename UI/frontend/{src/content => public}/imgs/service_view_zenmap.png (100%) rename UI/frontend/{src/content => public}/imgs/source.gif (100%) rename UI/frontend/{src/content => public}/imgs/vmw-virtualization-defined.jpg (100%) rename UI/frontend/{src/content => public}/imgs/weakencrpyption.png (100%) rename UI/frontend/{src/content => public}/imgs/wep_wifi_hacking.png (100%) rename UI/frontend/{src/content => public}/imgs/wordlist_generator.jpg (100%) rename UI/frontend/{src/content => public}/imgs/wordlist_generator2.jpg (100%) rename UI/frontend/{src/content => public}/imgs/wpa2_dictionary_attack.png (100%) diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..79aecc5 --- /dev/null +++ b/.gitignore @@ -0,0 +1,160 @@ +# Byte-compiled / optimized / DLL files +__pycache__/ +*.py[cod] +*$py.class + +# C extensions +*.so +env.example +.env.example +# Distribution / packaging +.Python +build/ +develop-eggs/ +dist/ +downloads/ +eggs/ +.eggs/ +lib/ +lib64/ +parts/ +sdist/ +var/ +wheels/ +pip-wheel-metadata/ +share/python-wheels/ +*.egg-info/ +.installed.cfg +*.egg +MANIFEST + +# PyInstaller +# Usually these files are written by a python script from a template +# before PyInstaller builds the exe, so as to inject date/other infos into it. +*.manifest +*.spec + +# Installer logs +pip-log.txt +pip-delete-this-directory.txt + +# Unit test / coverage reports +htmlcov/ +.tox/ +.nox/ +.coverage +.coverage.* +.cache +nosetests.xml +coverage.xml +*.cover +*.py,cover +.hypothesis/ +.pytest_cache/ + +# Translations +*.mo +*.pot + +# Django stuff: +*.log +local_settings.py +db.sqlite3 +db.sqlite3-journal + +# Flask stuff: +instance/ +.webassets-cache + +# Scrapy stuff: +.scrapy + +# Sphinx documentation +docs/_build/ + +# PyBuilder +target/ + +# Jupyter Notebook +.ipynb_checkpoints + +# IPython +profile_default/ +ipython_config.py + +# pyenv +.python-version + +# pipenv +# According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control. +# However, in case of collaboration, if having platform-specific dependencies or dependencies +# having no cross-platform support, pipenv may install dependencies that don't work, or not +# install all needed dependencies. +#Pipfile.lock + +# PEP 582; used by e.g. github.com/David-OConnor/pyflow +__pypackages__/ + +# Celery stuff +celerybeat-schedule +celerybeat.pid + +# SageMath parsed files +*.sage.py + +# Environments +.env +.venv +env/ +venv/ +ENV/ +env.bak/ +venv.bak/ + +# Spyder project settings +.spyderproject +.spyproject + +# Rope project settings +.ropeproject + +# mkdocs documentation +/site + +# mypy +.mypy_cache/ +.dmypy.json +dmypy.json + +# Pyre type checker +.pyre/ + +# Django specific +staticfiles/ +media/ +*.sqlite3 + +# Environment variables +.env +.env.local +.env.production +.env.staging + +# IDE +.vscode/ +.idea/ +*.swp +*.swo +*~ + +# OS +.DS_Store +Thumbs.db + +# Logs +logs/ +*.log + +# Temporary files +*.tmp +*.temp \ No newline at end of file diff --git a/.idea/.gitignore b/.idea/.gitignore deleted file mode 100644 index 26d3352..0000000 --- a/.idea/.gitignore +++ /dev/null @@ -1,3 +0,0 @@ -# Default ignored files -/shelf/ -/workspace.xml diff --git a/.idea/codeStyles/codeStyleConfig.xml b/.idea/codeStyles/codeStyleConfig.xml deleted file mode 100644 index a55e7a1..0000000 --- a/.idea/codeStyles/codeStyleConfig.xml +++ /dev/null @@ -1,5 +0,0 @@ - - - - \ No newline at end of file diff --git a/.idea/dbnavigator.xml b/.idea/dbnavigator.xml deleted file mode 100644 index eff8b2e..0000000 --- a/.idea/dbnavigator.xml +++ /dev/null @@ -1,436 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/.idea/discord.xml b/.idea/discord.xml deleted file mode 100644 index 30bab2a..0000000 --- a/.idea/discord.xml +++ /dev/null @@ -1,7 +0,0 @@ - - - - - \ No newline at end of file diff --git a/.idea/hacking-tutorial.iml b/.idea/hacking-tutorial.iml deleted file mode 100644 index 19e5856..0000000 --- a/.idea/hacking-tutorial.iml +++ /dev/null @@ -1,10 +0,0 @@ - - - - - - - - - - \ No newline at end of file diff --git a/.idea/inspectionProfiles/profiles_settings.xml b/.idea/inspectionProfiles/profiles_settings.xml deleted file mode 100644 index 105ce2d..0000000 --- a/.idea/inspectionProfiles/profiles_settings.xml +++ /dev/null @@ -1,6 +0,0 @@ - - - - \ No newline at end of file diff --git a/.idea/material_theme_project_new.xml b/.idea/material_theme_project_new.xml deleted file mode 100644 index 40d3ac6..0000000 --- a/.idea/material_theme_project_new.xml +++ /dev/null @@ -1,12 +0,0 @@ - - - - - - \ No newline at end of file diff --git a/.idea/misc.xml b/.idea/misc.xml deleted file mode 100644 index 36b2871..0000000 --- a/.idea/misc.xml +++ /dev/null @@ -1,7 +0,0 @@ - - - - - - \ No newline at end of file diff --git a/.idea/modules.xml b/.idea/modules.xml deleted file mode 100644 index b2fa008..0000000 --- a/.idea/modules.xml +++ /dev/null @@ -1,8 +0,0 @@ - - - - - - - - \ No newline at end of file diff --git a/.idea/vcs.xml b/.idea/vcs.xml deleted file mode 100644 index 94a25f7..0000000 --- a/.idea/vcs.xml +++ /dev/null @@ -1,6 +0,0 @@ - - - - - - \ No newline at end of file diff --git a/.vscode/settings.json b/.vscode/settings.json deleted file mode 100644 index 79eab2c..0000000 --- a/.vscode/settings.json +++ /dev/null @@ -1,22 +0,0 @@ -{ - "workbench.colorCustomizations": { - "activityBar.activeBackground": "#3399ff", - "activityBar.background": "#3399ff", - "activityBar.foreground": "#15202b", - "activityBar.inactiveForeground": "#15202b99", - "activityBarBadge.background": "#bf0060", - "activityBarBadge.foreground": "#e7e7e7", - "commandCenter.border": "#e7e7e799", - "sash.hoverBorder": "#3399ff", - "statusBar.background": "#007fff", - "statusBar.foreground": "#e7e7e7", - "statusBarItem.hoverBackground": "#3399ff", - "statusBarItem.remoteBackground": "#007fff", - "statusBarItem.remoteForeground": "#e7e7e7", - "titleBar.activeBackground": "#007fff", - "titleBar.activeForeground": "#e7e7e7", - "titleBar.inactiveBackground": "#007fff99", - "titleBar.inactiveForeground": "#e7e7e799" - }, - "peacock.color": "#007fff" -} \ No newline at end of file diff --git a/UI/frontend/src/content/imgs/06f21a161921919.63cd7887d0a70.gif b/UI/frontend/public/imgs/06f21a161921919.63cd7887d0a70.gif similarity index 100% rename from UI/frontend/src/content/imgs/06f21a161921919.63cd7887d0a70.gif rename to UI/frontend/public/imgs/06f21a161921919.63cd7887d0a70.gif diff --git a/UI/frontend/src/content/imgs/13062024-man-in-the-middle-attack-image-terrabytegroup.com_-scaled.jpg b/UI/frontend/public/imgs/13062024-man-in-the-middle-attack-image-terrabytegroup.com_-scaled.jpg similarity index 100% rename from UI/frontend/src/content/imgs/13062024-man-in-the-middle-attack-image-terrabytegroup.com_-scaled.jpg rename to UI/frontend/public/imgs/13062024-man-in-the-middle-attack-image-terrabytegroup.com_-scaled.jpg diff --git a/UI/frontend/src/content/imgs/212747903-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif b/UI/frontend/public/imgs/212747903-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif similarity index 100% rename from UI/frontend/src/content/imgs/212747903-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif rename to UI/frontend/public/imgs/212747903-e9bdf048-2dc8-41f9-b973-0e72ff07bfba.gif diff --git a/UI/frontend/src/content/imgs/212748830-4c709398-a386-4761-84d7-9e10b98fbe6e.gif b/UI/frontend/public/imgs/212748830-4c709398-a386-4761-84d7-9e10b98fbe6e.gif similarity index 100% rename from UI/frontend/src/content/imgs/212748830-4c709398-a386-4761-84d7-9e10b98fbe6e.gif rename to UI/frontend/public/imgs/212748830-4c709398-a386-4761-84d7-9e10b98fbe6e.gif diff --git a/UI/frontend/src/content/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif b/UI/frontend/public/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif similarity index 100% rename from UI/frontend/src/content/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif rename to UI/frontend/public/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif diff --git a/UI/frontend/src/content/imgs/212749726-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif b/UI/frontend/public/imgs/212749726-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif similarity index 100% rename from UI/frontend/src/content/imgs/212749726-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif rename to UI/frontend/public/imgs/212749726-d36b8253-74bb-4509-870d-e29ed3b8ff4a.gif diff --git a/UI/frontend/src/content/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif b/UI/frontend/public/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif similarity index 100% rename from UI/frontend/src/content/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif rename to UI/frontend/public/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif diff --git a/UI/frontend/src/content/imgs/212750996-938b257b-266c-45a7-9af7-655341c0f58b.gif