The roles above each require a different, highly specialized body of knowledge. This website is a great resource for application security and penetration testing, but you should find other resources if you are interested in a different role.
Learn from a Book
-
Fortunately, there are dozens of good books written about each topic inside information security. Dino Dai Zovi and Tom Ptacek both have excellent reading lists. We recommend looking at:
+
Fortunately, there are dozens of good books written about each topic inside information security. Dino Dai Zovi and Tom Ptacek both have excellent reading lists. We recommend looking at:
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Find a CTF","level":"1.2.1","depth":2,"next":{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]},"previous":{"title":"Capture the Flag","level":"1.2","depth":1,"path":"intro/README.md","ref":"intro/README.md","articles":[{"title":"Find a CTF","level":"1.2.1","depth":2,"path":"intro/find.md","ref":"intro/find.md","articles":[]},{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"intro/find.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Find a CTF","level":"1.2.1","depth":2,"next":{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]},"previous":{"title":"Capture the Flag","level":"1.2","depth":1,"path":"intro/README.md","ref":"intro/README.md","articles":[{"title":"Find a CTF","level":"1.2.1","depth":2,"path":"intro/find.md","ref":"intro/find.md","articles":[]},{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"intro/find.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/intro/index.html b/docs/intro/index.html
index a90708e..725a9df 100644
--- a/docs/intro/index.html
+++ b/docs/intro/index.html
@@ -7,7 +7,7 @@
Capture the Flag · CTF Field Guide
-
+
@@ -448,7 +448,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Capture the Flag","level":"1.2","depth":1,"next":{"title":"Find a CTF","level":"1.2.1","depth":2,"path":"intro/find.md","ref":"intro/find.md","articles":[]},"previous":{"title":"Introduction","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"intro/README.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Capture the Flag","level":"1.2","depth":1,"next":{"title":"Find a CTF","level":"1.2.1","depth":2,"path":"intro/find.md","ref":"intro/find.md","articles":[]},"previous":{"title":"Introduction","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"intro/README.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/package.json b/docs/package.json
index 1f1164a..dddb156 100644
--- a/docs/package.json
+++ b/docs/package.json
@@ -12,7 +12,7 @@
"devDependencies": {
"grunt": "~0.4.1",
"grunt-gitbook": "0.4.2",
- "grunt-gh-pages": "0.9.1",
+ "grunt-gh-pages": "~0.10.0",
"grunt-contrib-clean": "~0.5.0"
},
"peerDependencies": {
diff --git a/docs/search_index.json b/docs/search_index.json
index a23a557..681a0ba 100644
--- a/docs/search_index.json
+++ b/docs/search_index.json
@@ -1 +1 @@
-{"index":{"version":"0.5.12","fields":[{"name":"title","boost":10},{"name":"keywords","boost":15},{"name":"body","boost":1}],"ref":"url","documentStore":{"store":{"./":["(ctf).","ahead,","along","apply.","area","attack","becom","behavior,","best","bit","book","book.","both","captur","case","challeng","chapters,","collabor","come","competit","competition:","comput","contact","creat","creation,","ctf","ctf,","defense,","demand,","design","detail","direct","disciplin","disciplines.","discovery,","distil","do.”","each","easier,","enough","enough;","even","everyth","evolv","exercises.","expert","expert.","exploit","field","field.","find","flag","focu","glad","go","goeth","guid","guidanc","help","here.","hope","ideal","industry.","internet’","introduct","johann","keep","learn","lecture.","lesson","live","look","major","make","materials.","measur","mind","more","need","next","now,","object","offense.","on","onlin","oper","past","peopl","profession","professional,","question","quickli","real","refer","relev","schedul","secur","short,","so,","structur","studi","succe","supplement","support","team","tend","that’","them.","there’","think","toolkit","tradecraft.","trail","tri","us.","von","vulner","walkthrough","want","want,","way,","welcome!","we’ll","we’r","we’v","whether","will","win","wolfgang","work","work.","world","wrote","you.","you’ll","you’r","“know"],"intro/":["appli","approxim","area","areas.","aspect","attack","captur","challeng","compet","competit","competition.","comput","constitut","creation,","ctf","ctf?","demand","difficult","disciplin","discovery,","discret","distil","drawn","due","educ","effici","emerged:","encapsul","essenc","exercis","expert","exploit","flag","flag’","focu","ideal","inform","interdisciplinari","make","management.","mani","measur","measurable.","merg","modern","nature.","object","on","oper","orient","particip","prepar","profession","professional.","rang","repres","scienc","secur","security.","short","singl","spirit","success","technolog","tend","them.","theoret","therefore,","toolkit","topic","tradecraft.","tri","vulner","way","work","‘captur"],"intro/find.html":["(ccdc)","(gits)","5k","academ","alway","anyth","appli","avoid","calendar","capctf","captur","ccdc?","challeng","cmu","collegi","come","compet","competit","competitions,","complet","corrupt","csaw","ctf","ctf!","cyber","defcon","defens","different?","disguis","else.","encourag","excel","exercis","exploit","favorites:","find","flag","focus","frustrat","fun","futur","ghost","goal.","harder","here","here:","high","hsctf","ictf","incred","keep","level","list","littl","made","mainli","micro","more","near","nyu","occur","ongoing.","opinion","organ","overthewir","pick","picoctf","plaidctf","play","poli","practic","principl","probabl","progress","recommend:","red","region","running,","same","schedule.","school","secur","shellcod","sign","similar","smashthestack","solv","start","student","teach","team","them.","themselv","though!","time","typically,","ucsb","unrealist","up","variations,","visit","want","wargam","way","week","year."],"intro/careers.html":["\"will","\"you","(ccdc)","(code","(common","(isc)2","(isc)2'","(mostli","(not","(nsa","(of","(offensive)","(opportun","(order","(see","....","500","[editor'","a)","abov","academ","academia).","acquir","actual","addit","administr","advic","advice.","afterward.","alon","alone.","analysi","answer","antiviru","anyth","apart","applic","appropri","architect","are:","argument","articl","ask","assessments)","at:","attach","attack","attend","attendees!","audits/app","automat","automation).","avail","avoid","awesome)","b)","bait","ball.","base","be","becom","before,","below","berkeley","bernstein","best","beyond","big","binari","bits,","blog","bodi","boneh","book","both","break","brows","bush","busi","business,","c)","calendar","call","can't","canon","capable.","captur","career","cases,","cash","center","certif","certification.","certified!\"","certified,","certified.","challeng","cheatsheet","choic","cissp","cities.","city,","citysec,","class","clear,","client","co","coast)","code","coe","coe)","colleg","collegi","commun","compani","company,","competit","competitions,","complianc","comput","concise,","confer","conference,","conference.","consist","consult","consulting.","conversational.","corner","cost","count","cours","courses,","cow","creat","cs","ctf","ctf,","current","cyber","cybersecur","d.","dai","dalla","dan","decis","dedic","defcon","defens","determin","develop","development.","differ","different,","dino","directed,","disguis","distract","do","don't","done","done.","down","dozen","drop","dure","each","earli","easiest","edit","educ","edward","else.","email","email.","emphasi","employ","enforc","engin","entir","ethic","even","exam","exampl","example,","excel","exercis","expect","experi","expert,","exploit","extern","fact,","factor","fantastic.","far","fast,","field.","final","financ","finance)","financi","find","firm.","first","five","fix","flag","focu","focus","follow","for,","forc","forens","forget","fortun","fortunately,","frame","friend","frustrat","fun","further","gain","gener","general,","get","give","go","go.","good","googl","govern","government).","graduat","gray","great","guid","guide).","guide.","guideline.","hack","hacker","hacking:","hand","hand,","handler","hard","harm","hat","have","help","high","highli","hire","hole","hovav","human","i'v","idea","identifi","idols,","ie.","im.","imho","in.","incid","incred","individuals,","industri","industry'","industry.","inexpens","inform","infosec","infragard","insid","instead","institut","instructor(s)","interest","intern","intro","involv","isc2","issa","issu","issues.","it,","it.","j.","job","jump","justifi","key","kill","kind","knowledg","knowledge.","languag","larg","law","leader","learn","less","level","limit","lin","link","list","list,","list.","lists.","littl","live","local","locat","long","look","lot","low","lowest","lure","mainli","maintain","major","malwar","manag","mani","materi","me?\"","mean","meet","meetup","mentor","mileag","milk","mine","miss","mit","modern","money","monthli","more","motiv","moyer","moyer'","much","myth","name).","nathan","need","network","network+","neutral","never","new","newer","newest","next","no.","non","nop,","normal","note","note:","nsa","nysec.","o'reilli","o'reilly.","obsess","obtain","occur","offens","offer","older","on","onc","ones.","online.","opinion","organization:","organized.","others,","out","over","owasp","paid","paper.","part","particular","pay","penetr","pentest.cryptocity.net","pentesting,","peopl","persuasive.","phone","piec","pitch,","play","point","polici","policy,","pop","possible.","post","practic","present","primarili","principl","probabl","problem","problems.","process","processes,","product","profession","program","programmer,","promis","proof","provid","ptacek","publish","put","qualiti","rais","read","realli","reason","recommend","red","reddit","reduc","reflect","region","relat","remember,","requir","research","resourc","rest","resume,","revers","reversing,","risk","rittenhous","role","role,","role.","role/employ","roles:","rpi","rpisec","said,","sale","sales.","scale","school","scienc","science.","score","script","search","secur","security+","security,","security.","select","sell","set","shacham","shawn","shortcut","similar","similarly,","simul","sizes),","skill","slot.","small","smart","softwar","solv","solve.","someth","sometim","somewher","speak","speaker'","speaker.","special","spend","spent","split","staff","stand","stanford","stay","still","student","studi","subject.","sure","system","take","talk","teach","team","teams,","tech","technic","technical)","technolog","technologist","technologists,","tell,","term","test","tester","testing,","them.","themselv","theoret","thing","think","those","though.","thought","thread","through","time","tip","tml","tom","topic","trail","train","tri","troubl","two","ucsd","uic","umd","uncertain","understand","univers","university,","unix","up","updating.]","upper","us","users.","usual","ut","valu","value.","variations,","variou","vary.","vendor","view","volum","vrt:","vulner","want","wargame.","water","way","web","websit","weekend:","well","west","whether","without","won't","work","works,","worri","worst","write","write.","written","x","xyz","yang","year","york","you'r","you'v","yourself","z.","zhiqiang","zovi"],"vulnerabilities/":["discoveri","vulner"],"vulnerabilities/source.html":["/epan/dissectors/","1.8.5","10","1998.","6:","accur","achiev","allow","analysi","analysis.","analyst","analyz","analyzer,","api","app","appli","applic","articl","attach","attack.","attacks.","audit","auditing,","auditor","authent","available.","base","below","below.","between","bug","c","c++.","capabl","cases,","cases.","chapter","clang","code","code.","codebas","codebase.","collect","come","common","commonli","compil","complet","complic","comput","continu","control","data","defeat","design","details.","develop","dif","differ","discov","display","dissector","do","doesn't","down","due","each","easi","easier","end","engin","error","errors.","essenti","exampl","execut","exist.","experi","fail","familiar","far","fewer","file","find","flaw","flow.","folder.","format","found","free,","gain","gera'","get","go","help","histor","hope","however,","identifi","ii","includ","independ","industri","inform","insecur","instal","integ","intention","intern","intim","issu","it.","known","languag","larg","learn","lectur","level","libfreetyp","libpng,","libpoppler,","librari","libraries.","libxml,","list","locat","look","lot","machin","make","mani","manifest","mastery.","meld","modul","more","move","much","name","nativ","navig","network","never","new","newspap","on","open","option","order","origin","out,","overflow","packag","page,","pars","parti","pattern","patterns.","pay","potenti","practic","primer","process","processor","profil","program","programm","project","prone","protocol","protocols.","quickli","read","real","recommend","relationships,","remot","resourc","revers","rigor","same.","scitool","secur","see","server","signific","simpli","skills,","small","softwar","sourc","standard","static","still","strongli","such","sure","system.","take","tantamount","taossa","target","them.","third","through","tool","tools,","toy","track","transform","two","under","understand","understand,","updat","us","usage,","user","variant","version","vulner","vulnerabl","warn","way","wireshark","wireshark,","without","workshop","write","written","you’r"],"vulnerabilities/binary.html":["\"basic","\"comput","\"ultimate\"","(cs:app)","(gdb)","(link","(switches,","(we","3","32","3:","80’","above,","acquir","addit","aim","alert,","allow","alter","amd","amd64","analyz","and,","anoth","anti","appear","arm,","around","aspect","assembl","audit","basic,","becom","behavior","between","binari","bit","blocks\"","bomb","bomb.","bombs.”","both","breakpoint","c","capabl","captur","case","challeng","chapter","cheat","cheatsheet","check","chosen","chunk","cmu","code","code.","command","common","compil","compilation”","complet","complic","comput","conditionals,","construct","contents.","control","correspond","corruption,","covers.","cs:app","current","data","daunt","day","debug","debugg","debugger.","dedic","defin","demo","deriv","desktop","develop","differ","disassembl","disassembler.","disassembler:","discret","distribution.","divid","down","each","easi","eight","employ","encount","end","engin","essenti","examin","example,","exercises.","exist","expect","familiar","finally,","find","first","flag","flavor","flow","flow.","focu","focus","follow","forc","found","fragment","function","further","gdb","gener","give","glance.","gnu","go","goal.","good","guid","handi","helpful.","hide","high","higher","ida","identifi","industri","input","insight","instruct","intel","intel).","intent.","interact","interpret","introduct","involv","itself.","keep","knowledg","lab","labs.","languag","language.","layer","layer,","learn","lectur","less","level","linux","list","lists,","liu","loops)","loops,","machin","made","make","manag","mani","manifest","manual","manual:","market.","master.","mean","memori","mips,","modifi","modul","more","nativ","obfusc","onc","oper","out","packag","painless","perform","person","perspect","perspective\"","phase","point","power","powerpc","predomin","presenc","pro","pro.","process","process,","processor","produc","program","program'","programm","programmer'","progress","provid","pull","purpos","quick","quinn","read","recommend","refer","reference.","regist","represent","requir","resourc","result","revers","rpi","run","saniti","secret","see","seri","server","set","sever","sheet","softwar","solv","sourc","sparc.","stage","standard","state","statement","strategi","structur","studi","subdivid","success","system","systems.","systems:","techniqu","them?","through","today","too.","tool","track","transform","trees)","trick","two","understand","understanding,","univers","us","variou","video","virginia.","want","way","we'v","well","we’r","wikibook","windbg","work","workshop","x86","x86.","you’v","“binari","“defuse”","“revers"],"web/vulnerabilities.html":["\"crimewar","(dvwa)","(pw:","10","3","access","administr","allow","app","applic","applications!","applications.","attack","attent","audit","auditing.","authent","avail","base","broken","browser","burp","bwa","case","challenges.","chapter","click","code","collect","command","common","commonli","complet","compromis","compromises.","contain","control","crimewar","crimin","damn","download","dvwa","dvwa,","dvwa.","easi","end","enough","ensur","exploit","familiar","featur","feel","find","flaw","found","free","fundement","gain","get","give","go","gui.","hack","hosted.","hosts.","html,","http","http,","identifi","ii","implement","includ","infected)","input","intend","introduct","kit","kit.","lectur","level","local","machin","made","manag","mani","massiv","master","materi","material.","method","methodolog","modul","module.","more","move","need","onc","order","over","owasp","pack","pack\"","packag","panel","panel,","part","pay","penetr","perform","php","php.","point","post","practic","pre","primer","process","proxi","recommend","resourc","run","section.","secur","serv","server","sever","siberia","siberia'","simpl","simplifi","skills,","sourc","start","successfulli","suit","tactic","take","tangl","task","test","tester","testing,","testing.","thing","through","tool","top","tri","understand","us","varieti","version","virtual","vmware","vulner","vulnerabilities,","walkthrough.","web","web:","webapp","welcom","well","workshop","workshop.","wrong"],"exploits/":["creation","exploit"],"exploits/binary1.html":["(32","(like",".gdbinit","1","101","101,","102","102,","12346.","12347.","14.04","32","about.","abus","achiev","actual","administrator.","advanc","advantag","allow","anoth","api","applic","apt","arbitrari","attack","attacker.","attempt","attempt,","attent","available.","background","basic","binari","binaries.","bit","bit)","both","boundari","browser","buffer,","bug","c","call","catalogu","cert","challeng","challenge,","challenge:","challenges,","chang","check","child","choosing.","clone","code","code,","code.","come","command","commands:","commonli","compil","compromis","comput","contain","context","control","convent","corrupt","corruption.","cover","critic","data","debug","defens","desktop","develop","differ","difficult","directori","disassembl","each","easi","easy,","elev","end","error","exampl","execut","explan","exploit","exploitation.","file","find","first","flag","flag.","flavor","flow","focu","folder","follow","for.","fork","format","free","function","gdb","gef,","git.","go","goal","goal.","guess","helpful,","hijack","home","host.sh","however,","identifi","import","includ","inform","information.","insid","instal","instruct","integr","intel","intend","it'","know","lectur","lecture,","level","linux,","listen","local","look","low","machine.","make","mani","manipul","memori","misus","mode","modul","more","name","need","note","obtain","onc","open","oper","order","others,","overflow","particular","path","pay","peda,","perform","permiss","player,","port","privileg","process","program","program,","program.","programs,","project","provid","provided.","quick","read","recommend","rememb","remot","repositori","resourc","rewrit","run","running,","same","second","security:","send","server)","servers,","set","set.","setup","similar","size","socat","socat.","social","softwar","sometim","sourc","specif","standard","start","state","step","store","string","strip","subvert","success.","such","sudo","supported.","sure","symbol","system","take","techniqu","termin","them.","then,","three","through","tool","topics,","translat","tri","trust","ubuntu","ultim","unix/linux","us","used.","user","varieti","veri","verifi","violat","virtual","vmware","voltron","vulner","way","web","well","window","windows.","within","without","work","workshop","workshop,","x86","you'll","you'r","you,","you."],"exploits/binary2.html":["(32","(between","(linux","(rop)","*nix.",".rodata,","12345.","12348.","12349.","14.04","2","64","abus","access","achiev","address","aid","alreadi","already,","and,","applic","attack","bc","becom","binari","binutil","bisc","bit)","blog","borrow","bridg","brute_cooki","buffer","build","bypass","chain","challenge:","chunk","clone","code","code.","college:","consid","continu","corelan","cours","cover","creat","creation","dartmouth","data","data.","detail","directori","disallow","disassembl","discoveri","discuss","each","end","engin","entir","etc).","examin","example,","execut","exist","exploit","exploit.","extens","familiar","favorable.","file","flags.","flexibl","focu","folder","format","fragment","frequent","gadget","go","goal.","greater","haven't","helpful.","host.sh","identifi","insid","instal","instruction.","instructions,","introduc","it’","keep","last","layout","lectur","lesson,","lesson.","lib(c)","link","listen","locat","look","machin","make","manag","manpag","manufactur","memori","method","mind","module,","more","much","multipl","nativ","necessari","need","new","nm","objcopy,","objdump,","occasionally,","on","orient","others,","overflow","packag","payload","port","previou","privaci","process","program","program.","programs.","protect","provid","provided.","random","re","read","readelf,","refer","repository.","requir","resourc","return","reus","revers","rop","rop.","rop?","rop_mix","ropgadget","rp","run","same","secur","sever","shellcod","similar","simpl","snippet","sometim","sourc","space","special","specif","specific)","standard","stitch","string","strings,","suit","suitabl","surgic","team","techniqu","them.","time","times,","togeth","tool","two","ubuntu","uncontrol","unorthodox","upon","us","use.","virtual","vulner","want","way","week","week,","week.","without","workshop","write","written","x86","‘gadgets’"],"web/exploits.html":["(beef)","10","10.","3","achiev","applic","application.","around","audit","avail","basic","beef","browser","burp","capabl","challeng","chapter","cheesi","chrome","class","code","code.","comfort","consol","cover","csrf,","dev","develop","directori","dive","each","effect","end","exampl","exercis","exercise.","exploit","find","focu","follow","framework","fun","gain","googl","google.","greater","gruyer","gruyere,","hints,","hook","host","identifi","includ","injection,","insist","interact","learn","lectur","look","mani","map","master","method","modul","module.","more","more.","need","now","on,","owasp","patch","pay","php","play","pleas","power","previou","primer","proxi","refer","revers","section","security,","shell","small,","sourc","specif","sql","suit","tactic","tangl","task","those","through","tool","top","train","travers","tri","ultim","understand","up","user","veri","vulner","vulnerabilities.","web","web:","webapp","with.","works.","workshop","xss","xss,"],"forensics/":["\"'","\"=\"","\"autopsy,\"","\"black","\"chunks\"","\"cover","\"export","\"file","\"filters,\"","\"forensics\"","\"hidden","\"increment","\"insid","\"magic","\"objects\"","\"offic","\"packet","\"plaintext","\"profile\"","\"raw","\"rb\")","\"suspicious\"","\"wb\")","\"xmp\"","\"zipcrypto\")","$","$5,000","$iccpicc","%temp%","'\"0x%08x","'rb').read())","(\"hello","(0","(0x00","(2d","(a","(a.k.a.","(although","(and","(binary)","(both","(byte","(discuss","(disk","(e.g.,","(especi","(file","(fix","(for","(from","(if","(ir).","(it'","(jar","(jpg,","(lsb)","(made","(not","(objects).","(oper","(or","(packet","(pcap)","(pcap,","(pil)","(rtf,","(see","(text","(the","(unless","(vba","(when","(with","(zip,",".","...","/","/mnt/challeng","0's,","0.960","00","00000000","00000010","00000020","00000030","00000040","010","02","04:00","05","06","08","09","0a","0c","0d","0x00000608","0x00006966","0x0a1a0a0d","0x0d000000","0x180000a4","0x43434950","0x43436924","0x474e5089","0x52444849","0x60'","0x6f725020","0x7f,","0x88020000","0xc93d4000","0xca050000","1'","10.53","100","101","101010101,","108","1080,","111","114","12","1335205","13:19:58","1482","1482x648","18","1920","1])","1a","2","20","2008","2011","2017:06:13","2017:06:17","21,","22:34:05","24","255","256,","32","36","38","39","3:","3d","40","40668937","41","43","44","47","48","49","4e","5","50","50mb,","52","55","58","5d","64","648","65","66","67","68","68656c6c6f20776f726c64210a","69","6c","6f","71","72","750","767787","77","79","7z","7z,","8","8,","85","87","88","89","89504e47","9,","95","99","9e","9f",":","=",">",">>>","[content_types].xml","_rel","_rels/.rel","a4","abil","about.","abov","above,","abus","accept","access","accompani","activity.","actual","additionally,","adob","adobe'","advantag","ae","affect","aforement","again","again).","again,","against","agvsbg8gd29ybgqh","aka","albertini","albertini.","all).","all,","alpha","alphanumer","alreadi","also,","alter","altern","although","alway","amount","analysi","analysis,","analysis.","analyst","analyz","and/or","ang","anim","anoth","anyon","anyth","app.xml","appeal","appear","appl","appli","approach.","archiv","archive,","archive:","area","artifact.","artifici","ascii","ascii),","ascii.","aspect","associ","assum","at.","attack","attack\"","attacker\"","attempt","attent","attribution,","audac","audio","audio,","author","avail","avoid","awar","background","bad","barcodes),","base","base64","basi","becam","becom","befor","beginn","behavior","behavior.","behind","believ","belong","best","better","between","bewar","beyond","bgrep","binari","binwalk.","bit","bit/color","bmp,","bootstrap","both","brain","breakpoint","broad","broadli","brows","brute","bs=1","buffer","bust","byte","bytearray","bytearray(b\"hello","bytearray(b'\\x00\\xff')","bytearray(open('challenge.png',","bytearray.fromhex(u'00","bytes\")","bytes,","bytes,\"","bytes:","c","c7","c9","ca","call","camera","capinfo","captur","capture)","capture),","capture.","carefulli","carv","carving\"","carving,","carving.