b/UI/frontend/public/imgs/212750996-938b257b-266c-45a7-9af7-655341c0f58b.gif similarity index 100% rename from UI/frontend/src/content/imgs/212750996-938b257b-266c-45a7-9af7-655341c0f58b.gif rename to UI/frontend/public/imgs/212750996-938b257b-266c-45a7-9af7-655341c0f58b.gif diff --git a/UI/frontend/src/content/imgs/213910845-af37a709-8995-40d6-be59-724526e3c3d7.gif b/UI/frontend/public/imgs/213910845-af37a709-8995-40d6-be59-724526e3c3d7.gif similarity index 100% rename from UI/frontend/src/content/imgs/213910845-af37a709-8995-40d6-be59-724526e3c3d7.gif rename to UI/frontend/public/imgs/213910845-af37a709-8995-40d6-be59-724526e3c3d7.gif diff --git a/UI/frontend/src/content/imgs/216649426-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif b/UI/frontend/public/imgs/216649426-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif similarity index 100% rename from UI/frontend/src/content/imgs/216649426-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif rename to UI/frontend/public/imgs/216649426-0c2ee152-84d8-4707-85c4-27a378d2f78a.gif diff --git a/UI/frontend/src/content/imgs/216649450-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif b/UI/frontend/public/imgs/216649450-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif similarity index 100% rename from UI/frontend/src/content/imgs/216649450-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif rename to UI/frontend/public/imgs/216649450-e63af5d5-a769-4e9f-8bd1-c2b9005dc53c.gif diff --git a/UI/frontend/src/content/imgs/216653728-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif b/UI/frontend/public/imgs/216653728-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif similarity index 100% rename from UI/frontend/src/content/imgs/216653728-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif rename to UI/frontend/public/imgs/216653728-5f452bd4-f1b8-401e-a337-f6fbae9d493a.gif diff --git a/UI/frontend/src/content/imgs/216655813-c9147cb2-cfee-4955-b591-52cac08f1f60.gif b/UI/frontend/public/imgs/216655813-c9147cb2-cfee-4955-b591-52cac08f1f60.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655813-c9147cb2-cfee-4955-b591-52cac08f1f60.gif rename to UI/frontend/public/imgs/216655813-c9147cb2-cfee-4955-b591-52cac08f1f60.gif diff --git a/UI/frontend/src/content/imgs/216655818-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif b/UI/frontend/public/imgs/216655818-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655818-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif rename to UI/frontend/public/imgs/216655818-2e7b9a31-49bf-4744-85a8-db8a2577c45c.gif diff --git a/UI/frontend/src/content/imgs/216655846-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif b/UI/frontend/public/imgs/216655846-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655846-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif rename to UI/frontend/public/imgs/216655846-93807a43-d6e8-448a-bf19-799b5e8c1c0a.gif diff --git a/UI/frontend/src/content/imgs/216655848-cf4d7bed-52aa-4740-8c67-1832472051ec.gif b/UI/frontend/public/imgs/216655848-cf4d7bed-52aa-4740-8c67-1832472051ec.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655848-cf4d7bed-52aa-4740-8c67-1832472051ec.gif rename to UI/frontend/public/imgs/216655848-cf4d7bed-52aa-4740-8c67-1832472051ec.gif diff --git a/UI/frontend/src/content/imgs/216655853-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif b/UI/frontend/public/imgs/216655853-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655853-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif rename to UI/frontend/public/imgs/216655853-3acb8c9c-42bd-4d0c-aaa6-27b409361578.gif diff --git a/UI/frontend/src/content/imgs/216655855-e00c1861-e964-4b4f-90ae-2592cad7b272.gif b/UI/frontend/public/imgs/216655855-e00c1861-e964-4b4f-90ae-2592cad7b272.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655855-e00c1861-e964-4b4f-90ae-2592cad7b272.gif rename to UI/frontend/public/imgs/216655855-e00c1861-e964-4b4f-90ae-2592cad7b272.gif diff --git a/UI/frontend/src/content/imgs/216655859-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif b/UI/frontend/public/imgs/216655859-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif similarity index 100% rename from UI/frontend/src/content/imgs/216655859-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif rename to UI/frontend/public/imgs/216655859-f66df97b-6767-4ab2-b6f4-a9cba3ff3591.gif diff --git a/UI/frontend/src/content/imgs/216656977-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif b/UI/frontend/public/imgs/216656977-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif similarity index 100% rename from UI/frontend/src/content/imgs/216656977-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif rename to UI/frontend/public/imgs/216656977-ef584e23-480a-4d1c-8c3f-7d045910ddc9.gif diff --git a/UI/frontend/src/content/imgs/216656982-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif b/UI/frontend/public/imgs/216656982-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif similarity index 100% rename from UI/frontend/src/content/imgs/216656982-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif rename to UI/frontend/public/imgs/216656982-82fce1e6-72ff-48aa-bbcd-5270671adeaa.gif diff --git a/UI/frontend/src/content/imgs/216656986-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif b/UI/frontend/public/imgs/216656986-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif similarity index 100% rename from UI/frontend/src/content/imgs/216656986-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif rename to UI/frontend/public/imgs/216656986-e4424d73-56dd-4e0d-96ac-66f9f2c3be42.gif diff --git a/UI/frontend/src/content/imgs/216656987-9b3a52af-79d3-418c-8789-579955588e68.gif b/UI/frontend/public/imgs/216656987-9b3a52af-79d3-418c-8789-579955588e68.gif similarity index 100% rename from UI/frontend/src/content/imgs/216656987-9b3a52af-79d3-418c-8789-579955588e68.gif rename to UI/frontend/public/imgs/216656987-9b3a52af-79d3-418c-8789-579955588e68.gif diff --git a/UI/frontend/src/content/imgs/216658115-017b0125-1bba-409d-b789-c04362c0adfb.gif b/UI/frontend/public/imgs/216658115-017b0125-1bba-409d-b789-c04362c0adfb.gif similarity index 100% rename from UI/frontend/src/content/imgs/216658115-017b0125-1bba-409d-b789-c04362c0adfb.gif rename to UI/frontend/public/imgs/216658115-017b0125-1bba-409d-b789-c04362c0adfb.gif diff --git a/UI/frontend/src/content/imgs/219923809-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif b/UI/frontend/public/imgs/219923809-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif similarity index 100% rename from UI/frontend/src/content/imgs/219923809-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif rename to UI/frontend/public/imgs/219923809-b86dc415-a0c2-4a38-bc88-ad6cf06395a8.gif diff --git a/UI/frontend/src/content/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif b/UI/frontend/public/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif similarity index 100% rename from UI/frontend/src/content/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif rename to UI/frontend/public/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif diff --git a/UI/frontend/src/content/imgs/226127923-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif b/UI/frontend/public/imgs/226127923-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif similarity index 100% rename from UI/frontend/src/content/imgs/226127923-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif rename to UI/frontend/public/imgs/226127923-0e8b7792-7b3c-462b-951b-63c96ba1a5af.gif diff --git a/UI/frontend/src/content/imgs/226127927-3feb953e-cc01-482e-b732-311b2907991f.gif b/UI/frontend/public/imgs/226127927-3feb953e-cc01-482e-b732-311b2907991f.gif similarity index 100% rename from UI/frontend/src/content/imgs/226127927-3feb953e-cc01-482e-b732-311b2907991f.gif rename to UI/frontend/public/imgs/226127927-3feb953e-cc01-482e-b732-311b2907991f.gif diff --git a/UI/frontend/src/content/imgs/227779362-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif b/UI/frontend/public/imgs/227779362-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif similarity index 100% rename from UI/frontend/src/content/imgs/227779362-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif rename to UI/frontend/public/imgs/227779362-cacda485-cab4-4e28-8a27-a4d2a918a7ac.gif diff --git a/UI/frontend/src/content/imgs/238200842-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif b/UI/frontend/public/imgs/238200842-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif similarity index 100% rename from UI/frontend/src/content/imgs/238200842-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif rename to UI/frontend/public/imgs/238200842-406eb3e6-caba-401d-93c8-e0a7941c84b9.gif diff --git a/UI/frontend/src/content/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif b/UI/frontend/public/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif similarity index 100% rename from UI/frontend/src/content/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif rename to UI/frontend/public/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif diff --git a/UI/frontend/src/content/imgs/238353480-219bcc70-f5dc-466b-9a60-29653d8e8433.gif b/UI/frontend/public/imgs/238353480-219bcc70-f5dc-466b-9a60-29653d8e8433.gif similarity index 100% rename from UI/frontend/src/content/imgs/238353480-219bcc70-f5dc-466b-9a60-29653d8e8433.gif rename to UI/frontend/public/imgs/238353480-219bcc70-f5dc-466b-9a60-29653d8e8433.gif diff --git a/UI/frontend/src/content/imgs/238355349-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif b/UI/frontend/public/imgs/238355349-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif similarity index 100% rename from UI/frontend/src/content/imgs/238355349-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif rename to UI/frontend/public/imgs/238355349-7d484dc9-68a9-4ee6-a767-aea59035c12d.gif diff --git a/UI/frontend/src/content/imgs/240304586-d48893bd-0757-481c-8d7e-ba3e163feae7.png b/UI/frontend/public/imgs/240304586-d48893bd-0757-481c-8d7e-ba3e163feae7.png similarity index 100% rename from UI/frontend/src/content/imgs/240304586-d48893bd-0757-481c-8d7e-ba3e163feae7.png rename to UI/frontend/public/imgs/240304586-d48893bd-0757-481c-8d7e-ba3e163feae7.png diff --git a/UI/frontend/src/content/imgs/240307504-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif b/UI/frontend/public/imgs/240307504-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif similarity index 100% rename from UI/frontend/src/content/imgs/240307504-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif rename to UI/frontend/public/imgs/240307504-366d67af-a5ad-4c0a-bf14-1bebfed20a3a.gif diff --git a/UI/frontend/src/content/imgs/240308118-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif b/UI/frontend/public/imgs/240308118-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif similarity index 100% rename from UI/frontend/src/content/imgs/240308118-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif rename to UI/frontend/public/imgs/240308118-6f28d73e-0d7e-4a6c-8ddf-bb24b69a71c0.gif diff --git a/UI/frontend/src/content/imgs/240815068-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif b/UI/frontend/public/imgs/240815068-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif similarity index 100% rename from UI/frontend/src/content/imgs/240815068-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif rename to UI/frontend/public/imgs/240815068-993370af-11f4-48e7-9e0d-e5b79c2e7890.gif diff --git a/UI/frontend/src/content/imgs/241763891-7bb1e704-6026-48f9-8435-2f4d40101348.gif b/UI/frontend/public/imgs/241763891-7bb1e704-6026-48f9-8435-2f4d40101348.gif similarity index 100% rename from UI/frontend/src/content/imgs/241763891-7bb1e704-6026-48f9-8435-2f4d40101348.gif rename to UI/frontend/public/imgs/241763891-7bb1e704-6026-48f9-8435-2f4d40101348.gif diff --git a/UI/frontend/src/content/imgs/242390524-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif b/UI/frontend/public/imgs/242390524-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif similarity index 100% rename from UI/frontend/src/content/imgs/242390524-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif rename to UI/frontend/public/imgs/242390524-0c7eb6ed-663b-4ce4-bfbd-18239a38ba1b.gif diff --git a/UI/frontend/src/content/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif b/UI/frontend/public/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif similarity index 100% rename from UI/frontend/src/content/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif rename to UI/frontend/public/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif diff --git a/UI/frontend/src/content/imgs/250967618-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif b/UI/frontend/public/imgs/250967618-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif similarity index 100% rename from UI/frontend/src/content/imgs/250967618-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif rename to UI/frontend/public/imgs/250967618-de30015f-dc5f-4ecf-a49b-ccd2b89776e4.gif diff --git a/UI/frontend/src/content/imgs/362d5c55859146c0c7debfca296ad321.gif b/UI/frontend/public/imgs/362d5c55859146c0c7debfca296ad321.gif similarity index 100% rename from UI/frontend/src/content/imgs/362d5c55859146c0c7debfca296ad321.gif rename to UI/frontend/public/imgs/362d5c55859146c0c7debfca296ad321.gif diff --git "a/UI/frontend/src/content/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" "b/UI/frontend/public/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" similarity index 100% rename from "UI/frontend/src/content/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" rename to "UI/frontend/public/imgs/Movie on 27-07-25 at 9.36\342\200\257PM.mov" diff --git a/UI/frontend/src/content/imgs/Screenshot (10).png b/UI/frontend/public/imgs/Screenshot (10).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (10).png rename to UI/frontend/public/imgs/Screenshot (10).png diff --git a/UI/frontend/src/content/imgs/Screenshot (11).png b/UI/frontend/public/imgs/Screenshot (11).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (11).png rename to UI/frontend/public/imgs/Screenshot (11).png diff --git a/UI/frontend/src/content/imgs/Screenshot (12).png b/UI/frontend/public/imgs/Screenshot (12).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (12).png rename to UI/frontend/public/imgs/Screenshot (12).png diff --git a/UI/frontend/src/content/imgs/Screenshot (13).png b/UI/frontend/public/imgs/Screenshot (13).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (13).png rename to UI/frontend/public/imgs/Screenshot (13).png diff --git a/UI/frontend/src/content/imgs/Screenshot (14).png b/UI/frontend/public/imgs/Screenshot (14).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (14).png rename to UI/frontend/public/imgs/Screenshot (14).png diff --git a/UI/frontend/src/content/imgs/Screenshot (6).png b/UI/frontend/public/imgs/Screenshot (6).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (6).png rename to UI/frontend/public/imgs/Screenshot (6).png diff --git a/UI/frontend/src/content/imgs/Screenshot (7).png b/UI/frontend/public/imgs/Screenshot (7).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (7).png rename to UI/frontend/public/imgs/Screenshot (7).png diff --git a/UI/frontend/src/content/imgs/Screenshot (8).png b/UI/frontend/public/imgs/Screenshot (8).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (8).png rename to UI/frontend/public/imgs/Screenshot (8).png diff --git a/UI/frontend/src/content/imgs/Screenshot (9).png b/UI/frontend/public/imgs/Screenshot (9).png similarity index 100% rename from UI/frontend/src/content/imgs/Screenshot (9).png rename to UI/frontend/public/imgs/Screenshot (9).png diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" "b/UI/frontend/public/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-07-21 at 11.11.34\342\200\257AM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" "b/UI/frontend/public/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-07-24 at 4.58.09\342\200\257AM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" "b/UI/frontend/public/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-07-24 at 6.49.53\342\200\257AM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" "b/UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.38.18\342\200\257PM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" "b/UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.47.22\342\200\257PM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" "b/UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-08-09 at 3.56.13\342\200\257PM.png" diff --git "a/UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" "b/UI/frontend/public/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" similarity index 100% rename from "UI/frontend/src/content/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" rename to "UI/frontend/public/imgs/Screenshot 2025-08-09 at 5.54.42\342\200\257PM.png" diff --git a/UI/frontend/src/content/imgs/WEP-encryption-algorithm-37.ppm.png b/UI/frontend/public/imgs/WEP-encryption-algorithm-37.ppm.png similarity index 100% rename from UI/frontend/src/content/imgs/WEP-encryption-algorithm-37.ppm.png rename to UI/frontend/public/imgs/WEP-encryption-algorithm-37.ppm.png diff --git a/UI/frontend/src/content/imgs/What-is-MAC-Address.jpeg b/UI/frontend/public/imgs/What-is-MAC-Address.jpeg similarity index 100% rename from UI/frontend/src/content/imgs/What-is-MAC-Address.jpeg rename to UI/frontend/public/imgs/What-is-MAC-Address.jpeg diff --git a/UI/frontend/src/content/imgs/What-is-Packet-Sniffing-01.png.webp