\"","case","categori","category).","category,","category.","caution","cd","certain","certainti","challeng","challenge).","challengefil","challenges,","challenges.","challenges:","chang","channel","charact","characterist","charset","check","checksums,","chrome","chunk","cleverli","close","closely.","clue","clues.","cmm","code","code,","code.","color","come","command","command.","command:","comment","comments.xml","commerci","common","common.","commun","compar","compat","compil","complex","complic","complicated,","compound","compress","compressed,","compression,","comput","conceal","concept","confession.","configurations,","confirm","confus","connections,","connections.","consid","consist","contain","contain,","content","content,","content.","contents,","contents.","context","context,","conveni","convers","convert","convert,","converter,","coordinates,","copi","copyright","core.xml","correct","correctly.","corrupt","count=40668937","countermeasures.\"","cours","course,","crack","craft","creat","crimin","crop,","crypto","cryptography),","cryptography,","ctf","ctf,","ctfs.","curv","custom","d","da","damag","data","data\"","data,","data.","data:","databases,","date/tim","day.","dd","de","debug","decod","decompil","decompress.","deeper,","defin","deflate/infl","delet","depth","describ","detail","detect","determin","devic","devices,","didier","differ","difficulti","dig","dimensions,","directli","directly,","directori","disconnect","discret","discuss","disk","disk.","display","dissect","dissector","distribut","do","do.","doc,","docprop","docprops/app.xml","docprops/core.xml","docprops/thumbnail.jpeg","document","document,","document.xml","document.xml.rel","document:","documents:","docx,","domain","don't","done","down","down,","download","dozen","dpkt","draw","dtmf","dump","e","e6","e7","each","easi","easiest","easili","echo","edit","editor","editor,","ef","effect","else,","elsewhere,","emb","embed","embedded,","emerg","employ","enabl","encod","encoder/decod","encoding,","encoding:","encodings,","encodings.","encrypt","endpoint","enforc","enjoy","enough","entir","environ","environments,","especi","etc).","etc.","ethscan","even","everyth","everything,","evid","evidentiari","exact","examin","exampl","example.docx","example2","example2[1]","excel","execut","executed.","execution.","exhausting).","exif","exiftool","exiftool)","exiftool.","exist","exist.","expel","expens","experi","experience.","explain","exploit","explor","export","expos","ext3","ext4","ext4)","extend(),","extens","extern","extract","extracting:","extraordinarili","extrem","extundelete.","f","f).","f.close()","f.read()","f.write(s[::","f8","fact","familiar","fat","fcrackzip","featur","ff","ff')","ffmpeg","ffmpy.","field","fields,","file","file'","file,","file.","file:","filenam","files),","files,","files.","files:","filesystem","filesystem,","filesystem.","filesystems)","filesystems,","filesystems/registries,","filetyp","filetype.","filetypes,","filter","find","firefox","firmwar","first","fix","flag","flag)","flag.","flash.","flat","folder","follow","following,","fonttable.xml","fooled.","for,","forc","foremost,","foremost.","forens","forensics,","format","format,","format.","format:","format;","formats,","formats.","formerli","frame","framework","framework.","free","friendli","full","fun,","fun.","function","fundament","further","game","garbl","gather","gathered),","gear","gener","generation\"","gif","gif,","gimp","github","give","given","glance,","go","goal","gold","good","gp","graphic","grep","grep,","guess","guid","hack","hacker","hand","happen","harder","hardli","hat","have","haystack","header","headers),","headers.","headstart.","hear","height","hello","help","help,","here","here,","here.","here:","heurist","heuristic,","heuristics,","hex","hex:","hexadecim","hexdump","hexdump,","hexdump.","hexdump:","hexidecim","hidden","hide","hierarchy.","high","highlight","histor","histori","history,","hopefulli","however,","html,","http","http://www.nirsoft.net/utils/alternate_data_streams.html.","hue/saturation/lumin","huge","ida","idea","ideal","ident","identif","identifi","identify,","iend","if=./file_with_a_file_in_it.xxx","ihdr","illustr","imag","image,","image.","image/png","image:","imagemagick","implement","import","imposs","inc.","incid","includ","include:","incorpor","incrimin","independ","indic","indirect","individu","industry,","inflating:","inform","initi","inod","input.zip","insert(),","insid","instal","instance,","integ","integrity.","intention","interest","interfac","interface,","interference,","interlac","introductori","invaluable.","involv","ir","is.","iso9660","it'","it,","it.","itself.","javascript","job","jpg","jpg,","jump","kaitai.","kb","keep","keys,","keyword","kind","kit","know","known","lack","languag","larg","larger","latter","law","layer","leads,","learn","length","less","lesser","level","libari","libmag","libmagic,","libpcap).","libr","librari","library).","licens","line","line:","link","link)","linux","linux,","list","list:","littl","local","locat","logs,","longer","look","look.","loss","lossi","lossless","lot","love","low","lsb","maco","macos).","macro","macro,","macro://./standard.module1.mymacro","made","magic","major","make","malici","maliciousness:","malwar","man","mani","manipul","manipulations)","manual","manufactur","map","markdown),","marker","master","mastroshka","materi","matters,","mdl","mean","media","mediainfo","megapixel","memes,","memori","memory,","mention","messag","message.","metadata","metadata,","metadata.","method","methods.","microsoft","microsoft'","mime","mind","mine","miner,","mislead","miss","mkdir","mod","mode:","model","modif","modify,","modul","more","more.","mors","mount","mp3)","mp4)","much","multimon","multiplex","mutabl","mysteri","n","name","narrow","nativ","natur","ne","need","needl","network","new","newer","next.","ng","ngrep.","non","not),","note","nothing.","notic","novelti","now","now,","now.","nsa","ntfs,","number","numbering.xml","numbers\"","o","obfusc","object","objects\"","obscur","obsolet","occasion","occasionally,","occupi","ocean","of=./extracted_file.xxx","offer","offic","office:","officedissector","offset","offset),","offsets.","offsets:","ol","ole,","oletools.","on","on.","onc","ones,","ones.","onlin","online,","only.","ooxml","ooxml)","open","open('itsreversed',","open('reverseit',","oppos","option","order","origami.","origin","os","others,","otherwis","ought","ourselves,","out","output","output,","output.zip","outsid","outweigh","overlap","overview","own.","p","packag","packet","packets,","packettot","pad","paper.","pars","parser,","part","partial","particip","particular","particular).","particular,","partit","partition),","password","passwords,","past","path/to/test.docx","patterns,","paus","payload","pcap","pcapfix.","pcapng","pcapng)","pcapng:","pdf","pdf,","peepdf,","percentages.","perform","permiss","phish","photo","pick","piec","pillow.","pipe","pitfal","pixel","place","place.","plain","platform","platforms.","play","play,","playback","playback.","player","player.","plu","plugin","png","png)","png.","pngcheck.","pngtool","pop(),","popular","possibl","possible).","power","powershel","ppt),","pptx).","practic","practiction","premier","prepar","preponder","present","present).","present,","present.","previou","pride","primari","primit","print(c)","pro","probabl","probably:","process","processes,","processing:","profession","profil","program","program;","programmat","programming,","prohibit","proprietari","protect","protocol","protocols,","provid","pro|","public","publicli","puzzl","puzzles.","python","python'","python)","python,","python.","qpdf","qr","qrtool","quick","quickli","r","rang","rar","rar,","rare","rather,","ray","re","read","readme.md","real","realist","realli","reassembl","receiv","recogn","recommend","recommended.","reconstruct","recov","recover/reconstitut","reduc","refer","regardless,","regex","relat","relev","remot","remove(),","repair","repres","represent","requir","requisit","resize,","resourc","respond","respons","response.","rest","restor","retain","reveal","reverse(),","reverse,","rgb","rgba,","risk","role","rom","routine,","rtf,","rubi","run","runtim","rw","s","s:","same","save","scalpel,","scenario","scenario,","scheme","schemes.","scope","screenshot.png","screenshot.png:","script","scripts).","scripts.","search","search,","second","secret","secret.","section","secur","see","see,","seek","seemingli","seen","separ","sequenc","seri","servers)","servic","session","set","settings.","settings.xml","sever","shellcode,","show","signific","simpl","simpli","singl","site","size","size)","skill","skip=1335205","sleuth","sleuthkit","slow","smartphon","smuggl","snapshot","snort.","so,","soffic","solv","someth","sometim","somewhat","somewher","sonic","sophist","sophisticated,","sourc","source,","sox","space","space.","speaking,","special","specif","specifi","spectogram","split(),","sql","squashf","ssl","start","static","static).","statist","steganograph","steganographi","steganography,","stegonagraphi","stegsolv","step","steven","stick","still","store","str","strategi","strategy,","stream","streamed;","streams.","string","strings,","strings.","strings:","strong","structur","structured,","structures,","studi","style","styles.xml","styleswitheffects.xml","sub","submit","substitut","such","suffice,","suffix","suit","suitabl","support","suppos","suspect","synonym","syntax,","system","system,","systems'","t","tables,","take","tar","task","task,","tasks,","tasks.","tcpdump","tcpxtract,","teaser","technically,","techniqu","techniques,","templated)","term","testdisk:","text","text\"),","text,","text,\"","text.","tgz","tgz)","that,","them,","them.","theme","theme1.xml","themselv","there'","these,","thing","third","this.","those","threat\"","three","through","thumbnail","thumbnail.jpeg","time","timelin","times,","titl","tl","togeth","toler","tone","too.","tool","tool,","tool.","toolkit","tools,","tools.","toolset","toward","trace","tradit","traffic","traffic,","transfer","transform","transmit","tree","tri","triag","triage,","trick","trickeri","tricks.","trid","trope","truncated:","tshark,","two","type","type,","typic","u2ei4hb","ultim","unalloc","uncov","undelet","under","understand","unencrypted/uncompress","unfamiliar","unicod","uniqu","unix","unlik","unnotic","unpack","unravel","unrel","unus","unzip","up","url,","us","usage.","used,","useful.","user","users,","usual","utf","v","valu","variabl","varieti","variou","vba","veri","verifi","version","vessel","video","view","view,","visibl","visual","visualis","vm).","vm.","vmware","volatil","volatility.","volume,","vs","vulner","want","wast","watch","wav,","waveform","waveforms,","way","we'll","we'v","weakness.","web","web,","websettings.xml","well","whatev","wherein","whether","which,","white","width","wiki","window","windows,","wirepy.","wireshark","wireshark'","wireshark,","wireshark.","within","without","wonder","word","word/_rels/document.xml.rel","word/comments.xml","word/document.xml","word/fonttable.xml","word/numbering.xml","word/settings.xml","word/styles.xml","word/styleswitheffects.xml","word/theme/theme1.xml","word/websettings.xml","work","work,","world","world!","world!\")","world\")","world,","world.","world\\!","worth","write","written","wrote","x","xls,","xlsx,","xml","xml\"","xplico","xxd","years,","years.","yet?","you'r","you.","zero","zip","zip,","zipdetail","zipinfo","zlib","zsteg.","|","|....$iccpicc","|.............@=.|","|.g..q..a.y.....9|","|.png........ihdr|","|file..x..y.8u]..|","–","│","└──","├──","😉"],"toolkits/":["creation","toolkit"],"toolkits/prep.html":["(python)","(ruby)","achiev","aggreg","allow","autom","awar","awareness.","begin","case","code","collaboration.","collaboratively,","common","commun","creat","creation.","ctf","develop","document","download","dure","easi","effectively,","effici","enabl","exploit","exploitation,","fill","find","first","forc","function","functionality.","game","gap","goal","good","ida","ideal","import","inadequ","incorpor","key","lectur","list","lists.","manag","manner","maxim","member","meterpret","methods.","minim","modul","multipli","nasm","neglect:","network/host","oper","order","organ","out.","outlin","overview,","particip","payload","persist","play","popul","possible.","prep","provid","provide.","pwni","pyershark","python","rank","resourc","return","ronin","rootkit","round","rtfn","second","secur","set","situat","soc","softwar","spend","stealth","stealthi","studi","submission.","support","task","team","third","three","time","time.","toolkit","toolkit.","toolsmith","two.","us","use.","util","welcom","well","work","workshop"],"tradecraft/":["oper","tradecraft"],"tradecraft/case_studies.html":["&","(ex:","(infrastructure,","8","9","action/cap","action/capability?","actor","ama","ama'","anomalus?","apt1","apt28","attack","behind","below","brief","campaign","campaigns.","careto","case","chose","competit","ctf","cultiv","cyber","decis","defend","design","detect","discuss","display","dure","each","element","employ","etc.)","evad","evalu","examples,","exploit","exploits)","exposure.","extraordinarili","few","fit","flaw","focus","follow","gener","glimps","goal","group","groups,","histori","identities,","inadvert","interest","it.","learn","lectur","made?","mind.","mistak","offens","oper","operate.","organ","parlement","perform/impl","philosophi","philosophy?","plaid","play","post","protecting?","provid","public","put","pwning","rare","resourc","rest","risk","samurai","secur","shortsight","specif","standpoint?","studi","stuxnet","talent","thing","think","tool","toolkit","tools,","tradecraft","tradecraft.","tradecraft:","us","wargam","way?","workshop","x"],"contrib.html":["./myrepo","./myrepo.","admiration.","alex","alway","ambition,","anderson","andrew","app","audit","avail","binari","book","branch","brandon","build","built","changes.","chapter","check","collabor","command","commit","complet","concentr","content,","contribut","contribution,","contributor","convert","convert.","cours","creat","credit,","ctf","ctfs,","cybersecur","dai","deliv","develop","development.","digit","dino","directory:","ebook","ebook:","editor","edward","elsewhere.","evan","exploit","f","fantast","feedback","few","field","folks,","forens","frequent","g","ga","gener","git","gitbook","gitbook,","gotham","gratitud","guid","hacker","happen","hard","help","html","improv","initi","instal","installed,","interactive,","interest","introductori","jay","jensen","know","lectur","lesson","line","list.","littl","look","lot","made","make","marcin","markdown","markdown.","master","mike","modul","more,","myer","nearli","need","new","newspap","nick","nodej","npm","numer","nyu","offer","on","oper","out","output","page","page.","pdf","pdf,","pdf.","pdf:","permiss","pleas","plugin","plugins:","poly.","preview","printabl","program.","propos","provid","ran","reach","reader,","readi","refin","republish","requir","resid","review","rop","ruef","run","scienc","secur","send","simpli","singl","single,","slide","so,","someon","sotirov","sourc","static","still","suggestions!","support","sure","system,","take","talent.","there.","through","tool","us","usag","w","want","we'll","we'r","web","website:","within","without","work,","you'r","you’r","you’v","zovi"]},"length":18},"tokenStore":{"root":{"0":{"0":{"0":{"0":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{}},"1":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"3":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"4":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}},"1":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"4":{"docs":{},":":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"docs":{}},"docs":{}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{},"'":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"9":{"6":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"x":{"0":{"0":{"0":{"0":{"0":{"6":{"0":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"6":{"9":{"6":{"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},"a":{"1":{"docs":{},"a":{"0":{"docs":{},"a":{"0":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"docs":{}}},"docs":{}},"d":{"0":{"0":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"1":{"8":{"0":{"0":{"0":{"0":{"docs":{},"a":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"4":{"3":{"4":{"3":{"4":{"9":{"5":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"6":{"9":{"2":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"7":{"4":{"docs":{},"e":{"5":{"0":{"8":{"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"5":{"2":{"4":{"4":{"4":{"8":{"4":{"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"6":{"0":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"f":{"7":{"2":{"5":{"0":{"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"7":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"8":{"8":{"0":{"2":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},"c":{"9":{"3":{"docs":{},"d":{"4":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{},"a":{"0":{"5":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}}}},"1":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"1":{"0":{"1":{"0":{"1":{"0":{"1":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"2":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"8":{"0":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},".":{"5":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"1":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"3":{"4":{"5":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"6":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"7":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"8":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"9":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"3":{"5":{"2":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},":":{"1":{"9":{"docs":{},":":{"5":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"4":{"8":{"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"x":{"6":{"4":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{},".":{"0":{"4":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"docs":{}},"docs":{}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"9":{"8":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"docs":{}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3360287511230906}},".":{"8":{"docs":{},".":{"5":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"docs":{}}},"docs":{}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"]":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"2":{"0":{"0":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"1":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{},":":{"0":{"6":{"docs":{},":":{"1":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"1":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"2":{"docs":{},":":{"3":{"4":{"docs":{},":":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"5":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.3367463026166093},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"2":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"4":{"0":{"6":{"6":{"8":{"9":{"3":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"5":{"0":{"0":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"m":{"docs":{},"b":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"6":{"4":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"6":{"5":{"6":{"docs":{},"c":{"6":{"docs":{},"c":{"6":{"docs":{},"f":{"2":{"0":{"7":{"7":{"6":{"docs":{},"f":{"7":{"2":{"6":{"docs":{},"c":{"6":{"4":{"2":{"1":{"0":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}}},"docs":{}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},":":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"7":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"5":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"6":{"7":{"7":{"8":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},"z":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"8":{"0":{"docs":{},"’":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"9":{"5":{"0":{"4":{"docs":{},"e":{"4":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"9":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"(":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"x":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"2":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"3":{"2":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"docs":{}},"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{},")":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"c":{"docs":{},"d":{"docs":{},"c":{"docs":{},")":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"o":{"docs":{},"d":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"m":{"docs":{},"m":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"s":{"docs":{},":":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"g":{"docs":{},"i":{"docs":{},"t":{"docs":{},"s":{"docs":{},")":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}},"d":{"docs":{},"b":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},")":{"2":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"docs":{}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"r":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"f":{"docs":{},"r":{"docs":{},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}}}}}},"m":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165}}}}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"o":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"o":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"p":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"u":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"k":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"s":{"docs":{},"b":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"h":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{},"v":{"docs":{},"w":{"docs":{},"a":{"docs":{},")":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},"u":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"docs":{},"w":{"docs":{},":":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"l":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"b":{"docs":{},"e":{"docs":{},"t":{"docs":{},"w":{"docs":{},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"e":{"docs":{},"f":{"docs":{},")":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"y":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"o":{"docs":{},"p":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"t":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"b":{"docs":{},"y":{"docs":{},")":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"\"":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{},"k":{"docs":{},".":{"docs":{},"a":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"e":{"docs":{},".":{"docs":{},"g":{"docs":{},".":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"x":{"docs":{},":":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"j":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"h":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"u":{"docs":{},"n":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"v":{"docs":{},"b":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{},"h":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}},"l":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"w":{"docs":{},"a":{"docs":{},"y":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"x":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{},"h":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"o":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"p":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"y":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016304347826086956},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"!":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"x":{"docs":{},"i":{"docs":{},"m":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},"p":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"t":{"1":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"2":{"8":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.02830188679245283},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"c":{"docs":{},"h":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271}},"e":{"docs":{},"e":{"docs":{},"s":{"docs":{},"!":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"p":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"r":{"docs":{},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.02830188679245283},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399}}}}}},"o":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"c":{"docs":{},"i":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"i":{"docs":{},"a":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"q":{"docs":{},"u":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"t":{"docs":{},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"n":{"docs":{},"/":{"docs":{},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"a":{"docs":{},"b":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}}}}}},"o":{"docs":{},"r":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"a":{"docs":{},"n":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"h":{"docs":{},"i":{"docs":{},"e":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"n":{"docs":{},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"l":{"docs":{},"y":{"docs":{},"s":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.006485484867201977}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"z":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}},"s":{"docs":{},"w":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"t":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564}},"v":{"docs":{},"i":{"docs":{},"r":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"d":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"/":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"r":{"docs":{},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"o":{"docs":{},"t":{"docs":{},"h":