b/UI/frontend/public/imgs/What-is-Packet-Sniffing-01.png.webp similarity index 100% rename from UI/frontend/src/content/imgs/What-is-Packet-Sniffing-01.png.webp rename to UI/frontend/public/imgs/What-is-Packet-Sniffing-01.png.webp diff --git a/UI/frontend/src/content/imgs/WhatsApp Image 2025-07-26 at 07.47.53.jpeg b/UI/frontend/public/imgs/WhatsApp Image 2025-07-26 at 07.47.53.jpeg similarity index 100% rename from UI/frontend/src/content/imgs/WhatsApp Image 2025-07-26 at 07.47.53.jpeg rename to UI/frontend/public/imgs/WhatsApp Image 2025-07-26 at 07.47.53.jpeg diff --git a/UI/frontend/src/content/imgs/WhatsApp Image 2025-07-28 at 19.40.07.jpeg b/UI/frontend/public/imgs/WhatsApp Image 2025-07-28 at 19.40.07.jpeg similarity index 100% rename from UI/frontend/src/content/imgs/WhatsApp Image 2025-07-28 at 19.40.07.jpeg rename to UI/frontend/public/imgs/WhatsApp Image 2025-07-28 at 19.40.07.jpeg diff --git a/UI/frontend/src/content/imgs/andoroid.gif b/UI/frontend/public/imgs/andoroid.gif similarity index 100% rename from UI/frontend/src/content/imgs/andoroid.gif rename to UI/frontend/public/imgs/andoroid.gif diff --git a/UI/frontend/src/content/imgs/async_port_scanner.jpg b/UI/frontend/public/imgs/async_port_scanner.jpg similarity index 100% rename from UI/frontend/src/content/imgs/async_port_scanner.jpg rename to UI/frontend/public/imgs/async_port_scanner.jpg diff --git a/UI/frontend/src/content/imgs/b1b55f18288795.562c702fe9883.gif b/UI/frontend/public/imgs/b1b55f18288795.562c702fe9883.gif similarity index 100% rename from UI/frontend/src/content/imgs/b1b55f18288795.562c702fe9883.gif rename to UI/frontend/public/imgs/b1b55f18288795.562c702fe9883.gif diff --git a/UI/frontend/src/content/imgs/bettercap_arp_spoofing_script.png b/UI/frontend/public/imgs/bettercap_arp_spoofing_script.png similarity index 100% rename from UI/frontend/src/content/imgs/bettercap_arp_spoofing_script.png rename to UI/frontend/public/imgs/bettercap_arp_spoofing_script.png diff --git a/UI/frontend/src/content/imgs/booting-up-developer-economy-how-tech-startups-are-helping-coders-build-and-test-software-faster.jpg.webp b/UI/frontend/public/imgs/booting-up-developer-economy-how-tech-startups-are-helping-coders-build-and-test-software-faster.jpg.webp similarity index 100% rename from UI/frontend/src/content/imgs/booting-up-developer-economy-how-tech-startups-are-helping-coders-build-and-test-software-faster.jpg.webp rename to UI/frontend/public/imgs/booting-up-developer-economy-how-tech-startups-are-helping-coders-build-and-test-software-faster.jpg.webp diff --git a/UI/frontend/src/content/imgs/https_data_fetcher_bettercap.png b/UI/frontend/public/imgs/https_data_fetcher_bettercap.png similarity index 100% rename from UI/frontend/src/content/imgs/https_data_fetcher_bettercap.png rename to UI/frontend/public/imgs/https_data_fetcher_bettercap.png diff --git a/UI/frontend/src/content/imgs/https_data_fetcher_bettercap1.png b/UI/frontend/public/imgs/https_data_fetcher_bettercap1.png similarity index 100% rename from UI/frontend/src/content/imgs/https_data_fetcher_bettercap1.png rename to UI/frontend/public/imgs/https_data_fetcher_bettercap1.png diff --git a/UI/frontend/src/content/imgs/https_data_fetcher_bettercap2.png b/UI/frontend/public/imgs/https_data_fetcher_bettercap2.png similarity index 100% rename from UI/frontend/src/content/imgs/https_data_fetcher_bettercap2.png rename to UI/frontend/public/imgs/https_data_fetcher_bettercap2.png diff --git a/UI/frontend/src/content/imgs/https_data_fetcher_bettercap3.png b/UI/frontend/public/imgs/https_data_fetcher_bettercap3.png similarity index 100% rename from UI/frontend/src/content/imgs/https_data_fetcher_bettercap3.png rename to UI/frontend/public/imgs/https_data_fetcher_bettercap3.png diff --git a/UI/frontend/src/content/imgs/ids_probe.png b/UI/frontend/public/imgs/ids_probe.png similarity index 100% rename from UI/frontend/src/content/imgs/ids_probe.png rename to UI/frontend/public/imgs/ids_probe.png diff --git a/UI/frontend/src/content/imgs/ids_probe1.png b/UI/frontend/public/imgs/ids_probe1.png similarity index 100% rename from UI/frontend/src/content/imgs/ids_probe1.png rename to UI/frontend/public/imgs/ids_probe1.png diff --git a/UI/frontend/src/content/imgs/ids_probe2.png b/UI/frontend/public/imgs/ids_probe2.png similarity index 100% rename from UI/frontend/src/content/imgs/ids_probe2.png rename to UI/frontend/public/imgs/ids_probe2.png diff --git a/UI/frontend/src/content/imgs/l1.png b/UI/frontend/public/imgs/l1.png similarity index 100% rename from UI/frontend/src/content/imgs/l1.png rename to UI/frontend/public/imgs/l1.png diff --git a/UI/frontend/src/content/imgs/l2.png b/UI/frontend/public/imgs/l2.png similarity index 100% rename from UI/frontend/src/content/imgs/l2.png rename to UI/frontend/public/imgs/l2.png diff --git a/UI/frontend/src/content/imgs/l3.png b/UI/frontend/public/imgs/l3.png similarity index 100% rename from UI/frontend/src/content/imgs/l3.png rename to UI/frontend/public/imgs/l3.png diff --git a/UI/frontend/src/content/imgs/l4.png b/UI/frontend/public/imgs/l4.png similarity index 100% rename from UI/frontend/src/content/imgs/l4.png rename to UI/frontend/public/imgs/l4.png diff --git a/UI/frontend/src/content/imgs/ll1.png b/UI/frontend/public/imgs/ll1.png similarity index 100% rename from UI/frontend/src/content/imgs/ll1.png rename to UI/frontend/public/imgs/ll1.png diff --git a/UI/frontend/src/content/imgs/ll2.png b/UI/frontend/public/imgs/ll2.png similarity index 100% rename from UI/frontend/src/content/imgs/ll2.png rename to UI/frontend/public/imgs/ll2.png diff --git a/UI/frontend/src/content/imgs/mac_address_change.jpg b/UI/frontend/public/imgs/mac_address_change.jpg similarity index 100% rename from UI/frontend/src/content/imgs/mac_address_change.jpg rename to UI/frontend/public/imgs/mac_address_change.jpg diff --git a/UI/frontend/src/content/imgs/main.jpg b/UI/frontend/public/imgs/main.jpg similarity index 100% rename from UI/frontend/src/content/imgs/main.jpg rename to UI/frontend/public/imgs/main.jpg diff --git a/UI/frontend/src/content/imgs/mitm_attack_automator.png b/UI/frontend/public/imgs/mitm_attack_automator.png similarity index 100% rename from UI/frontend/src/content/imgs/mitm_attack_automator.png rename to UI/frontend/public/imgs/mitm_attack_automator.png diff --git a/UI/frontend/src/content/imgs/port-scanning1.png b/UI/frontend/public/imgs/port-scanning1.png similarity index 100% rename from UI/frontend/src/content/imgs/port-scanning1.png rename to UI/frontend/public/imgs/port-scanning1.png diff --git a/UI/frontend/src/content/imgs/port-scanning2.png b/UI/frontend/public/imgs/port-scanning2.png similarity index 100% rename from UI/frontend/src/content/imgs/port-scanning2.png rename to UI/frontend/public/imgs/port-scanning2.png diff --git a/UI/frontend/src/content/imgs/port-scanning3.png b/UI/frontend/public/imgs/port-scanning3.png similarity index 100% rename from UI/frontend/src/content/imgs/port-scanning3.png rename to UI/frontend/public/imgs/port-scanning3.png diff --git a/UI/frontend/src/content/imgs/port-scanning4.png b/UI/frontend/public/imgs/port-scanning4.png similarity index 100% rename from UI/frontend/src/content/imgs/port-scanning4.png rename to UI/frontend/public/imgs/port-scanning4.png diff --git a/UI/frontend/src/content/imgs/portscanner_test.png b/UI/frontend/public/imgs/portscanner_test.png similarity index 100% rename from UI/frontend/src/content/imgs/portscanner_test.png rename to UI/frontend/public/imgs/portscanner_test.png diff --git a/UI/frontend/src/content/imgs/portscanner_test2.png b/UI/frontend/public/imgs/portscanner_test2.png similarity index 100% rename from UI/frontend/src/content/imgs/portscanner_test2.png rename to UI/frontend/public/imgs/portscanner_test2.png diff --git a/UI/frontend/src/content/imgs/quick scan plus.png b/UI/frontend/public/imgs/quick scan plus.png similarity index 100% rename from UI/frontend/src/content/imgs/quick scan plus.png rename to UI/frontend/public/imgs/quick scan plus.png diff --git a/UI/frontend/src/content/imgs/remote_collect_via_ssh.jpg b/UI/frontend/public/imgs/remote_collect_via_ssh.jpg similarity index 100% rename from UI/frontend/src/content/imgs/remote_collect_via_ssh.jpg rename to UI/frontend/public/imgs/remote_collect_via_ssh.jpg diff --git a/UI/frontend/src/content/imgs/remote_collect_via_ssh2.jpg b/UI/frontend/public/imgs/remote_collect_via_ssh2.jpg similarity index 100% rename from UI/frontend/src/content/imgs/remote_collect_via_ssh2.jpg rename to UI/frontend/public/imgs/remote_collect_via_ssh2.jpg diff --git a/UI/frontend/src/content/imgs/remote_collect_via_ssh3.jpg b/UI/frontend/public/imgs/remote_collect_via_ssh3.jpg similarity index 100% rename from UI/frontend/src/content/imgs/remote_collect_via_ssh3.jpg rename to UI/frontend/public/imgs/remote_collect_via_ssh3.jpg diff --git