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}}}},"m":{"docs":{},"a":{"docs":{},"l":{"docs":{},"u":{"docs":{},"s":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"o":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"b":{"docs":{},"o":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"t":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}}},"d":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"a":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}}}},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"v":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"t":{"docs":{},"a":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"o":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"f":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"u":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":5.010869565217392},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":5.002242152466367},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":5.012711864406779},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"t":{"docs":{},"o":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"h":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"w":{"docs":{},"e":{"docs":{},"s":{"docs":{},"o":{"docs":{},"m":{"docs":{},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"m":{"docs":{},"d":{"6":{"4":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"docs":{}},"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"a":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}},"'":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"g":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"s":{"docs":{},"b":{"docs":{},"g":{"8":{"docs":{},"g":{"docs":{},"d":{"2":{"9":{"docs":{},"y":{"docs":{},"b":{"docs":{},"g":{"docs":{},"q":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"docs":{}},"docs":{}}}},"docs":{}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"g":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"k":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"h":{"docs":{},"a":{"docs":{},"v":{"docs":{},"i":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"i":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"s":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"e":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"k":{"docs":{},"e":{"docs":{},"l":{"docs":{},"e":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"y":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"w":{"docs":{},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"e":{"docs":{},"f":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.025477707006369428}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},")":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"/":{"docs":{},"c":{"docs":{},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":5.006726457399103},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3414195867026053},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.340159271899886},"forensics/":{"ref":"forensics/","tf":0.004014823965410748},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"w":{"docs":{},"a":{"docs":{},"l":{"docs":{},"k":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"s":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.006396588486140725},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"t":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"d":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"n":{"docs":{},"e":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}},"m":{"docs":{},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"s":{"docs":{},".":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"a":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"l":{"docs":{},"l":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"s":{"docs":{},"e":{"6":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"docs":{}},"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"k":{"docs":{},"g":{"docs":{},"r":{"docs":{},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"r":{"docs":{},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{},"e":{"docs":{},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"c":{"docs":{},"k":{"docs":{},"s":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"w":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"k":{"docs":{},"e":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644}}}}},"a":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{},"g":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"e":{"docs":{},"f":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"u":{"docs":{},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"_":{"docs":{},"c":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"c":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"d":{"docs":{},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"u":{"docs":{},"s":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"r":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707}}}},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"i":{"docs":{},"l":{"docs":{},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"contrib.html":{"ref":"contrib.html","tf":0.012987012987012988}}},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}},"w":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"y":{"docs":{},"p":{"docs":{},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"a":{"docs":{},"r":{"docs":{},"r":{"docs":{},"a":{"docs":{},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"(":{"docs":{},"b":{"docs":{},"\"":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"'":{"docs":{},"\\":{"docs":{},"x":{"0":{"0":{"docs":{},"\\":{"docs":{},"x":{"docs":{},"f":{"docs":{},"f":{"docs":{},"'":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"docs":{}},"docs":{}}}}},"o":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"(":{"docs":{},"'":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{},"e":{"docs":{},".":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},".":{"docs":{},"f":{"docs":{},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"h":{"docs":{},"e":{"docs":{},"x":{"docs":{},"(":{"docs":{},"u":{"docs":{},"'":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}}}}}}}}}}}}}}}},"s":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"m":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"=":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}}}},"c":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016304347826086956},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"p":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":5.009433962264151},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":5}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"r":{"docs":{},"e":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271}}}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"o":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"a":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{},"u":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"e":{"docs":{},"g":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"y":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"a":{"docs":{},"i":{"docs":{},"g":{"docs":{},"n":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.024390243902439025}},"s":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0067943174799258805}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"p":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"n":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"n":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"s":{"docs":{},"h":{"docs":{},"e":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"u":{"docs":{},"m":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"i":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"o":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"e":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"o":{"docs":{},"s":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"u":{"docs":{},"n":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"l":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"e":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"l":{"docs":{},"l":{"docs":{},"a":{"docs":{},"b":{"docs":{},"o":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}}},"e":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"e":{"docs":{},":":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"c":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"m":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"p":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.02830188679245283},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},":":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"s":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"u":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.07547169811320754},"intro/careers.html":{"ref":"intro/careers.html","tf":0.006396588486140725},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"a":{"docs":{},"n":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016304347826086956},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"m":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"l":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"s":{"docs":{},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"i":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{},"u":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"r":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":10.008658008658008}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"o":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"o":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"e":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}},"n":{"docs":{},"t":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.008528784648187633}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"g":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"n":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"n":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"r":{"docs":{},"u":{"docs":{},"p":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"p":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"e":{"docs":{},"l":{"docs":{},"a":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"d":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.024456521739130436},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"e":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"=":{"4":{"0":{"6":{"6":{"8":{"9":{"3":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"e":{"docs":{},"r":{"docs":{},"m":{"docs":{},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.011727078891257996},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"p":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"y":{"docs":{},"r":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"exploits/":{"ref":"exploits/","tf":5.5},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/":{"ref":"toolkits/","tf":5.5}},",":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.018867924528301886}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"i":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"f":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{},"y":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"t":{"docs":{},"f":{"docs":{"./":{"ref":"./","tf":0.03067484662576687},"intro/":{"ref":"intro/","tf":0.03773584905660377},"intro/find.html":{"ref":"intro/find.html","tf":5.07258064516129},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.0077208153180975915},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"?":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"!":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"c":{"docs":{},"d":{"docs":{},"c":{"docs":{},"?":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}},"m":{"docs":{},"u":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139}}},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}},"a":{"docs":{},"w":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}},":":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"f":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"y":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.011727078891257996}},"i":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"e":{"docs":{},"d":{"docs":{},"!":{"docs":{},"\"":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"l":{"docs":{},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"n":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}}}},"c":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"o":{"docs":{},"n":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"s":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"u":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"r":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{},"o":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"v":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"+":{"docs":{},"+":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"/":{"docs":{},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"m":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"s":{"docs":{},"i":{"docs":{},"g":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"k":{"docs":{},"t":{"docs":{},"o":{"docs":{},"p":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"c":{"docs":{},"r":{"docs":{},"i":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},"e":{"docs":{},"r":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"m":{"docs":{},"p":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"d":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"v":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"l":{"docs":{},"o":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"b":{"docs":{},"u":{"docs":{},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"i":{"docs":{},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"e":{"docs":{},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}}}}},"p":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"y":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}}}},"o":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"e":{"docs":{},"r":{"docs":{},"y":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"i":{"docs":{"vulnerabilities/":{"ref":"vulnerabilities/","tf":5.5},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"n":{"docs":{},"n":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"g":{"docs":{},"u":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"p":{"docs":{},"l":{"docs":{},"a":{"docs":{},"y":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"f":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"?":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"n":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"e":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"d":{"docs":{},"i":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"”":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"w":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"o":{"docs":{},"a":{"docs":{},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"z":{"docs":{},"e":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"s":{"docs":{},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"p":{"docs":{},"r":{"docs":{},"o":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"n":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{},".":{"docs":{},"j":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"a":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},"o":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"u":{"docs":{},"e":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"l":{"docs":{},"l":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"t":{"docs":{},"a":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.008956145768993206}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"e":{"docs":{},"/":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"y":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"t":{"docs":{},"m":{"docs":{},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"v":{"docs":{},"w":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"p":{"docs":{},"k":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"m":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"s":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"n":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},";":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},"s":{"docs":{},"u":{"docs":{},"l":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}},"o":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}},"e":{"docs":{},"r":{"docs":{},"/":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"t":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}}},"j":{"docs":{},"o":{"docs":{},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"r":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"v":{"docs":{},"e":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"r":{"docs":{},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"a":{"docs":{},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"l":{"docs":{},"u":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"x":{"docs":{},"e":{"docs":{},"r":{"docs":{},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}},"c":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"n":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"o":{"docs":{},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288},"exploits/":{"ref":"exploits/","tf":5.5},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3495058400718776},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.3742889647326506},"web/exploits.html":{"ref":"web/exploits.html","tf":5.038216560509555},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"s":{"docs":{},")":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"a":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"c":{"docs":{},"e":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}},"p":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016304347826086956},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},"e":{"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"[":{"1":{"docs":{},"]":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"d":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.005558987029030266}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}},"e":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{},"e":{"docs":{},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"h":{"docs":{},"a":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{},":":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"p":{"docs":{},"h":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"l":{"docs":{},"o":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"d":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"t":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"s":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"w":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}},"e":{"docs":{},"v":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"t":{"docs":{},"h":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"c":{"docs":{},"a":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},")":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},")":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"h":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"f":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"e":{"docs":{},"l":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":5.008064516129032},"intro/careers.html":{"ref":"intro/careers.html","tf":5.005330490405117},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.004323656578134651},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"n":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"r":{"docs":{},"m":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"e":{"docs":{},"f":{"docs":{},"o":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"x":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"l":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.034898085237801114}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"n":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"/":{"docs":{},"r":{"docs":{},"e":{"docs":{},"g":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"l":{"docs":{},"a":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":5.009433962264151},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"’":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"v":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"s":{"docs":{},"h":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"w":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"e":{"docs":{},"x":{"docs":{},"i":{"docs":{},"b":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}},"k":{"docs":{},"s":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":10.009264978381717},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"c":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"m":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"t":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"m":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.009882643607164917}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"e":{"docs":{},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"k":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"n":{"docs":{},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"v":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"c":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"s":{"docs":{},"t":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.010869565217391304},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"k":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"u":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}},"r":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"w":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"e":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"d":{"docs":{},"b":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{},"c":{"docs":{},"l":{"docs":{},"o":{"docs":{},"s":{"docs":{},"e":{"docs":{},"(":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"(":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"w":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"(":{"docs":{},"s":{"docs":{},"[":{"docs":{},":":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"c":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"'":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"a":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"m":{"docs":{},"p":{"docs":{},"s":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"o":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"a":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"o":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"g":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}}},"l":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"h":{"docs":{},"a":{"docs":{},"m":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"u":{"docs":{},"i":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"e":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"h":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}},"a":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"r":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"d":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"e":{"docs":{},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},"a":{"docs":{},"l":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"r":{"docs":{},"a":{"docs":{},"'":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"f":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"h":{"docs":{},"u":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.05627705627705628}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"r":{"docs":{},"a":{"docs":{},"d":{"docs":{},"u":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"d":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"e":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}},"o":{"docs":{},"u":{"docs":{},"p":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"d":{"docs":{},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965}}}},"n":{"docs":{},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"p":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01358695652173913},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"u":{"docs":{},"r":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"p":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"v":{"docs":{},"a":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}},"w":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},".":{"docs":{},"s":{"docs":{},"h":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}}}},"m":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"o":{"docs":{},"k":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"c":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"p":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"d":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},"d":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}}}}},"j":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"e":{"docs":{},"r":{"docs":{},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}},"u":{"docs":{},"m":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"e":{"docs":{},"/":{"docs":{},"s":{"docs":{},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"/":{"docs":{},"l":{"docs":{},"u":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}},"g":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"m":{"docs":{},"l":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},":":{"docs":{},"/":{"docs":{},"/":{"docs":{},"w":{"docs":{},"w":{"docs":{},"w":{"docs":{},".":{"docs":{},"n":{"docs":{},"i":{"docs":{},"r":{"docs":{},"s":{"docs":{},"o":{"docs":{},"f":{"docs":{},"t":{"docs":{},".":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{},"/":{"docs":{},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"l":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"_":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{},"_":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{},"s":{"docs":{},".":{"docs":{},"h":{"docs":{},"t":{"docs":{},"m":{"docs":{},"l":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.010869565217391304},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0037059913526868438}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"a":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"n":{"docs":{},"d":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"y":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"e":{"docs":{},"t":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},")":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"t":{"docs":{"./":{"ref":"./","tf":10},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.007462686567164179},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.007462686567164179}}}}}},"r":{"docs":{},"a":{"docs":{},"g":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},")":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}}}}}}}}},"c":{"docs":{},"r":{"docs":{},"e":{"docs":{},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"i":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"l":{"docs":{},"u":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"docs":{},"r":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"e":{"docs":{},"x":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"s":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"t":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}}}}},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238}},"o":{"docs":{},"r":{"docs":{},"(":{"docs":{},"s":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"a":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"r":{"docs":{},"t":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"v":{"docs":{},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"a":{"docs":{},"l":{"docs":{},"u":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},".":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}}}},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"q":{"docs":{},"u":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}},"'":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"h":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"o":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.010809141445336628}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"/":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"s":{"docs":{},"c":{"2":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"docs":{}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"9":{"6":{"6":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"t":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"'":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}},"’":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"f":{"docs":{},"=":{"docs":{},".":{"docs":{},"/":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"_":{"docs":{},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"_":{"docs":{},"a":{"docs":{},"_":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"_":{"docs":{},"i":{"docs":{},"n":{"docs":{},"_":{"docs":{},"i":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"x":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}},"h":{"docs":{},"d":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"l":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"j":{"docs":{},"o":{"docs":{},"h":{"docs":{},"a":{"docs":{},"n":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"b":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":5.00319829424307},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"f":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"a":{"docs":{},"v":{"docs":{},"a":{"docs":{},"s":{"docs":{},"c":{"docs":{},"r":{"docs":{},"i":{"docs":{},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"y":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"k":{"docs":{},"e":{"docs":{},"e":{"docs":{},"p":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"n":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}},"a":{"docs":{},"i":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.008528784648187633},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},"e":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825}}}}}}}},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"n":{"docs":{},"g":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"e":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"t":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"x":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"f":{"docs":{},"r":{"docs":{},"e":{"docs":{},"e":{"docs":{},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"o":{"docs":{},"p":{"docs":{},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}},"y":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}},"(":{"docs":{},"c":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"c":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"s":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"g":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"v":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{},"u":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01358695652173913},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"s":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"s":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"j":{"docs":{},"o":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"k":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.025423728813559324},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"f":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"p":{"docs":{},"u":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"p":{"docs":{},"a":{"docs":{},"g":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"d":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"i":{"docs":{},"n":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"l":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"c":{"docs":{},"h":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{},"/":{"docs":{},"/":{"docs":{},".":{"docs":{},"/":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},".":{"docs":{},"m":{"docs":{},"o":{"docs":{},"d":{"docs":{},"u":{"docs":{},"l":{"docs":{},"e":{"1":{"docs":{},".":{"docs":{},"m":{"docs":{},"y":{"docs":{},"m":{"docs":{},"a":{"docs":{},"c":{"docs":{},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"docs":{}}}}}}}}}}}}}}}}}}}}}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"y":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"r":{"docs":{},"o":{"docs":{},"s":{"docs":{},"h":{"docs":{},"k":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"r":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{},"o":{"docs":{},"w":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"c":{"docs":{},"i":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"p":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"x":{"docs":{},"i":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.018867924528301886}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"?":{"docs":{},"\"":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165}},"u":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"n":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"m":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.016172506738544475},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.004014823965410748}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"a":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"e":{"docs":{},"r":{"docs":{},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"d":{"docs":{},"i":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"a":{"docs":{},"p":{"docs":{},"i":{"docs":{},"x":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"c":{"docs":{},"r":{"docs":{},"o":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}},"s":{"docs":{},"o":{"docs":{},"f":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"u":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"a":{"docs":{},"k":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"p":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"k":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.008528784648187633},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"r":{"docs":{},"n":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"u":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"i":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"n":{"docs":{},"e":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"t":{"docs":{},"h":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"t":{"docs":{},"i":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"v":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"u":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"m":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"d":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"k":{"docs":{},"d":{"docs":{},"i":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"3":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"4":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}},"l":{"docs":{},"i":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"t":{"docs":{},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},"+":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"/":{"docs":{},"h":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}},"u":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"s":{"docs":{},"p":{"docs":{},"a":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01358695652173913},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"c":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"g":{"docs":{},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},":":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"o":{"docs":{},"w":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},"p":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"r":{"docs":{},"m":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"t":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"d":{"docs":{},"e":{"docs":{},"j":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"h":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"v":{"docs":{},"i":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"y":{"docs":{},"u":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"f":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"p":{"docs":{},"m":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"o":{"docs":{},"p":{"docs":{},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"f":{"docs":{},"u":{"docs":{},"s":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"=":{"docs":{},".":{"docs":{},"/":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},"_":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"x":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.02830188679245283},"intro/careers.html":{"ref":"intro/careers.html","tf":0.007462686567164179},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"g":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/":{"ref":"tradecraft/","tf":5.5},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.04878048780487805},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"(":{"docs":{},"'":{"docs":{},"i":{"docs":{},"t":{"docs":{},"s":{"docs":{},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"d":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"i":{"docs":{},"t":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"docs":{},"o":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802}}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"a":{"docs":{},"m":{"docs":{},"i":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"z":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"c":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"p":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"e":{"docs":{},"a":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"w":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}}},"f":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"l":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"e":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"'":{"docs":{},"r":{"docs":{},"e":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"y":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"i":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"w":{"docs":{},"e":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"v":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"w":{"docs":{},"a":{"docs":{},"s":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652}},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"u":{"docs":{},"l":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"n":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"l":{"docs":{},"o":{"docs":{},"a":{"docs":{},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"c":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"a":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"\"":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{},"o":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"/":{"docs":{},"t":{"docs":{},"o":{"docs":{},"/":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},".":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}},"c":{"docs":{},"h":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"n":{"docs":{},"e":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"o":{"docs":{},"p":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}}}},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},".":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{},"c":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"r":{"docs":{},"s":{"docs":{},"u":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"o":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"/":{"docs":{},"i":{"docs":{},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"c":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"g":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"d":{"docs":{},"a":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"e":{"docs":{},"p":{"docs":{},"d":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"y":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016304347826086956},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.017937219730941704},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"'":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139}}}}},"a":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"'":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"o":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"t":{"docs":{},"o":{"docs":{},"c":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"x":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"h":{"docs":{},"i":{"docs":{},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"t":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"o":{"docs":{},"s":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"p":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":5.006993006993007}},"a":{"docs":{},"r":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"d":{"docs":{},"o":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"v":{"docs":{},"i":{"docs":{},"o":{"docs":{},"u":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"m":{"docs":{},"i":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"t":{"docs":{},"(":{"docs":{},"c":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"m":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"c":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"d":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"f":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"x":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"l":{"docs":{},"a":{"docs":{},"i":{"docs":{},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"y":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}},"c":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"y":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},"w":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"p":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"s":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}}}},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"t":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"s":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"o":{"docs":{},"s":{"docs":{},"o":{"docs":{},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"y":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"e":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"l":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"r":{"docs":{},"p":{"docs":{},"o":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"z":{"docs":{},"z":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"f":{"docs":{},"i":{"docs":{},"x":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"d":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"c":{"docs":{},"k":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"p":{"docs":{},"t":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"x":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"w":{"docs":{},"n":{"docs":{},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"n":{"docs":{},"g":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"l":{"docs":{},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}}},"n":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"p":{"docs":{},"d":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"r":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"e":{"docs":{},".":{"docs":{},"m":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"s":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"s":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"i":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"l":{"docs":{},"e":{"docs":{},"v":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"h":{"docs":{},"i":{"docs":{},"p":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}}}}}}},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.018867924528301886},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"y":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"a":{"docs":{},"i":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}},"g":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"r":{"docs":{},"/":{"docs":{},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}},"e":{"docs":{},"i":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"u":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"g":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"o":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"v":{"docs":{},"e":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"q":{"docs":{},"u":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"o":{"docs":{},"u":{"docs":{},"r":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"l":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"i":{"docs":{},"z":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"e":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"i":{"docs":{},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"w":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.020477815699658702},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"a":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{},"o":{"docs":{},"m":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"k":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"n":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"b":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"f":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"s":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"g":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"/":{"docs":{},"e":{"docs":{},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{},"o":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"s":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"p":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"?":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"_":{"docs":{},"m":{"docs":{},"i":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}}},"g":{"docs":{},"a":{"docs":{},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"n":{"docs":{},"d":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"n":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"o":{"docs":{},"t":{"docs":{},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"p":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"g":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"d":{"docs":{},"u":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"e":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},"a":{"docs":{},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"p":{"docs":{},"e":{"docs":{},"l":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{},"i":{"docs":{},"p":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"h":{"docs":{},"o":{"docs":{},"t":{"docs":{},".":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}},"e":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.04716981132075472},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.023454157782515993},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}},"+":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"u":{"docs":{},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"r":{"docs":{},"v":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},")":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"c":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"s":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"e":{"docs":{},"l":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"w":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}},"o":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"l":{"docs":{},"v":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"f":{"docs":{},"t":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.010869565217391304},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}}}}}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"m":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"i":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"w":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"u":{"docs":{},"r":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":5.021739130434782},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"i":{"docs":{},"a":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238}}}}}},"n":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{},"i":{"docs":{},"r":{"docs":{},"o":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"t":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"g":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"u":{"docs":{},"d":{"docs":{},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":5.008130081300813}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165}}}}}},"x":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"f":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"g":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{},"o":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}}}}}}}}},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"l":{"docs":{},"t":{"docs":{},"h":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"y":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"u":{"docs":{},"c":{"docs":{},"c":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"s":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"h":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"p":{"docs":{},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"d":{"docs":{},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"i":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"d":{"docs":{},"o":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"g":{"docs":{},"g":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"!":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"l":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"g":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}},"i":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"u":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"p":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"f":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"z":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288}},"'":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"a":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}}}}},"p":{"docs":{},"i":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"e":{"docs":{},"a":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"e":{"docs":{},"r":{"docs":{},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"i":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"f":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"c":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"t":{"docs":{},"o":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"c":{"docs":{},"e":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"i":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"i":{"docs":{},"d":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"n":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"s":{"docs":{},"h":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"p":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"g":{"docs":{},"g":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"k":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"p":{"docs":{},"=":{"1":{"3":{"3":{"5":{"2":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}}}},"l":{"docs":{},"o":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"u":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"m":{"docs":{},"b":{"docs":{},"o":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"o":{"docs":{},"n":{"docs":{},"y":