a/UI/frontend/src/content/imgs/service_view_zenmap.png b/UI/frontend/public/imgs/service_view_zenmap.png similarity index 100% rename from UI/frontend/src/content/imgs/service_view_zenmap.png rename to UI/frontend/public/imgs/service_view_zenmap.png diff --git a/UI/frontend/src/content/imgs/source.gif b/UI/frontend/public/imgs/source.gif similarity index 100% rename from UI/frontend/src/content/imgs/source.gif rename to UI/frontend/public/imgs/source.gif diff --git a/UI/frontend/src/content/imgs/vmw-virtualization-defined.jpg b/UI/frontend/public/imgs/vmw-virtualization-defined.jpg similarity index 100% rename from UI/frontend/src/content/imgs/vmw-virtualization-defined.jpg rename to UI/frontend/public/imgs/vmw-virtualization-defined.jpg diff --git a/UI/frontend/src/content/imgs/weakencrpyption.png b/UI/frontend/public/imgs/weakencrpyption.png similarity index 100% rename from UI/frontend/src/content/imgs/weakencrpyption.png rename to UI/frontend/public/imgs/weakencrpyption.png diff --git a/UI/frontend/src/content/imgs/wep_wifi_hacking.png b/UI/frontend/public/imgs/wep_wifi_hacking.png similarity index 100% rename from UI/frontend/src/content/imgs/wep_wifi_hacking.png rename to UI/frontend/public/imgs/wep_wifi_hacking.png diff --git a/UI/frontend/src/content/imgs/wordlist_generator.jpg b/UI/frontend/public/imgs/wordlist_generator.jpg similarity index 100% rename from UI/frontend/src/content/imgs/wordlist_generator.jpg rename to UI/frontend/public/imgs/wordlist_generator.jpg diff --git a/UI/frontend/src/content/imgs/wordlist_generator2.jpg b/UI/frontend/public/imgs/wordlist_generator2.jpg similarity index 100% rename from UI/frontend/src/content/imgs/wordlist_generator2.jpg rename to UI/frontend/public/imgs/wordlist_generator2.jpg diff --git a/UI/frontend/src/content/imgs/wpa2_dictionary_attack.png b/UI/frontend/public/imgs/wpa2_dictionary_attack.png similarity index 100% rename from UI/frontend/src/content/imgs/wpa2_dictionary_attack.png rename to UI/frontend/public/imgs/wpa2_dictionary_attack.png diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD b/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD index 35b01c9..3184ea7 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD @@ -135,14 +135,14 @@ int main() { 2. Run it with short input: ```bash - echo "Short input" | ./poc + echo "Short input" | /poc ``` Output: Normal execution. 3. Run with long input to cause overflow: ```bash - python3 -c "print('A' * 80)" | ./poc + python3 -c "print('A' * 80)" | /poc ``` This may cause a segmentation fault, as the overflow corrupts the stack. @@ -159,7 +159,7 @@ For example, using tools like `pwntools` in Python: from pwn import * # Assuming the binary is vulnerable -p = process('./poc') +p = process('/poc') payload = b'A' * 72 + p64(0xaddress_of_secret_function) # Adjust offset and address p.sendline(payload) p.interactive() @@ -171,5 +171,5 @@ This PoC illustrates why `gets()` is banned in secure coding—always use `fgets ### Path -<- [Previous Lesson: Phishing Toolkits](./lesson-phising-toolkit.md) -->[Next Lession: IP & Port Scanning](./python-for-eth-hacking/A-guide-to-port-scanning.md) +<- [Previous Lesson: Phishing Toolkits](/lesson-phising-toolkit.md) +->[Next Lession: IP & Port Scanning](/python-for-eth-hacking/A-guide-to-port-scanning.md) diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-01.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-01.md index b213ab9..f7c358c 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-01.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-01.md @@ -9,7 +9,7 @@ next: "lesson-02" # Getting Started with Ethical Hacking -![](../imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif) +![](/imgs/212750155-3ceddfbd-19d3-40a3-87af-8d329c8323c4.gif) - [Getting Started with Ethical Hacking](#getting-started-with-ethical-hacking) @@ -38,7 +38,7 @@ next: "lesson-02" --- -![](./imgs/b1b55f18288795.562c702fe9883.gif) +![](/imgs/b1b55f18288795.562c702fe9883.gif) - Hacking is getting unauthorized access to a system. - Hackers generally are of three types: @@ -68,7 +68,7 @@ next: "lesson-02" ### Virtualization - ![](./imgs/vmw-virtualization-defined.jpg) + ![](/imgs/vmw-virtualization-defined.jpg) - What we are utilising here to have these VMs is called Virtualization. Virtualization allows you to Run Guest OS on top of Hypervisor over Host OS. This is different from concept of Containerizartion, where we run apps over the Docker Engine, and all apps sharing a common Host OS. This is not the case with Virtualization. @@ -97,7 +97,7 @@ next: "lesson-02" - It will recieve `google.com` from the internet, and will forward that response to our computer, and as a result we will see the website loading on our browser. - ![](./imgs/Screenshot%202025-07-21%20at%2011.11.34 AM.png) + ![](/imgs/Screenshot%202025-07-21%20at%2011.11.34 AM.png) ## Connecting Wireless adapter to Kali ![](https://skillicons.dev/icons?i=kali) @@ -406,4 +406,4 @@ RSA is strong in theory, but weak in practice if misused: ### Path -[Next Lesson: Network Hacking - Pre Connection Attacks](./lesson-02.md) -> \ No newline at end of file +[Next Lesson: Network Hacking - Pre Connection Attacks](/lesson-02.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-02.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-02.md index 382112b..be97099 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-02.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-02.md @@ -19,7 +19,7 @@ next: "lesson-03" --- -![Packet Sniffing Illustration](../imgs/What-is-Packet-Sniffing-01.png.webp) +![Packet Sniffing Illustration](/imgs/What-is-Packet-Sniffing-01.png.webp) ## Packet Sniffing Basics @@ -223,7 +223,7 @@ next: "lesson-03" Quitting... ``` - ![Screenshot of mobile trying to reconnect to the network](../imgs/WhatsApp%20Image%202025-07-26%20at%2007.47.53.jpeg) + ![Screenshot of mobile trying to reconnect to the network](/imgs/WhatsApp%20Image%202025-07-26%20at%2007.47.53.jpeg) - Let's write down a Python script to automate this process of deauthentication attack. The script will take the wireless interface name, target client MAC address, and gateway (AP) MAC address as input and perform the deauthentication attack. @@ -298,4 +298,4 @@ next: "lesson-03" ### Path -<- [Previous Lesson: Ethical Hacking for Beginners](./lesson-01.md) | [Next Lesson: Network Hacking: Gaining Access WEP Cracking](./lesson-03.md) -> \ No newline at end of file +<- [Previous Lesson: Ethical Hacking for Beginners](/lesson-01.md) | [Next Lesson: Network Hacking: Gaining Access WEP Cracking](/lesson-03.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-03.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-03.md index e255881..ce9dece 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-03.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-03.md @@ -19,7 +19,7 @@ next: "lesson-04" --- -![WEP encryption algorithm diagram](../imgs/WEP-encryption-algorithm-37.ppm.png) +![WEP encryption algorithm diagram](/imgs/WEP-encryption-algorithm-37.ppm.png) - Everything we did so for now didn't require us to have access/connection to the network. - Now, once we connect to the network, we can not only start to see the data being transmitted, but we can also start to manipulate it. @@ -215,7 +215,7 @@ sequenceDiagram - **Proof, this image will take you to the video where you can see me enter hex password on mobile device and connect to the network:** - [![Watch the video](../imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif)](https://youtu.be/sLQRBuHkpw4) + [![Watch the video](/imgs/242390692-0b335028-1d3d-4ee5-b5b3-a373d499be7e.gif)](https://youtu.be/sLQRBuHkpw4) ## Fake Authentication Attack @@ -301,4 +301,4 @@ sequenceDiagram ### Path -<- [Previous Lesson: Network Hacking - Pre Connection Attacks](./lesson-02.md) | [Next Lesson: Network Hacking - Gaining Access - WPA/WPA2 Cracking](./lesson-04.md) -> \ No newline at end of file +<- [Previous Lesson: Network Hacking - Pre Connection Attacks](/lesson-02.md) | [Next Lesson: Network Hacking - Gaining Access - WPA/WPA2 Cracking](/lesson-04.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-04.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-04.md index 39afac6..7d64170 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-04.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-04.md @@ -9,7 +9,7 @@ next: "lesson-05" # Network Hacking - Gaining Access - WPA/WPA2 Cracking -![](../imgs/06f21a161921919.63cd7887d0a70.gif) +![](/imgs/06f21a161921919.63cd7887d0a70.gif) --- @@ -551,7 +551,7 @@ next: "lesson-05" - **We will use the WPA-PSK at the end of the `reaver` logs to connect to the wifi. Below is the video proof that we can connect to the wifi using the cracked WPA-PSK.