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"a":{"docs":{},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{},"i":{"docs":{},"p":{"docs":{},"p":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"a":{"docs":{},"p":{"docs":{},"s":{"docs":{},"h":{"docs":{},"o":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"q":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"a":{"docs":{},"s":{"docs":{},"h":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"c":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}},"n":{"docs":{},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}}},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}},"a":{"docs":{},"l":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"q":{"docs":{},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"r":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"k":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"\"":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"h":{"docs":{},"a":{"docs":{},"t":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"m":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"v":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"?":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"1":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"r":{"docs":{},"e":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"n":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"s":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006396588486140725},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"r":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{},"!":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"s":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"t":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}}},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"n":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{},"j":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01358695652173913},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"web/exploits.html":{"ref":"web/exploits.html","tf":0.03821656050955414},"forensics/":{"ref":"forensics/","tf":0.007103150092649784},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/":{"ref":"toolkits/","tf":5.5},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":5.041958041958042},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},"i":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"y":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"d":{"docs":{},"a":{"docs":{},"y":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"n":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"r":{"docs":{},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"r":{"docs":{},"a":{"docs":{},"f":{"docs":{},"t":{"docs":{"tradecraft/":{"ref":"tradecraft/","tf":5.5},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.04065040650406504}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},":":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"n":{"docs":{},"s":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"e":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"n":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"t":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"k":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}},"l":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0042643923240938165}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"m":{"docs":{},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}},"g":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"o":{"docs":{},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652}}}}}},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"s":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"w":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"c":{"docs":{},"p":{"docs":{},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"x":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"g":{"docs":{},"z":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"2":{"docs":{},"e":{"docs":{},"i":{"4":{"docs":{},"h":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"docs":{}}}},"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005330490405117271},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01358695652173913},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.018867924528301886},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.030716723549488054},"forensics/":{"ref":"forensics/","tf":0.011426806670784434},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"a":{"docs":{},"g":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"s":{"docs":{},"b":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"n":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"r":{"docs":{},"o":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.010869565217391304},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006396588486140725},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}}}}}}}},"x":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"/":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"u":{"docs":{},"x":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"q":{"docs":{},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"d":{"docs":{},"o":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},"/":{"docs":{},"u":{"docs":{},"n":{"docs":{},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"f":{"docs":{},"a":{"docs":{},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"i":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"n":{"docs":{},"o":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"p":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"]":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"o":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"m":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"i":{"docs":{},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"b":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{},"u":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"l":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"l":{"docs":{},"u":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"r":{"docs":{},"o":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"u":{"docs":{},"l":{"docs":{},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/":{"ref":"vulnerabilities/","tf":5.5},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.03804347826086957},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.029661016949152543},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}}}}}}}}}}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"e":{"docs":{},"t":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"y":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"l":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"i":{"docs":{},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"i":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},"e":{"docs":{},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}}}}},"r":{"docs":{},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"a":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"t":{"docs":{},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"o":{"docs":{},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031982942430703624}}}}}},"r":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"t":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"m":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"b":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"l":{"docs":{},"k":{"docs":{},"t":{"docs":{},"h":{"docs":{},"r":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}}}}},"n":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.016129032258064516},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"y":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005434782608695652},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"r":{"docs":{},"g":{"docs":{},"a":{"docs":{},"m":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.024193548387096774},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"c":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"v":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"e":{"docs":{},"l":{"docs":{},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"!":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"’":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"v":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}},"e":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"b":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.0635593220338983},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.03184713375796178},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},"e":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},":":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":5},"web/exploits.html":{"ref":"web/exploits.html","tf":5}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"'":{"docs":{},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"a":{"docs":{},"k":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"h":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"r":{"docs":{},"e":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"h":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}},"d":{"docs":{},"b":{"docs":{},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"o":{"docs":{},"w":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"p":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"k":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}}}}},"d":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"o":{"docs":{},"l":{"docs":{},"f":{"docs":{},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"r":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"h":{"docs":{},"o":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"l":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"!":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"\\":{"docs":{},"!":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"/":{"docs":{},"_":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{},"s":{"docs":{},"/":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"f":{"docs":{},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"n":{"docs":{},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"t":{"docs":{},"y":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"/":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"1":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"docs":{}}}}}}}}}}}},"w":{"docs":{},"e":{"docs":{},"b":{"docs":{},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"o":{"docs":{},"t":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"g":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021321961620469083},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008152173913043478},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"y":{"docs":{},"o":{"docs":{},"u":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"’":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.018404907975460124}}}},"r":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"'":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006396588486140725},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"l":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"r":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008064516129032258}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"?":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}},"“":{"docs":{},"k":{"docs":{},"n":{"docs":{},"o":{"docs":{},"w":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"b":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"d":{"docs":{},"e":{"docs":{},"f":{"docs":{},"u":{"docs":{},"s":{"docs":{},"e":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"‘":{"docs":{},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}},"g":{"docs":{},"a":{"docs":{},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{},"s":{"docs":{},"’":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"\"":{"docs":{},"w":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"b":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{},"o":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"l":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"r":{"docs":{},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}},"h":{"docs":{},"u":{"docs":{},"n":{"docs":{},"k":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"=":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"u":{"docs":{},"t":{"docs":{},"o":{"docs":{},"p":{"docs":{},"s":{"docs":{},"y":{"docs":{},",":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"e":{"docs":{},"x":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"c":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}},"h":{"docs":{},"i":{"docs":{},"d":{"docs":{},"d":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"c":{"docs":{},"r":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"o":{"docs":{},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"a":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"b":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"u":{"docs":{},"s":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"x":{"docs":{},"m":{"docs":{},"p":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}},"g":{"docs":{},"d":{"docs":{},"b":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"/":{"docs":{},"m":{"docs":{},"y":{"docs":{},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{},"o":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}}}}}}},"[":{"docs":{},"e":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"_":{"docs":{},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{},"e":{"docs":{},"s":{"docs":{},"]":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}}}}}}}},"x":{"8":{"6":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.017937219730941704},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"docs":{}},"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"y":{"docs":{},"z":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}},"s":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"c":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"x":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"z":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}},"h":{"docs":{},"i":{"docs":{},"q":{"docs":{},"i":{"docs":{},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541}}}}}}}}},"o":{"docs":{},"v":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010660980810234541},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"e":{"docs":{},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"d":{"docs":{},"e":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"l":{"docs":{},"i":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"g":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"/":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"p":{"docs":{},"a":{"docs":{},"n":{"docs":{},"/":{"docs":{},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"s":{"docs":{},"/":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.002717391304347826}}}}}}}}}}}}}}}}}},"m":{"docs":{},"n":{"docs":{},"t":{"docs":{},"/":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}},"*":{"docs":{},"n":{"docs":{},"i":{"docs":{},"x":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"$":{"5":{"docs":{},",":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438}},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"%":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{},"p":{"docs":{},"%":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"'":{"docs":{},"\"":{"0":{"docs":{},"x":{"docs":{},"%":{"0":{"8":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}}}},"docs":{}},"r":{"docs":{},"b":{"docs":{},"'":{"docs":{},")":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"(":{"docs":{},")":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0077208153180975915}}},"=":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}},">":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},">":{"docs":{},">":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"_":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},"/":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"$":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"@":{"docs":{},"=":{"docs":{},".":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}},"g":{"docs":{},".":{"docs":{},".":{"docs":{},"q":{"docs":{},".":{"docs":{},".":{"docs":{},"a":{"docs":{},".":{"docs":{},"y":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"9":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}}}}}}}}}}}}}},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"i":{"docs":{},"h":{"docs":{},"d":{"docs":{},"r":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},".":{"docs":{},"x":{"docs":{},".":{"docs":{},".":{"docs":{},"y":{"docs":{},".":{"8":{"docs":{},"u":{"docs":{},"]":{"docs":{},".":{"docs":{},".":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"docs":{}}}}}}}}}}}}},"–":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"│":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"└":{"docs":{},"─":{"docs":{},"─":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"├":{"docs":{},"─":{"docs":{},"─":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}}}},"�":{"docs":{},"�":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"&":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"length":4110},"corpusTokens":["\"'","\"=\"","\"autopsy,\"","\"basic","\"black","\"chunks\"","\"comput","\"cover","\"crimewar","\"export","\"file","\"filters,\"","\"forensics\"","\"hidden","\"increment","\"insid","\"magic","\"objects\"","\"offic","\"packet","\"plaintext","\"profile\"","\"raw","\"rb\")","\"suspicious\"","\"ultimate\"","\"wb\")","\"will","\"xmp\"","\"you","\"zipcrypto\")","$","$5,000","$iccpicc","%temp%","&","'\"0x%08x","'rb').read())","(\"hello","(0","(0x00","(2d","(32","(a","(a.k.a.","(although","(and","(beef)","(between","(binary)","(both","(byte","(ccdc)","(code","(common","(cs:app)","(ctf).","(discuss","(disk","(dvwa)","(e.g.,","(especi","(ex:","(file","(fix","(for","(from","(gdb)","(gits)","(if","(infrastructure,","(ir).","(isc)2","(isc)2'","(it'","(jar","(jpg,","(like","(link","(linux","(lsb)","(made","(mostli","(not","(nsa","(objects).","(of","(offensive)","(oper","(opportun","(or","(order","(packet","(pcap)","(pcap,","(pil)","(pw:","(python)","(rop)","(rtf,","(ruby)","(see","(switches,","(text","(the","(unless","(vba","(we","(when","(with","(zip,","*nix.",".","...","....","./myrepo","./myrepo.",".gdbinit",".rodata,","/","/epan/dissectors/","/mnt/challeng","0's,","0.960","00","00000000","00000010","00000020","00000030","00000040","010","02","04:00","05","06","08","09","0a","0c","0d","0x00000608","0x00006966","0x0a1a0a0d","0x0d000000","0x180000a4","0x43434950","0x43436924","0x474e5089","0x52444849","0x60'","0x6f725020","0x7f,","0x88020000","0xc93d4000","0xca050000","1","1'","1.8.5","10","10.","10.53","100","101","101,","101010101,","102","102,","108","1080,","111","114","12","12345.","12346.","12347.","12348.","12349.","1335205","13:19:58","14.04","1482","1482x648","18","1920","1998.","1])","1a","2","20","2008","2011","2017:06:13","2017:06:17","21,","22:34:05","24","255","256,","3","32","36","38","39","3:","3d","40","40668937","41","43","44","47","48","49","4e","5","50","500","50mb,","52","55","58","5d","5k","64","648","65","66","67","68","68656c6c6f20776f726c64210a","69","6:","6c","6f","71","72","750","767787","77","79","7z","7z,","8","8,","80’","85","87","88","89","89504e47","9","9,","95","99","9e","9f",":","=",">",">>>","[content_types].xml","[editor'","_rel","_rels/.rel","a)","a4","abil","about.","abov","above,","abus","academ","academia).","accept","access","accompani","accur","achiev","acquir","action/cap","action/capability?","activity.","actor","actual","addit","additionally,","address","administr","administrator.","admiration.","adob","adobe'","advanc","advantag","advic","advice.","ae","affect","aforement","afterward.","again","again).","again,","against","aggreg","agvsbg8gd29ybgqh","ahead,","aid","aim","aka","albertini","albertini.","alert,","alex","all).","all,","allow","alon","alone.","along","alpha","alphanumer","alreadi","already,","also,","alter","altern","although","alway","ama","ama'","ambition,","amd","amd64","amount","analysi","analysis,","analysis.","analyst","analyz","analyzer,","and,","and/or","anderson","andrew","ang","anim","anomalus?","anoth","answer","anti","antiviru","anyon","anyth","apart","api","app","app.xml","appeal","appear","appl","appli","applic","application.","applications!","applications.","apply.","approach.","appropri","approxim","apt","apt1","apt28","arbitrari","architect","archiv","archive,","archive:","are:","area","areas.","argument","arm,","around","articl","artifact.","artifici","ascii","ascii),","ascii.","ask","aspect","assembl","assessments)","associ","assum","at.","at:","attach","attack","attack\"","attack.","attacker\"","attacker.","attacks.","attempt","attempt,","attend","attendees!","attent","attribution,","audac","audio","audio,","audit","auditing,","auditing.","auditor","audits/app","authent","author","autom","automat","automation).","avail","available.","avoid","awar","awareness.","awesome)","b)","background","bad","bait","ball.","barcodes),","base","base64","basi","basic","basic,","bc","be","becam","becom","beef","befor","before,","begin","beginn","behavior","behavior,","behavior.","behind","believ","belong","below","below.","berkeley","bernstein","best","better","between","bewar","beyond","bgrep","big","binari","binaries.","binutil","binwalk.","bisc","bit","bit)","bit/color","bits,","blocks\"","blog","bmp,","bodi","bomb","bomb.","bombs.”","boneh","book","book.","bootstrap","borrow","both","boundari","brain","branch","brandon","break","breakpoint","bridg","brief","broad","broadli","broken","brows","browser","brute","brute_cooki","bs=1","buffer","buffer,","bug","build","built","burp","bush","busi","business,","bust","bwa","bypass","byte","bytearray","bytearray(b\"hello","bytearray(b'\\x00\\xff')","bytearray(open('challenge.png',","bytearray.fromhex(u'00","bytes\")","bytes,","bytes,\"","bytes:","c","c)","c++.","c7","c9","ca","calendar","call","camera","campaign","campaigns.","can't","canon","capabl","capable.","capctf","capinfo","captur","capture)","capture),","capture.","career","carefulli","careto","carv","carving\"","carving,","carving.\"","case","cases,","cases.","cash","catalogu","categori","category).","category,","category.","caution","ccdc?","cd","center","cert","certain","certainti","certif","certification.","certified!\"","certified,","certified.","chain","challeng","challenge).","challenge,","challenge:","challengefil","challenges,","challenges.","challenges:","chang","changes.","channel","chapter","chapters,","charact","characterist","charset","cheat","cheatsheet","check","checksums,","cheesi","child","choic","choosing.","chose","chosen","chrome","chunk","cissp","cities.","city,","citysec,","clang","class","clear,","cleverli","click","client","clone","close","closely.","clue","clues.","cmm","cmu","co","coast)","code","code,","code.","codebas","codebase.","coe","coe)","collabor","collaboration.","collaboratively,","collect","colleg","college:","collegi","color","come","comfort","command","command.","command:","commands:","comment","comments.xml","commerci","commit","common","common.","commonli","commun","compani","company,","compar","compat","compet","competit","competition.","competition:","competitions,","compil","compilation”","complet","complex","complianc","complic","complicated,","compound","compress","compressed,","compression,","compromis","compromises.","comput","conceal","concentr","concept","concise,","conditionals,","confer","conference,","conference.","confession.","configurations,","confirm","confus","connections,","connections.","consid","consist","consol","constitut","construct","consult","consulting.","contact","contain","contain,","content","content,","content.","contents,","contents.","context","context,","continu","contribut","contribution,","contributor","control","conveni","convent","convers","conversational.","convert","convert,","convert.","converter,","coordinates,","copi","copyright","core.xml","corelan","corner","correct","correctly.","correspond","corrupt","corruption,","corruption.","cost","count","count=40668937","countermeasures.\"","cours","course,","courses,","cover","covers.","cow","crack","craft","creat","creation","creation,","creation.","credit,","crimewar","crimin","critic","crop,","crypto","cryptography),","cryptography,","cs","cs:app","csaw","csrf,","ctf","ctf!","ctf,","ctf?","ctfs,","ctfs.","cultiv","current","curv","custom","cyber","cybersecur","d","d.","da","dai","dalla","damag","damn","dan","dartmouth","data","data\"","data,","data.","data:","databases,","date/tim","daunt","day","day.","dd","de","debug","debugg","debugger.","decis","decod","decompil","decompress.","dedic","deeper,","defcon","defeat","defend","defens","defense,","defin","deflate/infl","delet","deliv","demand","demand,","demo","depth","deriv","describ","design","desktop","detail","details.","detect","determin","dev","develop","development.","devic","devices,","didier","dif","differ","different,","different?","difficult","difficulti","dig","digit","dimensions,","dino","direct","directed,","directli","directly,","directori","directory:","disallow","disassembl","disassembler.","disassembler:","disciplin","disciplines.","disconnect","discov","discoveri","discovery,","discret","discuss","disguis","disk","disk.","display","dissect","dissector","distil","distract","distribut","distribution.","dive","divid","do","do.","do.”","doc,","docprop","docprops/app.xml","docprops/core.xml","docprops/thumbnail.jpeg","document","document,","document.xml","document.xml.rel","document:","documents:","docx,","doesn't","domain","don't","done","done.","down","down,","download","dozen","dpkt","draw","drawn","drop","dtmf","due","dump","dure","dvwa","dvwa,","dvwa.","e","e6","e7","each","earli","easi","easier","easier,","easiest","easili","easy,","ebook","ebook:","echo","edit","editor","editor,","educ","edward","ef","effect","effectively,","effici","eight","element","elev","else,","else.","elsewhere,","elsewhere.","email","email.","emb","embed","embedded,","emerg","emerged:","emphasi","employ","enabl","encapsul","encod","encoder/decod","encoding,","encoding:","encodings,","encodings.","encount","encourag","encrypt","end","endpoint","enforc","engin","enjoy","enough","enough;","ensur","entir","environ","environments,","error","errors.","especi","essenc","essenti","etc).","etc.","etc.)","ethic","ethscan","evad","evalu","evan","even","everyth","everything,","evid","evidentiari","evolv","exact","exam","examin","exampl","example,","example.docx","example2","example2[1]","examples,","excel","execut","executed.","execution.","exercis","exercise.","exercises.","exhausting).","exif","exiftool","exiftool)","exiftool.","exist","exist.","expect","expel","expens","experi","experience.","expert","expert,","expert.","explain","explan","exploit","exploit.","exploitation,","exploitation.","exploits)","explor","export","expos","exposure.","ext3","ext4","ext4)","extend(),","extens","extern","extract","extracting:","extraordinarili","extrem","extundelete.","f","f).","f.close()","f.read()","f.write(s[::","f8","fact","fact,","factor","fail","familiar","fantast","fantastic.","far","fast,","fat","favorable.","favorites:","fcrackzip","featur","feedback","feel","few","fewer","ff","ff')","ffmpeg","ffmpy.","field","field.","fields,","file","file'","file,","file.","file:","filenam","files),","files,","files.","files:","filesystem","filesystem,","filesystem.","filesystems)","filesystems,","filesystems/registries,","filetyp","filetype.","filetypes,","fill","filter","final","finally,","financ","finance)","financi","find","firefox","firm.","firmwar","first","fit","five","fix","flag","flag)","flag.","flags.","flag’","flash.","flat","flavor","flaw","flexibl","flow","flow.","focu","focus","folder","folder.","folks,","follow","following,","fonttable.xml","fooled.","for,","for.","forc","foremost,","foremost.","forens","forensics,","forget","fork","format","format,","format.","format:","format;","formats,","formats.","formerli","fortun","fortunately,","found","fragment","frame","framework","framework.","free","free,","frequent","friend","friendli","frustrat","full","fun","fun,","fun.","function","functionality.","fundament","fundement","further","futur","g","ga","gadget","gain","game","gap","garbl","gather","gathered),","gdb","gear","gef,","gener","general,","generation\"","gera'","get","ghost","gif","gif,","gimp","git","git.","gitbook","gitbook,","github","give","given","glad","glance,","glance.","glimps","gnu","go","go.","goal","goal.","goeth","gold","good","googl","google.","gotham","govern","government).","gp","graduat","graphic","gratitud","gray","great","greater","grep","grep,","group","groups,","gruyer","gruyere,","guess","gui.","guid","guidanc","guide).","guide.","guideline.","hack","hacker","hacking:","hand","hand,","handi","handler","happen","hard","harder","hardli","harm","hat","have","haven't","haystack","header","headers),","headers.","headstart.","hear","height","hello","help","help,","helpful,","helpful.","here","here,","here.","here:","heurist","heuristic,","heuristics,","hex","hex:","hexadecim","hexdump","hexdump,","hexdump.","hexdump:","hexidecim","hidden","hide","hierarchy.","high","higher","highli","highlight","hijack","hints,","hire","histor","histori","history,","hole","home","hook","hope","hopefulli","host","host.sh","hosted.","hosts.","hovav","however,","hsctf","html","html,","http","http,","http://www.nirsoft.net/utils/alternate_data_streams.html.","hue/saturation/lumin","huge","human","i'v","ictf","ida","idea","ideal","ident","identif","identifi","identify,","identities,","idols,","ie.","iend","if=./file_with_a_file_in_it.xxx","ihdr","ii","illustr","im.","imag","image,","image.","image/png","image:","imagemagick","imho","implement","import","imposs","improv","in.","inadequ","inadvert","inc.","incid","includ","include:","incorpor","incred","incrimin","independ","indic","indirect","individu","individuals,","industri","industry'","industry,","industry.","inexpens","infected)","inflating:","inform","information.","infosec","infragard","initi","injection,","inod","input","input.zip","insecur","insert(),","insid","insight","insist","instal","installed,","instance,","instead","institut","instruct","instruction.","instructions,","instructor(s)","integ","integr","integrity.","intel","intel).","intend","intent.","intention","interact","interactive,","interdisciplinari","interest","interfac","interface,","interference,","interlac","intern","internet’","interpret","intim","intro","introduc","introduct","introductori","invaluable.","involv","ir","is.","isc2","iso9660","issa","issu","issues.","it'","it,","it.","itself.","it’","j.","javascript","jay","jensen","job","johann","jpg","jpg,","jump","justifi","kaitai.","kb","keep","key","keys,","keyword","kill","kind","kit","kit.","know","knowledg","knowledge.","known","lab","labs.","lack","languag","language.","larg","larger","last","latter","law","layer","layer,","layout","leader","leads,","learn","lectur","lecture,","lecture.","length","less","lesser","lesson","lesson,","lesson.","level","lib(c)","libari","libfreetyp","libmag","libmagic,","libpcap).","libpng,","libpoppler,","libr","librari","libraries.","library).","libxml,","licens","limit","lin","line","line:","link","link)","linux","linux,","list","list,","list.","list:","listen","lists,","lists.","littl","liu","live","local","locat","logs,","long","longer","look","look.","loops)","loops,","loss","lossi","lossless","lot","love","low","lowest","lsb","lure","machin","machine.","maco","macos).","macro","macro,","macro://./standard.module1.mymacro","made","made?","magic","mainli","maintain","major","make","malici","maliciousness:","malwar","man","manag","management.","mani","manifest","manipul","manipulations)","manner","manpag","manual","manual:","manufactur","map","marcin","markdown","markdown),","markdown.","marker","market.","massiv","master","master.","mastery.","mastroshka","materi","material.","materials.","matters,","maxim","mdl","me?\"","mean","measur","measurable.","media","mediainfo","meet","meetup","megapixel","meld","member","memes,","memori","memory,","mention","mentor","merg","messag","message.","metadata","metadata,","metadata.","meterpret","method","methodolog","methods.","micro","microsoft","microsoft'","mike","mileag","milk","mime","mind","mind.","mine","miner,","minim","mips,","mislead","miss","mistak","misus","mit","mkdir","mod","mode","mode:","model","modern","modif","modifi","modify,","modul","module,","module.","money","monthli","more","more,","more.","mors","motiv","mount","move","moyer","moyer'","mp3)","mp4)","much","multimon","multipl","multiplex","multipli","mutabl","myer","mysteri","myth","n","name","name).","narrow","nasm","nathan","nativ","natur","nature.","navig","ne","near","nearli","necessari","need","needl","neglect:","network","network+","network/host","neutral","never","new","newer","newest","newspap","next","next.","ng","ngrep.","nick","nm","no.","nodej","non","nop,","normal","not),","note","note:","nothing.","notic","novelti","now","now,","now.","npm","nsa","ntfs,","number","numbering.xml","numbers\"","numer","nysec.","nyu","o","o'reilli","o'reilly.","obfusc","objcopy,","objdump,","object","objects\"","obscur","obsess","obsolet","obtain","occasion","occasionally,","occupi","occur","ocean","of=./extracted_file.xxx","offens","offense.","offer","offic","office:","officedissector","offset","offset),","offsets.","offsets:","ol","older","ole,","oletools.","on","on,","on.","onc","ones,","ones.","ongoing.","onlin","online,","online.","only.","ooxml","ooxml)","open","open('itsreversed',","open('reverseit',","oper","operate.","opinion","oppos","option","order","organ","organization:","organized.","orient","origami.","origin","os","others,","otherwis","ought","ourselves,","out","out,","out.","outlin","output","output,","output.zip","outsid","outweigh","over","overflow","overlap","overthewir","overview","overview,","owasp","own.","p","pack","pack\"","packag","packet","packets,","packettot","pad","page","page,","page.","paid","painless","panel","panel,","paper.","parlement","pars","parser,","part","parti","partial","particip","particular","particular).","particular,","partit","partition),","password","passwords,","past","patch","path","path/to/test.docx","pattern","patterns,","patterns.","paus","pay","payload","pcap","pcapfix.","pcapng","pcapng)","pcapng:","pdf","pdf,","pdf.","pdf:","peda,","peepdf,","penetr","pentest.cryptocity.net","pentesting,","peopl","percentages.","perform","perform/impl","permiss","persist","person","perspect","perspective\"","persuasive.","phase","philosophi","philosophy?","phish","phone","photo","php","php.","pick","picoctf","piec","pillow.","pipe","pitch,","pitfal","pixel","place","place.","plaid","plaidctf","plain","platform","platforms.","play","play,","playback","playback.","player","player,","player.","pleas","plu","plugin","plugins:","png","png)","png.","pngcheck.","pngtool","point","poli","polici","policy,","poly.","pop","pop(),","popul","popular","port","possibl","possible).","possible.","post","potenti","power","powerpc","powershel","ppt),","pptx).","practic","practiction","pre","predomin","premier","prep","prepar","preponder","presenc","present","present).","present,","present.","preview","previou","pride","primari","primarili","primer","primit","principl","print(c)","printabl","privaci","privileg","pro","pro.","probabl","probably:","problem","problems.","process","process,","processes,","processing:","processor","produc","product","profession","professional,","professional.","profil","program","program'","program,","program.","program;","programm","programmat","programmer'","programmer,","programming,","programs,","programs.","progress","prohibit","project","promis","prone","proof","propos","proprietari","protect","protecting?","protocol","protocols,","protocols.","provid","provide.","provided.","proxi","pro|","ptacek","public","publicli","publish","pull","purpos","put","puzzl","puzzles.","pwni","pwning","pyershark","python","python'","python)","python,","python.","qpdf","qr","qrtool","qualiti","question","quick","quickli","quinn","r","rais","ran","random","rang","rank","rar","rar,","rare","rather,","ray","re","reach","read","readelf,","reader,","readi","readme.md","real","realist","realli","reason","reassembl","receiv","recogn","recommend","recommend:","recommended.","reconstruct","recov","recover/reconstitut","red","reddit","reduc","refer","reference.","refin","reflect","regardless,","regex","region","regist","relat","relationships,","relev","rememb","remember,","remot","remove(),","repair","repositori","repository.","repres","represent","republish","requir","requisit","research","resid","resize,","resourc","respond","respons","response.","rest","restor","result","resume,","retain","return","reus","reveal","revers","reverse(),","reverse,","reversing,","review","rewrit","rgb","rgba,","rigor","risk","rittenhous","role","role,","role.","role/employ","roles:","rom","ronin","rootkit","rop","rop.","rop?","rop_mix","ropgadget","round","routine,","rp","rpi","rpisec","rtf,","rtfn","rubi","ruef","run","running,","runtim","rw","s","s:","said,","sale","sales.","same","same.","samurai","saniti","save","scale","scalpel,","scenario","scenario,","schedul","schedule.","scheme","schemes.","school","scienc","science.","scitool","scope","score","screenshot.png","screenshot.png:","script","scripts).","scripts.","search","search,","second","secret","secret.","section","section.","secur","security+","security,","security.","security:","see","see,","seek","seemingli","seen","select","sell","send","separ","sequenc","seri","serv","server","server)","servers)","servers,","servic","session","set","set.","settings.","settings.xml","setup","sever","shacham","shawn","sheet","shell","shellcod","shellcode,","short","short,","shortcut","shortsight","show","siberia","siberia'","sign","signific","similar","similarly,","simpl","simpli","simplifi","simul","singl","single,","site","situat","size","size)","sizes),","skill","skills,","skip=1335205","sleuth","sleuthkit","slide","slot.","slow","small","small,","smart","smartphon","smashthestack","smuggl","snapshot","snippet","snort.","so,","soc","socat","socat.","social","soffic","softwar","solv","solve.","someon","someth","sometim","somewhat","somewher","sonic","sophist","sophisticated,","sotirov","sourc","source,","sox","space","space.","sparc.","speak","speaker'","speaker.","speaking,","special","specif","specifi","specific)","spectogram","spend","spent","spirit","split","split(),","sql","squashf","ssl","staff","stage","stand","standard","standpoint?","stanford","start","state","statement","static","static).","statist","stay","stealth","stealthi","steganograph","steganographi","steganography,","stegonagraphi","stegsolv","step","steven","stick","still","stitch","store","str","strategi","strategy,","stream","streamed;","streams.","string","strings,","strings.","strings:","strip","strong","strongli","structur","structured,","structures,","student","studi","stuxnet","style","styles.xml","styleswitheffects.xml","sub","subdivid","subject.","submission.","submit","substitut","subvert","succe","success","success.","successfulli","such","sudo","suffice,","suffix","suggestions!","suit","suitabl","supplement","support","supported.","suppos","sure","surgic","suspect","symbol","synonym","syntax,","system","system,","system.","systems'","systems.","systems:","t","tables,","tactic","take","talent","talent.","talk","tangl","tantamount","taossa","tar","target","task","task,","tasks,","tasks.","tcpdump","tcpxtract,","teach","team","teams,","teaser","tech","technic","technical)","technically,","techniqu","techniques,","technolog","technologist","technologists,","tell,","templated)","tend","term","termin","test","testdisk:","tester","testing,","testing.","text","text\"),","text,","text,\"","text.","tgz","tgz)","that,","that’","them,","them.","them?","theme","theme1.xml","themselv","then,","theoret","there'","there.","therefore,","there’","these,","thing","think","third","this.","those","though!","though.","thought","thread","threat\"","three","through","thumbnail","thumbnail.jpeg","time","time.","timelin","times,","tip","titl","tl","tml","today","togeth","toler","tom","tone","too.","tool","tool,","tool.","toolkit","toolkit.","tools,","tools.","toolset","toolsmith","top","topic","topics,","toward","toy","trace","track","tradecraft","tradecraft.","tradecraft:","tradit","traffic","traffic,","trail","train","transfer","transform","translat","transmit","travers","tree","trees)","tri","triag","triage,","trick","trickeri","tricks.","trid","trope","troubl","truncated:","trust","tshark,","two","two.","type","type,","typic","typically,","u2ei4hb","ubuntu","ucsb","ucsd","uic","ultim","umd","unalloc","uncertain","uncontrol","uncov","undelet","under","understand","understand,","understanding,","unencrypted/uncompress","unfamiliar","unicod","uniqu","univers","university,","unix","unix/linux","unlik","unnotic","unorthodox","unpack","unravel","unrealist","unrel","unus","unzip","up","updat","updating.]","upon","upper","url,","us","us.","usag","usage,","usage.","use.","used,","used.","useful.","user","users,","users.","usual","ut","utf","util","v","valu","value.","variabl","variant","variations,","varieti","variou","vary.","vba","vendor","veri","verifi","version","vessel","video","view","view,","violat","virginia.","virtual","visibl","visit","visual","visualis","vm).","vm.","vmware","volatil","volatility.","voltron","volum","volume,","von","vrt:","vs","vulner","vulnerabilities,","vulnerabilities.","vulnerabl","w","walkthrough","walkthrough.","want","want,","wargam","wargame.","warn","wast","watch","water","wav,","waveform","waveforms,","way","way,","way?","we'll","we'r","we'v","weakness.","web","web,","web:","webapp","websettings.xml","websit","website:","week","week,","week.","weekend:","welcom","welcome!","well","west","we’ll","we’r","we’v","whatev","wherein","whether","which,","white","width","wiki","wikibook","will","win","windbg","window","windows,","windows.","wirepy.","wireshark","wireshark'","wireshark,","wireshark.","with.","within","without","wolfgang","won't","wonder","word","word/_rels/document.xml.rel","word/comments.xml","word/document.xml","word/fonttable.xml","word/numbering.xml","word/settings.xml","word/styles.xml","word/styleswitheffects.xml","word/theme/theme1.xml","word/websettings.xml","work","work,","work.","works,","works.","workshop","workshop,","workshop.","world","world!","world!\")","world\")","world,","world.","world\\!","worri","worst","worth","write","write.","written","wrong","wrote","x","x86","x86.","xls,","xlsx,","xml","xml\"","xplico","xss","xss,","xxd","xyz","yang","year","year.","years,","years.","yet?","york","you'll","you'r","you'v","you,","you.","yourself","you’ll","you’r","you’v","z.","zero","zhiqiang","zip","zip,","zipdetail","zipinfo","zlib","zovi","zsteg.","|","|....$iccpicc","|.............@=.|","|.g..q..a.y.....9|","|.png........ihdr|","|file..x..y.8u]..|","–","‘captur","‘gadgets’","“binari","“defuse”","“know","“revers","│","└──","├──","😉"],"pipeline":["stopWordFilter","stemmer"]},"store":{"./":{"url":"./","title":"Introduction","keywords":"","body":"CTF Field Guide\n\n“Knowing is not enough; we must apply. Willing is not enough; we must do.” - Johann Wolfgang von Goethe\n\nWelcome!\nWe’re glad you’re here. We need more people like you.\nIf you’re going to make a living in defense, you have to think like the offense.\nSo, learn to win at Capture The Flag (CTF). These competitions distill major disciplines of professional computer security work into short, objectively measurable exercises. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft.\nWhether you want to succeed at CTF, or as a computer security professional, you’ll need to become an expert in at least one of these disciplines. Ideally in all of them.\nThat’s why we wrote this book.\nIn these chapters, you’ll find everything you need to win your next CTF competition:\n\nWalkthroughs and details on past CTF challenges\nGuidance to help you design and create your own toolkits\nCase studies of attacker behavior, both in the real world and in past CTF competitions\n\nTo make your lives easier, we’ve supplemented each lesson with the Internet’s best supporting reference materials. These come from some of the best minds in the computer security field. Looking ahead, we hope you’ll collaborate to keep this book evolving with the industry.\nWe’ve tried to structure this so you can learn as quickly as you want, but if you have questions along the way, contact us. We’ll direct your question to the most relevant expert. If there’s enough demand, we may even schedule an online lecture.\nNow, to work.\n-The Trail of Bits Team\n"},"intro/":{"url":"intro/","title":"Capture the Flag","keywords":"","body":"Capture the Flag\n\n\nWhy CTF?\nComputer security represents a challenge to education due to its interdisciplinary nature. Topics in computer security are drawn from areas ranging from theoretical aspects of computer science to applied aspects of information technology management. This makes it difficult to encapsulate the spirit of what constitutes a computer security professional.\nOne approximation for this measure has emerged: the ‘capture the flag’ competition. Attack-oriented CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft.\nA modern computer security professional should be an expert in at least one of these areas and ideally in all of them. Success in CTF competitions demands that participants be an expert in at least one and ideally all of these areas. Therefore, preparing for and competing in CTF represents a way to efficiently merge discrete disciplines in computer science into a focus on computer security.\n"},"intro/find.html":{"url":"intro/find.html","title":"Find a CTF","keywords":"","body":"Capture the Flag\nFind a CTF\nIf you ever wanted to start running, you were probably encouraged to sign up to a 5k to keep focused on a goal. The same principle applies here: pick a CTF in the near future that you want to compete in and come up with a practice schedule. Here are some CTFs that we can recommend:\n\nPicoCTF and PlaidCTF by CMU\nHSCTF is made for high school students\nGhost in the Shellcode (GitS)\nCSAW CTF by NYU-Poly\nUCSB iCTF is for academics only\nDefcon CTF\n\nVisit CTF Time and the CapCTF calendar for a more complete list of CTFs occuring every week of the year.\nHow is a Wargame different?\nWargames are similar to a CTF but are always ongoing. Typically, they are organized into levels that get progressively harder as you solve more of them. Wargames are an excellent way to practice for CTF! Here are some of our favorites:\n\nMicro Corruption\nSmashTheStack\nOverTheWire\nExploit Exercises\n\nWhat about CCDC?\nThere are some defense-only competitions that disguise themselves as CTF competitions, mainly the Collegiate Cyber Defense Challenge (CCDC) and its regional variations, and our opinion is that you should avoid them. They are unrealistic exercises in frustration and will teach you little about security or anything else. They are incredibly fun to play as a Red Team though!\n"},"intro/careers.html":{"url":"intro/careers.html","title":"Find a Job","keywords":"","body":"Career Cheatsheet\n[Editor's note: this is an older article written for pentest.cryptocity.net and that we are in the process of updating.]\nThese are my views on information security careers based on the experience I've had and your mileage may vary. The information below will be most appropriate if you live in New York City, you're interested in application security, pentesting, or reversing, and you are early on in your career in information security.\n\nEmployers\nRoles\nLearn from a Book\nLearn from a Course\nUniversity\nCommunication\nMeet People\nConferences\nCertifications\nLinks\nFriends of the Guide\n\nEmployers\nAs far as I can tell, there are five major employers in the infosec industry (not counting academia).\n\nThe Government\nNon-Tech Fortune 500s (mostly finance)\nBig Tech Vendors (mostly West coast)\nBig Consulting (mostly non-technical)\nSmall Consulting (mostly awesome)\n\nThe industry you work in will determine the major problems you have to solve. For example, the emphasis in finance is to reduce risk at the lowest cost to the business (opportunities for large-scale automation). On the other hand, consulting often means selling people on the idea that X is actually a vulnerability and researching to find new ones.\nRoles\nI primarily split up infosec jobs into internal network security, product security, and consulting. I further break down these classes of jobs into the following roles:\n\nApplication Security (code audits/app assessments)\nAttacker (offensive)\nCompliance\nForensics\nIncident Handler\nManager\nNetwork Security Engineer\nPenetration Tester\nPolicy\nResearcher\nReverse Engineer\nSecurity Architect\n\nThe roles above each require a different, highly specialized body of knowledge. This website is a great resource for application security and penetration testing, but you should find other resources if you are interested in a different role.\nLearn from a Book\nFortunately, there are dozens of good books written about each topic inside information security. Dino Dai Zovi and Tom Ptacek both have excellent reading lists. We recommend looking at:\n\nGray Hat Hacking\nThe Myths of Security\nHacking: The Next Generation\nand any book from O'Reilly on a scripting language of your choice\n\nIf you're not sure what you're looking for, then you should browse the selection offered by O'Reilly. They are probably the most consistent and high-quality book publisher in this industry.\nDon't forget that reading the book alone won't give you any additional skills beyond the conversational. You need to practice or create something based on what you read to really gain value and understanding from it.\nLearn from a Course\nIf you're looking for something more hands-on and directed, there are lots of university courses about information security available online. I listed some of the best ones that have course materials available below (ordered by institution name). The RPI course is the most similar to this one and Hovav gets points for the best academic reading list, but every course on this list is fantastic.\n\n\n\nCourse\nInstructor(s)\nInstitution\n\n\n\n\nSecure Software Principles\nRPISEC\nRPI\n\n\nModern Binary Exploitation\nRPISEC\nRPI\n\n\nComputer Security\nvarious\nBerkeley\n\n\nComputer and Network Security\nDan Boneh\nStanford\n\n\nWeb Programming and Security\nDan Boneh\nStanford\n\n\nIntro to Web Application Security\nEdward Z. Yang\nMIT\n\n\nIntro to Software Exploitation\nNathan Rittenhouse\nMIT\n\n\nUNIX Security Holes\nD. J. Bernstein\nUIC\n\n\nMalware Analysis and Antivirus Technologies\nvarious\nTML\n\n\nSystem Security and Binary Code Analysis\nZhiqiang Lin\nUT Dallas\n\n\nCybersecurity Specialization\nvarious\nUMD\n\n\nGraduate Computer Security\nHovav Shacham\nUCSD\n\n\n\nUniversity\nThe easiest shortcut to finding a university with a dedicated security program is to look through the NSA Centers of Academic Excellence (NSA-COE) institution list. This certification has become watered down as more universities have obtained it and it might help to focus your search on those that have obtained the newer COE-CO certification. Remember, certifications are only a guideline. You should look into the actual programs at each university instead of basing your decision on a certification alone.