** - [![Watch the video](../imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif)](https://youtu.be/stE-FNupm0o) + [![Watch the video](/imgs/238353467-897cd757-ea1f-492d-aaf9-6d1674177e08.gif)](https://youtu.be/stE-FNupm0o) - Also, you might be thinking, why we needed to run a fake authentication attack using `aireplay-ng`? The answer is simple, we needed to associate with the access point to be able to send EAPOL packets, if not associated the network would have just ignored us. @@ -713,7 +713,7 @@ next: "lesson-05" - You can use this password to connect to the target network. Here's the proof of my Wifi Password. - ![](../imgs/WhatsApp%20Image%202025-07-28%20at%2019.40.07.jpeg) + ![](/imgs/WhatsApp%20Image%202025-07-28%20at%2019.40.07.jpeg) ## Configuring Wireless Settings for Maximum Security @@ -729,4 +729,4 @@ next: "lesson-05" ### Path -<- [Previous Lesson: Network Hacking: Gaining Access WEP Cracking](./lesson-03.md) | [Next Lesson: Network Hacking Post Connection Attacks - Information Gathering](./lesson-05.md) -> \ No newline at end of file +<- [Previous Lesson: Network Hacking: Gaining Access WEP Cracking](/lesson-03.md) | [Next Lesson: Network Hacking Post Connection Attacks - Information Gathering](/lesson-05.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-05.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-05.md index 9bf35d5..9f9d226 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-05.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-05.md @@ -9,7 +9,7 @@ next: "lesson-06" # Network Hacking Post Connection Attacks - Information Gathering -![](../imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif) +![](/imgs/212749447-bfb7e725-6987-49d9-ae85-2015e3e7cc41.gif) - [Network Hacking Post Connection Attacks - Information Gathering](#network-hacking-post-connection-attacks---information-gathering) - [Discovering Devices Connected to the Same Network](#discovering-devices-connected-to-the-same-network) @@ -80,32 +80,32 @@ next: "lesson-06" root@kali:~# zenmap ``` - ![](../imgs/Screenshot%202025-08-09%20at%203.38.18 PM.png) + ![](/imgs/Screenshot%202025-08-09%20at%203.38.18 PM.png) - It has a very simple interface. You can enter the target IP address or hostname in the "Target" field, and then select the type of scan you want to perform from the "Profile" dropdown menu. - Enter the target range in the "Target" field, for example `XX.XX.XX.1/24`, and select the "Intense Scan" profile from the dropdown menu. Then click on the "Scan" button to start the scan. - ![](../imgs/Screenshot%202025-08-09%20at%203.47.22 PM.png) + ![](/imgs/Screenshot%202025-08-09%20at%203.47.22 PM.png) - As you can see here, it is scanning the target range for open ports, services running on those ports, and even the operating system of the device. It will take some time to complete the scan, depending on the size of the target range and the number of devices connected to it. - Let's see how to perform a ping scan: - ![](../imgs/Screenshot%202025-08-09%20at%203.56.13 PM.png) + ![](/imgs/Screenshot%202025-08-09%20at%203.56.13 PM.png) - Here, we can see what kind of device is connected to the network, what operating system it is running. As, we can see here, we have 3 VMware devices connected to the network, and one of them is running an Unknown OS. - In a similare way we can perform quick scan as well: - ![](../imgs/Screenshot%202025-08-09%20at%205.54.42 PM.png) + ![](/imgs/Screenshot%202025-08-09%20at%205.54.42 PM.png) - It shows open ports on each one of the discovered devices, along with the services running on those ports. For example, we can see that port `22` is open on the device with IP. ### Gathering More Sensitive Information(Services, OS, etc.) - ![](../imgs/quick%20scan%20plus.png) + ![](/imgs/quick%20scan%20plus.png) - As here we can clearly see, that the device has it's IP, MAC Address, and the services running on it. We can also see the operating system of the device. @@ -115,10 +115,10 @@ next: "lesson-06" - We can also categorize discovered clients based on the services running on them. - ![](../imgs/service_view_zenmap.png) + ![](/imgs/service_view_zenmap.png) --- ### Path -<- [Previous Lesson: Network Hacking - Gaining Access - WPA/WPA2 Cracking](./lesson-04.md) | [Next Lesson: Network Hacking Post Connection Attacks - MITM Attacks](./lesson-06.md) -> \ No newline at end of file +<- [Previous Lesson: Network Hacking - Gaining Access - WPA/WPA2 Cracking](/lesson-04.md) | [Next Lesson: Network Hacking Post Connection Attacks - MITM Attacks](/lesson-06.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-06.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-06.md index e6c51db..0dd675d 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-06.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-06.md @@ -22,7 +22,7 @@ next: "lesson-cyberchef" - [Spying on Network Devices](#spying-on-network-devices) -![](../imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif) +![](/imgs/225813708-98b745f2-7d22-48cf-9150-083f1b00d6c9.gif) - MITM stands for Man In The Middle. It is a type of attack where the attacker intercepts communication between two parties without their knowledge. The attacker can then eavesdrop on the conversation, modify the data being sent, or even impersonate one of the parties. @@ -154,8 +154,8 @@ sequenceDiagram It would look something like this: - ![](../imgs/Screenshot%20(6).png) - ![](../imgs/Screenshot%20(7).png) + ![](/imgs/Screenshot%20(6).png) + ![](/imgs/Screenshot%20(7).png) - As, you can clearly see the MAC Address of the gateway has been changed to the MAC Address of the attacker. This means that all the packets that are intended for the gateway will now be sent to the attacker. @@ -207,7 +207,7 @@ sequenceDiagram This is another way of discovering connected clients quickly using bettercap. What we didn't notice is when we started the `net.probe on` command, it automatically started the `net.recon` command as a requirement for `net.probe`. This means that it is continuously scanning for new devices on the network. So, now if you do `help` again, you will see that the `net.recon` command is also running. - ![](../imgs/Screenshot%20(8).png) + ![](/imgs/Screenshot%20(8).png) The reason for this is because the net.probe sends probe request to all possible IPs, and than if we get a response the net.recon will be the one detecting the response by monitoring my ARP Cache, and than adding all of these IPs in a nice list, so we can target them. @@ -219,7 +219,7 @@ sequenceDiagram This will display the list of devices on the network along with their IP addresses, MAC addresses, and hostnames. - ![](../imgs/Screenshot%20(9).png) + ![](/imgs/Screenshot%20(9).png) Here, we can see there IPs, corresponding MAC Addresses, and it can also show you information about each one of these IPs. @@ -227,7 +227,7 @@ sequenceDiagram Now to perform the ARP spoofing, we can use the `arp.spoof` command to enable ARP spoofing. Let's first see how to activate this command. - ![](../imgs/Screenshot%20(10).png) + ![](/imgs/Screenshot%20(10).png) So, here we can clearly seedsad that we can use the `arp.spoof on` command to turn this module on. We can do `arp.ban on` this will literally just cut the connection to the target. We can do `arp.spoof off` to turn it off. @@ -261,17 +261,17 @@ sequenceDiagram set arp.spoof.fullduplex true;set arp.spoof.targets ;arp.spoof on ``` - ![](../imgs/Screenshot%20(12).png) + ![](/imgs/Screenshot%20(12).png) Now, if we check the Target Windows Vm, we can clearly see, the MACs changed. - ![](../imgs/Screenshot%20(11).png) + ![](/imgs/Screenshot%20(11).png) - If we see, the output of `help` it clearly shows `arp.spoof` is running. - Also, when we check the output for `arp -a` on the Windows VM, we can see that the MAC address of the gateway has been changed to the MAC address of the attacker. This means that all the packets that are intended for the gateway will now be sent to the attacker. -The same can be performed using our automated script as well which is at the specified [location](../python-scripts/bettercap_arp_spoofing_script.py). +The same can be performed using our automated script as well which is at the specified [location](/python-scripts/bettercap_arp_spoofing_script.py). ### Spying on Network Devices @@ -288,8 +288,8 @@ The same can be performed using our automated script as well which is at the spe - Now, when we login into a HTTP Website with a username and password, we can see the username and password in the output of `net.sniff`, as shown below: - ![](../imgs/Screenshot%20(14).png) - ![](../imgs/Screenshot%20(13).png) + ![](/imgs/Screenshot%20(14).png) + ![](/imgs/Screenshot%20(13).png) - In this way we can spy on the network devices using bettercap. We can see all the HTTP requests and responses in real-time, including the username and password for HTTP websites. @@ -297,4 +297,4 @@ The same can be performed using our automated script as well which is at the spe ### Path -<- [Previous Lesson: Network Hacking Post Connection Attacks - Information Gathering](./lesson-05.md) | [Next Lesson: CyberChef – The Cyber Swiss Army Knife](./lesson-cyberchef.md) -> +<- [Previous Lesson: Network Hacking Post Connection Attacks - Information Gathering](/lesson-05.md) | [Next Lesson: CyberChef – The Cyber Swiss Army Knife](/lesson-cyberchef.md) -> diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-cyberchef.