\nOnce in university, take classes that force you to write code in large volumes to solve hard problems. IMHO the courses that focus on mainly theoretical or simulated problems provide limited value. Ask upper level students for recommendations if you can't identify the CS courses with programming from the CS courses done entirely on paper. The other way to frame this is to go to school for software development rather than computer science.\nCapture the Flag\nIf you want to acquire and maintain technical skills and you want to do it fast, then you should play in a CTF or jump into a wargame. The one thing to note is that many of these challenges attach themselves to conferences (of all sizes), and by playing in them you will likely miss the entire rest of the conference. Try not to over do it, since conferences are useful in their own way (see the rest of the career guide).\nThere are some defense-only competitions that disguise themselves as normal CTF competitions, mainly the Collegiate Cyber Defense Challenge (CCDC) and its regional variations, and my opinion is that you should avoid them. They are exercises in system administration and frustration and will teach you little about security or anything else. They are incredibly fun to play as a Red Team though.\nCommunication\nIn any role, the majority of your time will be spent communicating with others, primarily through email and meetings and less by phone and IM. The role/employer you have will determine whether you speak more with internal infosec teams, non-security technologists, or business users. For example, expect to communicate more with external technologists if you do network security for a financial firm.\nTips for communicating well in a large organization:\n\nLearn to write clear, concise, and professional email.\nLearn to get things done and stay organized. Do not drop the ball.\nLearn the business that your company or client is in. If you can speak in terms of the business, your arguments a) to not do things b) to fix things and c) to do things that involve time and money will be much more persuasive.\nLearn how your company or client works, ie. key individuals, processes, or other motivators that factor into what gets things done.\n\nIf you are still attending a university, as with CS courses, take humanities courses that force you to write.\nMeet People\nFind and go to your local CitySec, an informal meetup without presentations that occurs once monthly in most cities. At Trail of Bits, we attend our local NYSEC.\nISSA and ISC2 focus on policy, compliance and other issues that will be of uncertain use for a new student in this field. Similarly, InfraGard mainly focuses on non-technical law enforcement-related issues. OWASP is one of the industry's worst examples of vendor capture and is less about technology and more about sales.\nConferences\nIf you've never been to an infosec conference before, use the google calendar below to find a low-cost local one and go. There have been students of mine who think that attending a conference will be some kind of test and put off going to one for as long as possible. I promise I won't pop out of the bushes with a final exam and publish your scores afterward.\n\nInformation Security Conferences Calendar\n\nIf you go to a conference, don't obsess over attending a talk during every time slot. The talks are just bait to lure all the smart hackers to one location for a weekend: you should meet the other attendees! If a particular talk was interesting and useful then you can and should talk to the speaker. This post by Shawn Moyer at the Defcon Speaker's Corner has more on this subject.\nIf you're working somewhere and are having trouble justifying conference attendance to your company, the Infosec Leaders blog has some helpful advice.\nCertifications\nThis industry requires specialized knowledge and skills and studying for a certification exam will not help you gain them. In fact, in many cases, it can be harmful because the time you spend studying for a test will distract you from doing anything else in this guide.\nThat said, there are inexpensive and vendor-neutral certifications that you can reasonably obtain with your current level of experience to help set apart your resume, like the Network+ and Security+ or even a NOP, but I would worry about certifications the least in your job search or professional development.\nIn general, the two best reasons to get certifications are:\n\nIf you are being paid to get certified, through paid training and exams or sometimes through an automatic pay raise after you get the certification (common in the government).\nIf your company or your client is forcing you to get certified. This is usually to help with a sales pitch, ie. \"You should hire us because all of our staff are XYZ certified!\"\n\nIn general, it is far more productive to spend time playing in a CTF, then using your final standing as proof that you're capable.\nLinks\n\nReddit and Hacker News threads about this post\nSecurity Advice\n\nHow to Break Into Security, Ptacek Edition\nVRT: How to Become an Infosec Expert, Part I\nFive pieces of advice for those new to the infosec industry\nHow to Milk a Computer Science Education for Offensive Security Skills\nKill Your Idols, Shawn Moyer's reflections on his first years at Defcon\n\n\nThoughts on Certifications\n\nMy Canons of (ISC)2 Ethics\nNot a CISSP\n(ISC)2's Newest Cash Cow\nWhy You Should Not Get a CISSP\n\n\nGeneral Tech Advice\nAdvice for Computer Science College Students\nDon't call yourself a programmer, and other career advice\nThe answer to \"Will you mentor me?\" is .... no.\n\n\n\n"},"vulnerabilities/":{"url":"vulnerabilities/","title":"Vulnerability Discovery","keywords":"","body":"Vulnerability Discovery\n\n"},"vulnerabilities/source.html":{"url":"vulnerabilities/source.html","title":"Auditing Source","keywords":"","body":"Auditing Source Code\nThis module is about getting familiar with vulnerabilities that manifest in applications that compile to native code. An accurate and complete understanding of an application written in a compiled language cannot be achieved without learning about how the compiler transforms source to machine code and how processors execute that code. An easy way to gain experience with these transforms is by reverse engineering compiled variants of your own code or of projects with source code available. At the end of this module you will be able to identify vulnerabilities in compiled languages like C and C++.\nVulnerabilities are commonly identified in large software packages due to their use of third-party software libraries. Common examples include libraries like libxml, libpng, libpoppler, and libfreetype that parse complicated file formats and protocols. Each of these libraries have historically been prone to software flaws that make the applications using them vulnerable to attack. It doesn't help that most software packages fail to update these libraries when new versions come out, making it significant easier to find known vulnerabilities to apply in these cases.\nLecture\n\nSource Code Auditing I\nSource Code Auditing II\n\nWorkshop\nIn order to practice your skills, we recommend going through the process of identifying as many vulnerabilities as you can in an intentionally vulnerable toy application and then moving on to a real application and doing the same.\nThe Newspaper application is a small server written in C that allows authenticated users to read and write articles to a remote file system. Newspaper is written in such a way that it is vulnerable to many different attacks. You should be capable of identifying at least 10 bugs or potential vulnerabilities in this code.\n\nNewspaper App\nNewspaper App Installer\n\nWireshark, however, is an industry standard network protocol analyzer that has been under continuous development since 1998. Vulnerabilities in this code base are much fewer and far between than in the Newspaper app however many still exist. Take a look at the wireshark security page, find the name of a protocol dissector and see if you can independently discover the vulnerability without looking at the details. Dissectors are located in /epan/dissectors/ folder.\n\nWireshark 1.8.5\n\nTools\nWhen auditing, it is helpful to use a tool design to profile and navigate the codebase. Below are two tools, Source Navigator and Understand, designed to help analysts get familiar with code quickly by collecting and displaying information about data relationships, API usage, design patterns and control flow. An example of a useful diffing tool is also listed below. One example of a free, open source code auditing tool is the Clang Static Analyzer, which can help you track down programming errors in common APIs and vulnerable programming patterns.\n\nSource Navigator\nScitools Understand\nMeld\nClang Static Analyzer\n\nResources\nMake sure you’re intimately familiar with the internals of the languages you target for analysis. Vulnerabilities are found by auditors who are more familiar with the language and the codebase than the programmers that originally developed it. In some cases, this level of understanding can be achieved simply by paying attaching to optional compiler warnings or through the use of third-party analysis tools that help track down common programming errors. Computer security is tantamount to computer mastery. Without a rigorous understanding of your targets you can never hope to defeat them.\n\nEssential C - Programming in C primer\nTAOSSA Chapter 6: C Language Issues - Strongly recommended reading\nInteger Overflow\nWireshark Security - Examples of lots of vulnerablities\nGera's Insecure Programming by Example - Examples of small vulnerable C programs\n\n"},"vulnerabilities/binary.html":{"url":"vulnerabilities/binary.html","title":"Auditing Binaries","keywords":"","body":"Auditing Binaries\nYou’ve made it all the way down to the native layer, this is what software is after you pull off all the covers. The flavor of native code we’re going to focus on today is 32-bit Intel x86. Intel processors have been a powerful force in personal computing since the 80’s and currently predominate desktop and server market. Understanding this instruction set will give you some insight into how the programs you use every day operate as well as provide a reference point for when you encounter other instruction sets like ARM, MIPS, PowerPC and SPARC.\nThis module is about becoming familiar with the native layer and developing strategies for understanding, analyzing and interpreting native code. By the end of this module you should be capable of performing a “reverse compilation” -- going from assembly fragments to statements in higher level languages -- and, in the process, deriving meaning and programmer intent.\nLecture\nLearning x86 can appear daunting at first and requires some dedicated study to master. We recommend reading Chapter 3 of \"Computer Systems: A Programmer's Perspective\" to learn how C programs get compiled into machine code. Once you you have some basic, working knowledge of this process then keep a handy reference guide around like the x86 Assembly Guide from the University of Virginia. We've found this video series from Quinn Liu to be a quick and painless introduction too.\n\nCS:APP Chapter 3: Machine-Level Representation of Programs\nx86 Assembly Guide\nIntroduction to x86 Assembly\n\nWorkshop\nThe following programs are both “binary bombs.” Reverse engineer the following linux programs to identify the series of inputs that will “defuse” the bomb. Each successive level of the bomb focuses on a different aspect of native code. For example, in the lab from CMU you will encounter different data structures (linked lists, trees) as well as how control flow structures (switches, loops) manifest in native code. While reversing these programs you may find it useful to keep track of your progress by transforming what you see into C or another high level language.\nYou should aim to solve at least eight stages between the two labs. The CMU bomb lab has a secret phase and the RPI bomb lab has a phase that involves memory corruption, can you find and solve them?\n\nCMU Binary Bomb Lab\nRPI Binary Bomb Lab\n\nTools\nThe two essential tools for working with native code are the debugger and the disassembler. We recommend you become familiar with the industry standard disassembler: IDA Pro. IDA will divide code into discrete chunks corresponding to the functions defined in the program's source code. Each function is then further subdivided into \"basic blocks\" defined by instructions that alter control flow. This makes it easy to identify loops, conditionals, and other control flow constructs at a glance.\nDebuggers allow you to interact with and examine the state of running code by setting breakpoints and examining memory and register contents. You may find this useful as a sanity check if you are not seeing the results you expect your input to produce but be alert, some programs employ anti-debugger techniques and can modify program behavior in the presence of a debugger. The GNU Debugger (gdb) is the standard debugger for most linux systems. gdb can be acquired through the package manager in your chosen linux distribution.\n\nIDA Pro Demo\ngdb\n\nResources\nMany good resources exist for learning x86 assembly and the various tricks employed in capture the flag exercises. In addition to the resources above, the x86 Wikibook and the AMD instruction set manual are more complete reference guides you may want to refer to (we find the AMD manual can be less daunting than the corresponding manual from Intel).\n\nAMD64 Programmer's Manual: General-Purpose and System Instructions\nx86 Assembly Wikibook\nComputer Systems: A Programmer's Perspective (CS:APP)\n\nSome of the tools used for reverse engineering can be as complicated as assembly language itself. Cheatsheets that list out common commands and use cases can be helpful.\n\ngdb Quick Reference\nIDA Quick Reference\nWinDBG x86 Cheat Sheet\n\nFinally, many capture the flag challenges will make use of anti-debugging and anti-disassembly techniques to hide or obfuscate the goal. Several of these techniques are employed by the bomb labs but you may want a more complete reference.\n\nLinux anti-debugging techniques\nThe \"Ultimate\" Anti-Debugging Reference\n\n"},"web/vulnerabilities.html":{"url":"web/vulnerabilities.html","title":"Auditing Webapps","keywords":"","body":"Auditing Web Applications\nWelcome to the web hacking module. This module is about getting familiar with vulnerabilities commonly found in web applications. At the end of this module you will be able to identify common vulnerabilities in web based applications using a variety of testing methodologies and source level auditing. The lecture material will give you all the tools you need to successfully audit the workshop material.\nLecture\n\nWeb Hacking Part I\nWeb Hacking Part II\n\nWorkshop\nIn order to practice your skills, we recommend going through the process of finding and exploiting vulnerabilities in the Damn Vulnerable Web App (DVWA) and the Siberia Exploit Kit. DVWA is a collection of vulnerable test cases implemented in PHP and serves as an easy introduction to the many things that can go wrong in web applications. The Siberia Exploit Kit is a \"crimeware pack\" used by criminals to perform massive compromises. It includes a package of browser exploits and a command and control panel intended to manage compromised hosts. Siberia contains several pre- and post-authentication vulnerabilities that allow an attacker to gain administrative access to the panel, then take over the server on which it is hosted.\nDownload and run the OWASP Broken Web Apps virtual machine in VMware to start this workshop. BWA includes many web applications many for security testing, including DVWA. Once you have mastered DVWA, feel free to move on to other vulnerable web applications! Try auditing Siberia's source code to find the vulnerabilities, paying attention to sources of input in PHP.\n\nOWASP Broken Web Apps\nSiberia Crimeware Pack (pw: infected)\n\nTools\nBurp Suite is a local HTTP proxy intended for security testing. Burp Suite is made for web penetration testers and simplifies many common tasks in a point-and-click GUI. The features available in the free version are more than enough to complete this and many other web security challenges.\n\nBurp Suite\n\nResources\nMany simple testing methods and common web application flaws are available in the walkthrough. Ensure that you understand the fundementals of HTTP, HTML, and PHP to do well on this section.\n\nOWASP Top 10 Tools and Tactics\nThe Tangled Web: Chapter 3\nPHP Primer\n\n"},"exploits/":{"url":"exploits/","title":"Exploit Creation","keywords":"","body":"Exploit Creation\n\n"},"exploits/binary1.html":{"url":"exploits/binary1.html","title":"Binary Exploits 1","keywords":"","body":"Exploiting Binaries 1\nBinary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker. In this module we are going to focus on memory corruption. By abusing vulnerabilities that corrupt memory in software we can often rewrite critical application state information in a way that allows us to elevate privileges inside the context of a particular application (like a remote desktop server) or perform arbitrary computation by hijacking control flow and running code of our choosing.\nIf you're trying to find bugs in compiled C programs, it's important to know what you're looking for. Start with identifying where the data you send to the program is used. If your data is stored in a buffer, take note of the sizes of them. Programming in C without errors is very difficult and the CERT C Coding Standard catalogues many of the ways that errors can come about. Paying attention to commonly misused APIs can be a quick path to success.\nOnce a vulnerability is identified it should be used to compromise the integrity of the program, however, there are a variety of ways to achieve this goal. For programs such as web servers, obtaining the information from another user may be the end goal. In others, changing your permissions may be helpful, for example changing the permissions of a local user to the administrator.\nLecture\nThe first lecture, Memory Corruption 101, provides background and step-by-step explanation of exploiting an overflow on Windows. The second lecture, Memory Corruption 102, covers more advanced topics, including web browser exploitation. Both of these lectures use Windows-specific examples but the techniques and process are applicable across operating systems that use the x86 instruction set. Remember that the names of functions and sometimes the calling conventions will be different when you are working with UNIX/Linux binaries.\n\nMemory Corruption 101\nMemory Corruption 102\n\nTools\nWe recommend using GDB to debug the challenges in this module since all of them are compiled for 32-bit Linux, however, GDB is intended for debugging source code, not stripped binaries without symbols and debugging information. Projects such as GEF, peda, and voltron are attempts at making gdb more useful for debugging when source code is not available. We recommend making a .gdbinit file in your home directory with at least the following commands:\n set disassembly-flavor intel\n set follow-fork-mode child\nWorkshop\nIn order to run these challenges, you'll need to setup an Ubuntu 14.04 (32-bit) virtual machine. We recommend using VMware Player, since it's free and well supported. When you have it running, open a terminal and install socat with command sudo apt-get install socat.\nThere are three challenges in this workshop, each contained within this folder when you clone this repository in git. The ultimate goal of each challenge is to manipulate the executable into reading the flag to you. For each challenge, try to translate the disassembly into C code. After making an attempt, you can verify your guess by checking the actual C source provided. Then, try to exploit it to read you the flag.\nChallenge: Easy\nMake sure the flag is in the same directory as the easy program. Once you execute easy it will listen for instructions on port 12346.\nChallenge: Social\nSimilar to easy, make sure the flag and host.sh are in the same directory as social program. Once you execute social it will listen for instructions on port 12347.\nResources\n\nUsing GDB to Develop Exploits - A Basic Run Through\nExploiting Format String Vulnerabilities\nLow-level Software Security: Attacks and Defenses\n\n"},"exploits/binary2.html":{"url":"exploits/binary2.html","title":"Binary Exploits 2","keywords":"","body":"Exploiting Binaries 2\nIn this module, we continue to examine the ways that native applications can be exploited and focus on using return-oriented programming (ROP) to achieve that goal. ROP is the process of stitching together existing executable fragments of code ending in a return instruction. By creating chains of addresses of these ‘gadgets’ one can write new programs without introducing any new code.\nKeep in mind that you will need to be flexible in identifying methods to exploit programs. Sometimes it’s necessary to abuse a vulnerability multiple times in the course of an exploit. At times, you may only want to use a ROP bridge to make your shellcode executable and, at others, you may want to use a payload written entirely in ROP. Occasionally, the layout of memory makes unorthodox methods of exploitation favorable. For example, have you considered manufacturing an uncontrolled format string vulnerability using ROP?\nLecture\nThe lectures this week will discuss return oriented programming (ROP) and code reuse to bypass protections that disallow the execution of attacker-provided data. These lectures go into much greater detail on exploitation and build upon some of what was discussed last week.\n\nReturn Oriented Exploitation\nPayload already inside data re-use for ROP exploits (Linux-specific)\n\nWorkshop\nSimilar to the previous lesson, there are two executable files located in this folder when you clone the repository. Exploits for each of these programs will require the use of return-oriented programming to read the flags. This week, there is no access to source code provided. You will need to reverse engineer the binaries to discovery the vulnerabilities and the techniques required to exploit them. Use the same Ubuntu 14.04 (32-bit) virtual machine as the previous lesson.\nChallenge: brute_cookie\nRun the bc program. It will listen on port 12345.\nChallenge: space\nRun host.sh in the same directory as the space program. It will listen on port 12348.\nChallenge: rop_mixer\nRun host.sh in the same directory as the rop_mixer program. It will listen on port 12349.\nTools\nRefer to the tools from last week. If you haven't already, you should become familiar with the binutils suite for *NIX. Tools like readelf, strings, objdump, objcopy, and nm are frequently helpful. Use your package manager and the manpages to install and read about their use.\nSeveral tools exist to aid specifically in the creation of exploits that reuse code. They are more specialized than a standard disassembler because they look for executable snippets of code suitable as ROP gadgets (between instructions, in .rodata, etc).\n\nRP\nROPGadget\nBISC - Simple tool covered in the lecture\n\nResources\n\nx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique\nSurgically returning to randomized lib(c)\nExtensive security reference\nDartmouth College: Useful Security and Privacy links\nCorelan Team Blog\n\n"},"web/exploits.html":{"url":"web/exploits.html","title":"Webapp Exploits","keywords":"","body":"Web Exploitation\nThis module follows up on the previous auditing web applications module. In this module we will focus on exploiting those vulnerabilities. By the end of this module you should be comfortable identifying and exploiting the OWASP Top 10.\nLecture\nWe covered the basics in the previous section on web security, so now we can dive into some more capable tools to achieve greater effects in this module. Learn to master Burp Suite and the Chrome Developer tools to gain a greater understanding of the applications you interact with. BeEF is an example of an XSS proxy and it will pay off to look through its source code and learn how it works.\n\nBurp Suite Training\nChrome Dev Tools\nFrom XSS to reverse shell with BeEF\n\nWorkshop\nYou have been tasked with auditing Gruyere, a small, cheesy web application. Gruyere is available through and hosted by Google. It includes exercises for exploiting many classes of web-specific vulnerabilities including XSS, SQL injection, CSRF, directory traversal and more. For each challenge you can find hints, exploits and methods to patch the vulnerable code.\nReferences\n\nGoogle Chrome Console\nOWASP Top 10 Tools and Tactics\nThe Tangled Web: Chapter 3\nPHP Primer\n\nTools\nSQL Map and BeEF are powerful tools and very fun to play around with but ultimately not needed for the exercise. If you insist on playing with BeEF on, then please try not to hook other users auditing the application.\n\nBurp Suite\nSQL Map\nThe Browser Exploitation Framework (BeEF)\n\n"},"forensics/":{"url":"forensics/","title":"Forensics","keywords":"","body":"Forensics\n\n\nIn a CTF context, \"Forensics\" challenges can include file format analysis, steganography, memory dump analysis, or network packet capture analysis. Any challenge to examine and process a hidden piece of information out of static data files (as opposed to executable programs or remote servers) could be considered a Forensics challenge (unless it involves cryptography, in which case it probably belongs in the Crypto category). \nForensics is a broad CTF category that does not map well to any particular job role in the security industry, although some challenges model the kinds of tasks seen in Incident Response (IR). Even in IR work, computer forensics is usually the domain of law enforcement seeking evidentiary data and attribution, rather than the commercial incident responder who may just be interested in expelling an attacker and/or restoring system integrity.