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-cyberchef.md index 84cf23e..f5ab2f5 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-cyberchef.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-cyberchef.md @@ -74,7 +74,7 @@ Here's a simple example of how a recipe works. 48656c6c6f ``` -![ll1](../imgs/ll1.png) +![ll1](/imgs/ll1.png) If you then add the `From Hex` operation to the recipe, it will convert the hex back to the original text, `Hello`. This shows how you can chain multiple steps to build a complex data processing pipeline. @@ -100,6 +100,6 @@ Explore [CyberChef Official Website](https://gchq.github.io/CyberChef/) and enjo ### Path -<- [Previous Lesson: Network Hacking Post Connection Attacks - MITM Attacks](./lesson-06.md) | [Next Lesson: Introduction to Network Scanning with Fing](./lesson-fing.md) -> +<- [Previous Lesson: Network Hacking Post Connection Attacks - MITM Attacks](/lesson-06.md) | [Next Lesson: Introduction to Network Scanning with Fing](/lesson-fing.md) -> diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-fing.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-fing.md index 2ed346e..7a272fc 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-fing.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-fing.md @@ -108,10 +108,10 @@ Your next authorized action in a real test would be to use a web vulnerability s --- Screenshots -![l1](../imgs/l1.png) -![l2](../imgs/l2.png) -![l3](../imgs/l3.png) -![l4](../imgs/l4.png) +![l1](/imgs/l1.png) +![l2](/imgs/l2.png) +![l3](/imgs/l3.png) +![l4](/imgs/l4.png) --- ## Where to Read More @@ -126,4 +126,4 @@ To continue your learning, check out the official documentation. The CLI (Comman ### Path -<- [Previous Lesson: CyberChef – The Cyber Swiss Army Knife](./lesson-cyberchef.md) | [Next Lesson: Password Attacks & Hash Cracking](./lesson-password_attack-and_hashcracking.md) -> \ No newline at end of file +<- [Previous Lesson: CyberChef – The Cyber Swiss Army Knife](/lesson-cyberchef.md) | [Next Lesson: Password Attacks & Hash Cracking](/lesson-password_attack-and_hashcracking.md) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-password_attack-and_hashcracking.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-password_attack-and_hashcracking.md index 6299f7b..7cba140 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-password_attack-and_hashcracking.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-password_attack-and_hashcracking.md @@ -149,6 +149,6 @@ next: "lesson-passwordcracking" ### Path -<- [Previous Lesson: Introduction to Network Scanning with Fing](./lesson-fing.md) | [Next Lesson: Password Cracking](./lesson-passwordcracking.md) -> +<- [Previous Lesson: Introduction to Network Scanning with Fing](/lesson-fing.md) | [Next Lesson: Password Cracking](/lesson-passwordcracking.md) -> Updated: 2025-10-07 diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-passwordcracking.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-passwordcracking.md index 1e785d6..ff167ae 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-passwordcracking.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-passwordcracking.md @@ -178,4 +178,4 @@ cat Done.txt ### Path -<- [Previous Lesson: Password Attacks & Hash Cracking](./lesson-password_attack-and_hashcracking.md) | [Next Lesson: Phishing Toolkits](./lesson-phising-toolkit.md) -> +<- [Previous Lesson: Password Attacks & Hash Cracking](/lesson-password_attack-and_hashcracking.md) | [Next Lesson: Phishing Toolkits](/lesson-phising-toolkit.md) -> diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-phising-toolkit.md b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-phising-toolkit.md index 24de3c0..2b58863 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-phising-toolkit.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/lesson-phising-toolkit.md @@ -151,4 +151,4 @@ A robust defense against phishing requires both technology and vigilant users. ### Path -<- [Previous Lesson: Password Cracking](./lesson-passwordcracking.md) | [Next Lesson: Introduction to Binary Exploitation](./Binary-Exploitation.MD) -> \ No newline at end of file +<- [Previous Lesson: Password Cracking](/lesson-passwordcracking.md) | [Next Lesson: Introduction to Binary Exploitation](/Binary-Exploitation.MD) -> \ No newline at end of file diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/A-guide-to-port-scanning.md b/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/A-guide-to-port-scanning.md index 8c354f1..ecb6ab1 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/A-guide-to-port-scanning.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/A-guide-to-port-scanning.md @@ -8,7 +8,7 @@ next: "mac-address-changer" --- # IP & Port Scanning - + * **IP** stands for `Internet Protocol`. an IP address (IPv4 or IPv6) identifies a host on a network so packets can be routed to it. * **Ports** are numeric endpoints on a host that services listen on (for example, 80 for HTTP, 22 for SSH). A single IP can host many services distinguished by port numbers. @@ -66,7 +66,7 @@ What to look for * Pick the IPv4 address that belongs to your machine and note the subnet (e.g., `192.168.1.15/24 in the screenshot`). -![OUTPUT1](./../imgs/port-scanning1.png) +![OUTPUT1](/imgs/port-scanning1.png) --- @@ -94,7 +94,7 @@ nmap -sn 192.168.1.15/24 ``` * `-sn` = host discovery only -![OUTPUT2](./../imgs/port-scanning1.png) +![OUTPUT2](/imgs/port-scanning1.png) B) Full port range on localhost @@ -104,7 +104,7 @@ nmap -sT -p 1-65535 127.0.0.1 * `-sT` performs full TCP handshakes and is easy to understand for beginners. * Slow but useful to see everything listening on your own machine. -![OUTPUT3](./../imgs/port-scanning1.png) +![OUTPUT3](/imgs/port-scanning1.png) ### Before we proceed, install & start an SSH server so that we can see a real port open in the scan ```bash @@ -120,7 +120,7 @@ nmap -sT -sV --top-ports 50 192.168.1.15 * `-sV` probes services to guess software/version. -![OUTPUT4](./../imgs/port-scanning1.png) +![OUTPUT4](/imgs/port-scanning1.png) --- @@ -189,6 +189,6 @@ print("[+] Done") ### Path -<- [Previous Lesson: Binary Exploitation](../Binary-Exploitation.MD) --> [Next Lesson: Writing A MAC Address Changer](./lesson-1.md) +<- [Previous Lesson: Binary Exploitation](/Binary-Exploitation.MD) +-> [Next Lesson: Writing A MAC Address Changer](/lesson-1.md) diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/lesson-1.md b/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/lesson-1.md index b8e9509..dcd27db 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/lesson-1.md +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/python-for-eth-hacking/lesson-1.md @@ -9,7 +9,7 @@ next: "ids-probe-lesson" # Writing A MAC Address Changer - ![What is a MAC Address](./../imgs/What-is-MAC-Address.jpeg) + ![What is a MAC Address](/imgs/What-is-MAC-Address.jpeg) - MAC stands for `Media Access Control`. It is a permanent, physical and unique address assigned to network interfaces by the device manufacturer. - So, whether you have a wireless card or wired or ethernet card, each of them come with a specific address that is unique to the card, so there are no 2 devices in the world with the same MAC Address. @@ -27,7 +27,7 @@ next: "ids-probe-lesson" - Run `ifconfig` command on the computer. This will list all the interfaces available on the computer. When we say interface, we mean a network card. When we execute the command it shows `eth0` which is a virtual interface. - ![ifconfig output showing network interfaces](../imgs/Screenshot%202025-07-24%20at%204.58.09 AM.png) + ![ifconfig output showing network interfaces](/imgs/Screenshot%202025-07-24%20at%204.58.09 AM.png) - `eth0` is not real. It is created by the virtual box, because the VM is set to use a NAT network, by default. It thinks that it is connected to a wired network. All this is done using a Virtual Interface connected to the Virtual Wired Network. - We can also see `lo` which is also a virtual interface created by `linux`. @@ -58,7 +58,7 @@ next: "ids-probe-lesson" - Now, use `ifconfig` command again to check if the MAC Address has changed again or not. Now, if you look at the `ether` option of the `interface_name` we have been using so far, it's been modified to what we have set. - ![ifconfig output showing changed MAC address](../imgs/Screenshot%202025-07-24%20at%206.49.53 AM.png) + ![ifconfig output showing changed MAC address](/imgs/Screenshot%202025-07-24%20at%206.49.53 AM.png) - Following are the proof for proper execution of these statements: @@ -177,6 +177,6 @@ next: "ids-probe-lesson" ### Path -<- [Previous Lesson: IP & Port Scanning](./A-guide-to-port-scanning.md) +<- [Previous Lesson: IP & Port Scanning](/A-guide-to-port-scanning.md) diff --git a/UI/frontend/src/content/python-scripts/async_port_scanner.md b/UI/frontend/src/content/python-scripts/async_port_scanner.md index 335f9a2..767ca55 100644 --- a/UI/frontend/src/content/python-scripts/async_port_scanner.md +++ b/UI/frontend/src/content/python-scripts/async_port_scanner.md @@ -76,7 +76,7 @@ The script's execution flow is managed by the standard Python entry point: ### Screenshots -![async_por_scanner.py running](../imgs/async_port_scanner.jpg) +![async_por_scanner.py running](/imgs/async_port_scanner.jpg) --- diff --git a/UI/frontend/src/content/python-scripts/bettercap_arp_spoofing_script.md b/UI/frontend/src/content/python-scripts/bettercap_arp_spoofing_script.md index fd10081..b38d5e1 100644 --- a/UI/frontend/src/content/python-scripts/bettercap_arp_spoofing_script.md +++ b/UI/frontend/src/content/python-scripts/bettercap_arp_spoofing_script.md @@ -58,7 +58,7 @@ The script's execution is controlled by the `main()` function, which is called w ### Screenshots -![bettercap_arp_spoofing_script.py running](../imgs/bettercap_arp_spoofing_script.png) +![bettercap_arp_spoofing_script.py running](/imgs/bettercap_arp_spoofing_script.png) --- diff --git a/UI/frontend/src/content/python-scripts/https_data_fetcher_bettercap.md b/UI/frontend/src/content/python-scripts/https_data_fetcher_bettercap.md index c0af104..1044df3 100644 --- a/UI/frontend/src/content/python-scripts/https_data_fetcher_bettercap.md +++ b/UI/frontend/src/content/python-scripts/https_data_fetcher_bettercap.md @@ -63,13 +63,13 @@ The script follows a sequential, four-step flow managed by the `main` function ( ### Screenshots -![https_data_fetcher_bettercap.py running](../imgs/https_data_fetcher_bettercap.png) +![https_data_fetcher_bettercap.py running](/imgs/https_data_fetcher_bettercap.png) -![https_data_fetcher_bettercap.py running](../imgs/https_data_fetcher_bettercap1.png) +![https_data_fetcher_bettercap.py running](/imgs/https_data_fetcher_bettercap1.png) -![https_data_fetcher_bettercap.py running](../imgs/https_data_fetcher_bettercap2.png) +![https_data_fetcher_bettercap.py running](/imgs/https_data_fetcher_bettercap2.png) -![https_data_fetcher_bettercap.py running](../imgs/https_data_fetcher_bettercap3.png) +![https_data_fetcher_bettercap.py running](/imgs/https_data_fetcher_bettercap3.png) --- diff --git a/UI/frontend/src/content/python-scripts/ids_probe.md b/UI/frontend/src/content/python-scripts/ids_probe.md index 85699df..4b23792 100644 --- a/UI/frontend/src/content/python-scripts/ids_probe.md +++ b/UI/frontend/src/content/python-scripts/ids_probe.md @@ -62,11 +62,11 @@ The script's execution is controlled by the `main()` function, which is the stan ### Screenshots -![ids_probe.py running](../imgs/ids_probe.png) +![ids_probe.py running](/imgs/ids_probe.png) -![ids_probe.py running](../imgs/ids_probe1.png) +![ids_probe.py running](/imgs/ids_probe1.png) -![ids_probe.py running](../imgs/ids_probe2.png) +![ids_probe.py running](/imgs/ids_probe2.png) --- diff --git a/UI/frontend/src/content/python-scripts/mac-address-change.md b/UI/frontend/src/content/python-scripts/mac-address-change.md index 1444b47..b08669e 100644 --- a/UI/frontend/src/content/python-scripts/mac-address-change.md +++ b/UI/frontend/src/content/python-scripts/mac-address-change.md @@ -54,7 +54,7 @@ The script follows a standard Python entry point structure to ensure the main lo ### Screenshots -![mac_address_change.py running](../imgs/mac_address_change.jpg) +![mac_address_change.py running](/imgs/mac_address_change.jpg) --- diff --git a/UI/frontend/src/content/python-scripts/mitm_attack_automator.md b/UI/frontend/src/content/python-scripts/mitm_attack_automator.md index 41854b3..2c828d1 100644 --- a/UI/frontend/src/content/python-scripts/mitm_attack_automator.md +++ b/UI/frontend/src/content/python-scripts/mitm_attack_automator.md @@ -55,7 +55,7 @@ The script's primary control flow is managed within the `if __name__ == "__main_ ### Screenshots -![mitm_attack_automator.py running](../imgs/mitm_attack_automator.png) +![mitm_attack_automator.py running](/imgs/mitm_attack_automator.png) --- diff --git a/UI/frontend/src/content/python-scripts/portscanner_test.md b/UI/frontend/src/content/python-scripts/portscanner_test.md index d797fed..03b973d 100644 --- a/UI/frontend/src/content/python-scripts/portscanner_test.md +++ b/UI/frontend/src/content/python-scripts/portscanner_test.md @@ -54,9 +54,9 @@ The script's execution is initialized by the standard Python entry point, which ### Screenshots -![portscanner_test.py running](../imgs/portscanner_test.png) +![portscanner_test.py running](/imgs/portscanner_test.png) -![portscanner_test.py running](../imgs/portscanner_test2.png) +![portscanner_test.py running](/imgs/portscanner_test2.png) --- diff --git a/UI/frontend/src/content/python-scripts/remote_collect_via_ssh.md b/UI/frontend/src/content/python-scripts/remote_collect_via_ssh.md index 90b4265..330111d 100644 --- a/UI/frontend/src/content/python-scripts/remote_collect_via_ssh.md +++ b/UI/frontend/src/content/python-scripts/remote_collect_via_ssh.md @@ -76,11 +76,11 @@ The script initiates execution through the `main()` function, called by the `if ### Screenshots -![remote_collect_via_ssh.py running](../imgs/remote_collect_via_ssh.jpg) +![remote_collect_via_ssh.py running](/imgs/remote_collect_via_ssh.jpg) -![remote_collect_via_ssh.py running](../imgs/remote_collect_via_ssh2.jpg) +![remote_collect_via_ssh.py running](/imgs/remote_collect_via_ssh2.jpg) -![remote_collect_via_ssh.py running](../imgs/remote_collect_via_ssh3.jpg) +![remote_collect_via_ssh.py running](/imgs/remote_collect_via_ssh3.jpg) --- diff --git a/UI/frontend/src/content/python-scripts/wep_wifi_hacking.md b/UI/frontend/src/content/python-scripts/wep_wifi_hacking.md index 49c9907..8388d6a 100644 --- a/UI/frontend/src/content/python-scripts/wep_wifi_hacking.md +++ b/UI/frontend/src/content/python-scripts/wep_wifi_hacking.md @@ -65,7 +65,7 @@ The overall flow is: ### Screenshots -![wep_wifi_hacking.py running](../imgs/wep_wifi_hacking.png) +![wep_wifi_hacking.py running](/imgs/wep_wifi_hacking.png) --- diff --git a/UI/frontend/src/content/python-scripts/wordlist_generator.md b/UI/frontend/src/content/python-scripts/wordlist_generator.md index 38c3870..fb17624 100644 --- a/UI/frontend/src/content/python-scripts/wordlist_generator.md +++ b/UI/frontend/src/content/python-scripts/wordlist_generator.md @@ -73,9 +73,9 @@ The script's execution begins within the `if __name__ == "__main__":` block, whi ### Screenshots -![wordlist_generator.py running](../imgs/wordlist_generator.jpg) +![wordlist_generator.py running](/imgs/wordlist_generator.jpg) -![wordlist_generator.py running](../imgs/wordlist_generator2.jpg) +![wordlist_generator.py running](/imgs/wordlist_generator2.jpg) --- diff --git a/UI/frontend/src/content/python-scripts/wpa2_dictionary_attack.md b/UI/frontend/src/content/python-scripts/wpa2_dictionary_attack.md index 7ca8f8f..b1c9449 100644 --- a/UI/frontend/src/content/python-scripts/wpa2_dictionary_attack.md +++ b/UI/frontend/src/content/python-scripts/wpa2_dictionary_attack.md @@ -66,7 +66,7 @@ The script's primary control flow is managed within the `if __name__ == "__main_ ### Screenshots -![wpa2_dictionary_attack.py running](../imgs/wpa2_dictionary_attack.png) +![wpa2_dictionary_attack.py running](/imgs/wpa2_dictionary_attack.png) --- From d589128322e4ef9f37e4c24087a4713d35f750cf Mon Sep 17 00:00:00 2001 From: MULTi <78434796+MULTidll@users.noreply.github.com> Date: Mon, 13 Oct 2025 22:53:51 +0530 Subject: [PATCH 2/2] Fix command path in Binary-Exploitation.md Updated command to execute the binary with './poc' instead of '/poc' for correct path usage. --- .../content/MD_Content_ethical-hacking/Binary-Exploitation.MD | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD b/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD index 3184ea7..01d52f0 100644 --- a/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD +++ b/UI/frontend/src/content/MD_Content_ethical-hacking/Binary-Exploitation.MD @@ -135,14 +135,14 @@ int main() { 2. Run it with short input: ```bash - echo "Short input" | /poc + echo "Short input" | ./poc ``` Output: Normal execution. 3. Run with long input to cause overflow: ```bash - python3 -c "print('A' * 80)" | /poc + python3 -c "print('A' * 80)" | ./poc ``` This may cause a segmentation fault, as the overflow corrupts the stack.