\nUnlike most CTF forensics challenges, a real-world computer forensics task would hardly ever involve unraveling a scheme of cleverly encoded bytes, hidden data, mastroshka-like files-within-files, or other such brain-teaser puzzles. One would typically not bust a criminal case by carefully reassembling a corrupted PNG file, revealing a photo of a QR code that decodes to a password for a zip archive containing an NES rom that when played will output the confession. Rather, real-world forensics typically requires that a practictioner find indirect evidence of maliciousness: either the traces of an attacker on a system, or the traces of \"insider threat\" behavior. Real-world computer forensics is largely about knowing where to find incriminating clues in logs, in memory, in filesystems/registries, and associated file and filesystem metadata. Also, network (packet capture) forensics is more about metadata analysis than content analysis, as most network sessions are TLS-encrypted between endpoints now.\nThis disconnect between the somewhat artificial puzzle-game CTF \"Forensics\" and the way that forensics is actually done in the field might be why this category does not receive as much attention as the vulnerability-exploitation style challenges. It may also lack the \"black hat attacker\" appeal that draws many players to participate in CTFs. Regardless, many players enjoy the variety and novelty in CTF forensics challenges. It can also be a more beginner friendly category, in which the playing field is evened out by the fact that there are no $5,000 professional tools like IDA Pro Ultimate Edition with Hex-Rays Decompiler that would give a huge advantage to some players but not others, as is the case with executable analysis challenges.\nRequisite Skills\nFor solving forensics CTF challenges, the three most useful abilities are probably:\n\nKnowing a scripting language (e.g., Python)\nKnowing how to manipulate binary data (byte-level manipulations) in that language\nRecognizing formats, protocols, structures, and encodings\n\nThe first and second you can learn and practice outside of a CTF, but the third may only come from experience. Hopefully with this document, you can at least get a good headstart.\nAnd of course, like most CTF play, the ideal environment is a Linux system with – occasionally – Windows in a VM. MacOS is not a bad environment to substitute for Linux, if you can accept that some open-source tools may not install or compile correctly.\nManipulating Binary Data in Python\nAssuming you have already picked up some Python programming, you still may not know how to effectively work with binary data. Low-level languages like C might be more naturally suited for this task, but Python's many useful packages from the open-source community outweigh its learning curve for working with binary data.\nHere are some examples of working with binary data in Python.\nWriting or reading a file in binary mode:\nf = open('Reverseit', \"rb\")\ns = f.read()\nf.close()\nf = open('ItsReversed', \"wb\")\nf.write(s[::-1])\nf.close()\n\nThe bytearray type is a mutable sequence of bytes, and is available in both Python 2 and 3:\n>>> s = bytearray(b\"Hello World\")\n>>> for c in s: print(c)\n...\n72\n101\n108\n108\n111\n32\n87\n111\n114\n108\n100\n>>>\n\nYou can also define a bytearray from hexidecimal representation Unicode strings:\nexample2 = bytearray.fromhex(u'00 ff')\n>>> example2\nbytearray(b'\\x00\\xff')\n>>> example2[1]\n255\n\nThe bytearray type has most of the same convenient methods as a Python str or list: split(), insert(), reverse(), extend(), pop(), remove(), etc.\nReading a file into a bytearray for processing:\ndata = bytearray(open('challenge.png', 'rb').read())\n\nCommon Forensics Concepts and Tools\nWhat follows is a high-level overview of some of the common concepts in forensics CTF challenges, and some recommended tools for performing common tasks.\nFile format identification (and \"magic bytes\")\nAlmost every forensics challenge will involve a file, usually without any context that would give you a guess as to what the file is. Filetypes, as a concept for users, have historically been indicated either with filetype extensions (e.g., readme.md for MarkDown), MIME types (as on the web, with Content-Type headers), or with metadata stored in the filesystem (as with the mdls command in MacOS). In a CTF, part of the game is to identify the file ourselves, using a heuristic approach.\nThe traditional heuristic for identifying filetypes on UNIX is libmagic, which is a library for identifying so-called \"magic numbers\" or \"magic bytes,\" the unique identifying marker bytes in filetype headers. The libmagic libary is the basis for the file command.\n$ file screenshot.png \nscreenshot.png: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced\nKeep in mind that heuristics, and tools that employ them, can be easily fooled. Because it is a CTF, you may be presented with a file that has been intentionally crafted to mislead file. Also, if a file contains another file embedded somewhere inside it, the file command is only going to identify the containing filetype. In scenarios such as these you may need to examine the file content more closely.\nTrID is a more sophisticated version of file. Although it's closed-source, it's free and works across platforms. It also uses an identification heuristic, but with certainty percentages. Its advantage is its larger set of known filetypes that include a lot of proprietary and obscure formats seen in the real world.\nFile carving\nFiles-within-files is a common trope in forensics CTF challenges, and also in embedded systems' firmware where primitive or flat filesystems are common. The term for identifying a file embedded in another file and extracting it is \"file carving.\" One of the best tools for this task is the firmware analysis tool binwalk. \nscalpel, now a part of SleuthKit (discussed further under Filesystems) is another tool for file-carving, formerly known as Foremost.\nTo manually extract a sub-section of a file (from a known offset to a known offset), you can use the dd command. Many hex-editors also offer the ability to copy bytes and paste them as a new file, so you don't need to study the offsets.\nExample of file-carving with dd from an file-offset of 1335205 for a length of 40668937 bytes:\n$ dd if=./file_with_a_file_in_it.xxx of=./extracted_file.xxx bs=1 skip=1335205 count=40668937\nAlthough the above tools should suffice, in some cases you may need to programmatically extract a sub-section of a file using Python, using things like Python's re or regex modules to identify magic bytes, and the zlib module to extract zlib streams.\nInitial analysis\nAt first you may not have any leads, and need to explore the challenge file at a high-level for a clue toward what to look at next. Some of the useful commands to know are strings to search for all plain-text strings in the file, grep to search for particular strings, bgrep to search for non-text data patterns, and hexdump.\nExample of using strings to find ASCII strings, with file offsets:\n$ strings -o screenshot.png\n 12 IHDR\n 36 $iCCPICC Profile\n 88 U2EI4HB\n...\n 767787 IEND\nUnicode strings, if they are UTF-8, might show up in the search for ASCII strings. But to search for other encodings, see the documentation for the -e flag. Beware the many encoding pitfalls of strings: some caution against its use in forensics at all, but for simple tasks it still has its place.\nExample of searching for the PNG magic bytes in a PNG file:\n$ bgrep 89504e47 screenshot.png \nscreenshot.png: 00000000\nExample of using hexdump:\n$ hexdump -C screenshot.png | less\n00000000 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 |.PNG........IHDR|\n00000010 00 00 05 ca 00 00 02 88 08 06 00 00 00 40 3d c9 |.............@=.|\n00000020 a4 00 00 18 24 69 43 43 50 49 43 43 20 50 72 6f |....$iCCPICC Pro|\n00000030 66 69 6c 65 00 00 58 85 95 79 09 38 55 5d f8 ef |file..X..y.8U]..|\n00000040 da 67 9f c9 71 0c c7 41 e6 79 9e 87 0c 99 e7 39 |.g..q..A.y.....9|\n:\nThe advantage of hexdump is not that it is the best hex-editor (it's not), but that you can pipe output of other commands directly into hexdump, and/or pipe its output to grep, or format its output using format strings.\nExample of using hexdump format strings to output the first 50 bytes of a file as a series of 64-bit integers in hex:\n$ hexdump -n 50 -e '\"0x%08x \"' screenshot.png\n0x474e5089 0x0a1a0a0d 0x0d000000 0x52444849 0xca050000 0x88020000 0x00000608 0xc93d4000 0x180000a4 0x43436924 0x43434950 0x6f725020 0x00006966\nOther uses of the hexdump command.\nBinary-as-text encodings\nBinary is 1's and 0's, but often is transmitted as text. It would be wasteful to transmit actual sequences of 101010101, so the data is first encoded using one of a variety of methods. This is what is referred to as binary-to-text encoding, a popular trope in CTF challenges. When doing a strings analysis of a file as discussed above, you may uncover this binary data encoded as text strings.\nWe mentioned that to excel at forensics CTF challenges, it is important to be able to recognize encodings. Some can be identifed at a glance, such as Base64 encoded content, identifiable by its alphanumeric charset and its \"=\" padding suffix (when present). There are many Base64 encoder/decoders online, or you can use the base64 command:\n$ echo aGVsbG8gd29ybGQh | base64 -D\nhello world!\nASCII-encoded hexadecimal is also identifiable by its charset (0-9, A-F). ASCII characters themselves occupy a certain range of bytes (0x00 through 0x7f, see man ascii), so if you are examining a file and find a string like 68 65 6c 6c 6f 20 77 6f 72 6c 64 21, it's important to notice the preponderance of 0x60's here: this is ASCII. Technically, it's text (\"hello world!\") encoded as ASCII (binary) encoded as hexadecimal (text again). Confused yet? 😉\nThere are several sites that provide online encoder-decoders for a variety of encodings. For a more local converter, try the xxd command.\nExample of using xxd to do text-as-ascii-to-hex encoding:\n$ echo hello world\\! | xxd -p\n68656c6c6f20776f726c64210a\nCommon File formats\nWe've discussed the fundamental concepts and the tools for the more generic forensics tasks. Now, we'll discuss more specific categories of forensics challenges, and the recommended tools for analyzing challenges in each category.\nIt would be impossible to prepare for every possible data format, but there are some that are especially popular in CTFs. If you were prepared with tools for analyzing the following, you would be prepared for the majority of Forensics challenges:\n\nArchive files (ZIP, TGZ)\nImage file formats (JPG, GIF, BMP, PNG)\nFilesystem images (especially EXT4)\nPacket captures (PCAP, PCAPNG)\nMemory dumps\nPDF\nVideo (especially MP4) or Audio (especially WAV, MP3)\nMicrosoft's Office formats (RTF, OLE, OOXML)\n\nSome of the harder CTF challenges pride themselves on requiring players to analyze an especially obscure format for which no publicly available tools exist. You will need to learn to quickly locate documentation and tools for unfamiliar formats. Many file formats are well-described in the public documentation you can find with a web search, but having some familiarity with the file format specifications will also help, so we include links to those here.\nWhen analyzing file formats, a file-format-aware (a.k.a. templated) hex-editor like 010 Editor is invaluable. An open-source alternative has emerged called Kaitai. Additionally, a lesser-known feature of the Wireshark network protocol analyzer is its ability to analyze certain media file formats like GIF, JPG, and PNG. All of these tools, however, are made to analyze non-corrupted and well-formatted files. Many CTF challenges task you with reconstructing a file based on missing or zeroed-out format fields, etc.\nYou also ought to check out the wonderful file-formats illustrated visually by Ange Albertini.\nArchive files\nMost CTF challenges are contained in a zip, 7z, rar, tar or tgz file, but only in a forensics challenge will the archive container file be a part of the challenge itself. Usually the goal here is to extract a file from a damaged archive, or find data embedded somewhere in an unused field (a common forensics challenge). Zip is the most common in the real world, and the most common in CTFs.\nThere are a handful of command-line tools for zip files that will be useful to know about.\n\nunzip will often output helpful information on why a zip will not decompress.\nzipdetails -v will provide in-depth information on the values present in the various fields of the format.\nzipinfo lists information about the zip file's contents, without extracting it.\nzip -F input.zip --out output.zip and zip -FF input.zip --out output.zip attempt to repair a corrupted zip file.\nfcrackzip brute-force guesses a zip password (for passwords \n\nZip file format specification\nOne important security-related note about password-protected zip files is that they do not encrypt the filenames and original file sizes of the compressed files they contain, unlike password-protected RAR or 7z files.\nAnother note about zip cracking is that if you have an unencrypted/uncompressed copy of any one of the files that is compressed in the encrypted zip, you can perform a \"plaintext attack\" and crack the zip, as detailed here, and explained in this paper. The newer scheme for password-protecting zip files (with AES-256, rather than \"ZipCrypto\") does not have this weakness.\nImage file format analysis\nCTFs are supposed to be fun, and image files are good for containing hacker memes, so of course image files often appear in CTF challenges. Image file formats are complex and can be abused in many ways that make for interesting analysis puzzles involving metadata fields, lossy and lossless compression, checksums, steganography, or visual data encoding schemes.\nThe easy initial analysis step is to check an image file's metadata fields with exiftool. If an image file has been abused for a CTF, its EXIF might identify the original image dimensions, camera type, embedded thumbnail image, comments and copyright strings, GPS location coordinates, etc. There might be a gold mine of metadata, or there might be almost nothing. It's worth a look.\nExample of exiftool output, truncated:\n$ exiftool screenshot.png \nExifTool Version Number : 10.53\nFile Name : screenshot.png\nDirectory : .\nFile Size : 750 kB\nFile Modification Date/Time : 2017:06:13 22:34:05-04:00\nFile Access Date/Time : 2017:06:17 13:19:58-04:00\nFile Inode Change Date/Time : 2017:06:13 22:34:05-04:00\nFile Permissions : rw-r--r--\nFile Type : PNG\nFile Type Extension : png\nMIME Type : image/png\nImage Width : 1482\nImage Height : 648\nBit Depth : 8\nColor Type : RGB with Alpha\nCompression : Deflate/Inflate\n...\nPrimary Platform : Apple Computer Inc.\nCMM Flags : Not Embedded, Independent\nDevice Manufacturer : APPL\nDevice Model : \n...\nExif Image Width : 1482\nExif Image Height : 648\nImage Size : 1482x648\nMegapixels : 0.960\nPNG files, in particular, are popular in CTF challenges, probably for their lossless compression suitable for hiding non-visual data in the image. PNG files can be dissected in Wireshark. To verify correcteness or attempt to repair corrupted PNGs you can use pngcheck. If you need to dig into PNG a little deeper, the pngtools package might be useful.\nSteganography, the practice of concealing some amount of secret data within an unrelated data as its vessel (a.k.a. the \"cover text\"), is extraordinarily rare in the real world (made effectively obsolete by strong cryptography), but is another popular trope in CTF forensics challenges. Steganography could be implemented using any kind of data as the \"cover text,\" but media file formats are ideal because they tolerate a certain amount of unnoticeable data loss (the same characteristic that makes lossy compression schemes possible). The difficulty with steganography is that extracting the hidden message requires not only a detection that steganography has been used, but also the exact steganographic tool used to embed it. Given a challenge file, if we suspect steganography, we must do at least a little guessing to check if it's present. Stegsolve (JAR download link) is often used to apply various steganography techniques to image files in an attempt to detect and extract hidden data. You may also try zsteg.\nGimp provides the ability to alter various aspects of the visual data of an image file. CTF challenge authors have historically used altered Hue/Saturation/Luminance values or color channels to hide a secret message. Gimp is also good for confirming whether something really is an image file: for instance, when you believe you have recovered image data from a display buffer in a memory dump or elsewhere, but you lack the image file header that specifies pixel format, image height and width and so on. Open your mystery data as \"raw image data\" in Gimp and experiment with different settings.\nThe ImageMagick toolset can be incorporated into scripts and enable you to quickly identify, resize, crop, modify, convert, and otherwise manipulate image files. It can also find the visual and data difference between two seemingly identical images with its compare tool.\nIf you are writing a custom image file format parser, import the Python Image Library (PIL) aka Pillow. It enables you to extract frames from animated GIFs or even individual pixels from a JPG – it has native support for most major image file formats.\nIf working with QR codes (2D barcodes), also check out the qrtools module for Python. You can decode an image of a QR code with less than 5 lines of Python. Of course, if you just need to decode one QR code, any smartphone will do.\nFilesystems analysis\nOccasionally, a CTF forensics challenge consists of a full disk image, and the player needs to have a strategy for finding a needle (the flag) in this haystack of data. Triage, in computer forensics, refers to the ability to quickly narrow down what to look at. Without a strategy, the only option is looking at everything, which is time-prohibitive (not to mention exhausting).\nExample of mounting a CD-ROM filesystem image:\nmkdir /mnt/challenge\nmount -t iso9660 challengefile /mnt/challenge\nOnce you have mounted the filesystem, the tree command is not bad for a quick look at the directory structure to see if anything sticks out to you for further analysis.\nYou may not be looking for a file in the visible filesystem at all, but rather a hidden volume, unallocated space (disk space that is not a part of any partition), a deleted file, or a non-file filesystem structure like an http://www.nirsoft.net/utils/alternate_data_streams.html. For EXT3 and EXT4 filesystems, you can attempt to find deleted files with extundelete. For everything else, there's TestDisk: recover missing partition tables, fix corrupted ones, undelete files on FAT or NTFS, etc.\nThe Sleuth Kit and its accompanying web-based user interface, \"Autopsy,\" is a powerful open-source toolkit for filesystem analysis. It's a bit geared toward law-enforcement tasks, but can be helpful for tasks like searching for a keyword across the entire disk image, or looking at the unallocated space.\nEmbedded device filesystems are a unique category of their own. Made for fixed-function low-resource environments, they can be compressed, single-file, or read-only. Squashfs is one popular implementation of an embedded device filesystem. For images of embedded devices, you're better off analyzing them with firmware-mod-kit or binwalk.\nPacket Capture (PCAP) file analysis\nNetwork traffic is stored and captured in a PCAP file (Packet capture), with a program like tcpdump or Wireshark (both based on libpcap). A popular CTF challenge is to provide a PCAP file representing some network traffic and challenge the player to recover/reconstitute a transferred file or transmitted secret. Complicating matters, the packets of interest are usually in an ocean of unrelated traffic, so analysis triage and filtering the data is also a job for the player.\nFor initial analysis, take a high-level view of the packets with Wireshark's statistics or conversations view, or its capinfos command. Wireshark, and its command-line version tshark, both support the concept of using \"filters,\" which, if you master the syntax, can quickly reduce the scope of your analysis. There is also an online service called PacketTotal where you can submit PCAP files up to 50MB, and graphically display some timelines of connections, and SSL metadata on the secure connections. Plus it will highlight file transfers and show you any \"suspicious\" activity. If you already know what you're searching for, you can do grep-style searching through packets using ngrep.\nJust as \"file carving\" refers to the identification and extraction of files embedded within files, \"packet carving\" is a term sometimes used to describe the extraction of files from a packet capture. There are expensive commercial tools for recovering files from captured packets, but one open-source alternative is the Xplico framework. Wireshark also has an \"Export Objects\" feature to extract data from the capture (e.g., File -> Export Objects -> HTTP -> Save all). Beyond that, you can try tcpxtract, Network Miner, Foremost, or Snort.\nIf you want to write your own scripts to process PCAP files directly, the dpkt Python package for pcap manipulation is recommended. You could also interface Wireshark from your Python using Wirepy.\nIf trying to repair a damaged PCAP file, there is an online service for repairing PCAP files called PCAPfix.\nA note about PCAP vs PCAPNG: there are two versions of the PCAP file format; PCAPNG is newer and not supported by all tools. You may need to convert a file from PCAPNG to PCAP using Wireshark or another compatible tool, in order to work with it in some other tools.\nMemory dump analysis\nFor years, computer forensics was synonymous with filesystem forensics, but as attackers became more sophisticated, they started to avoid the disk. Also, a snapshot of memory often contains context and clues that are impossible to find on disk because they only exist at runtime (operational configurations, remote-exploit shellcode, passwords and encryption keys, etc). So memory snapshot / memory dump forensics has become a popular practice in incident response. In a CTF, you might find a challenge that provides a memory dump image, and tasks you with locating and extracting a secret or a file from within it.\nThe premiere open-source framework for memory dump analysis is Volatility. Volatility is a Python script for parsing memory dumps that were gathered with an external tool (or a VMware memory image gathered by pausing the VM). So, given the memory dump file and the relevant \"profile\" (the OS from which the dump was gathered), Volatility can start identifying the structures in the data: running processes, passwords, etc. It is also extensible using plugins for extracting various types of artifact.\nEthscan is made to find data in a memory dump that looks like network packets, and then extract it into a pcap file for viewing in Wireshark. There are plugins for extracting SQL databases, Chrome history, Firefox history and much more.\nPDF file analysis\nPDF is an extremely complicated document file format, with enough tricks and hiding places to write about for years. This also makes it popular for CTF forensics challenges. The NSA wrote a guide to these hiding places in 2008 titled \"Hidden Data and Metadata in Adobe PDF Files: Publication Risks and Countermeasures.\" It's no longer available at its original URL, but you can find a copy here. Ange Albertini also keeps a wiki on GitHub of PDF file format tricks.\nThe PDF format is partially plain-text, like HTML, but with many binary \"objects\" in the contents. Didier Stevens has written good introductory material about the format. The binary objects can be compressed or even encrypted data, and include content in scripting languages like JavaScript or Flash. To display the structure of a PDF, you can either browse it with a text editor, or open it with a PDF-aware file-format editor like Origami.\nqpdf is one tool that can be useful for exploring a PDF and transforming or extracting information from it. Another is a framework in Ruby called Origami.\nWhen exploring PDF content for hidden data, some of the hiding places to check include:\n\nnon-visible layers\nAdobe's metadata format \"XMP\"\nthe \"incremental generation\" feature of PDF wherein a previous version is retained but not visible to the user\nwhite text on a white background\ntext behind images\nan image behind an overlapping image\nnon-displayed comments\n\nThere are also several Python packages for working with the PDF file format, like PeepDF, that enable you to write your own parsing scripts.\nVideo and Audio file analysis\nLike image file formats, audio and video file trickery is a common theme in CTF forensics challenges not because hacking or data hiding ever happens this way in the real world, but just because audio and video is fun. As with image file formats, stegonagraphy might be used to embed a secret message in the content data, and again you should know to check the file metadata areas for clues. Your first step should be to take a look with the mediainfo tool (or exiftool) and identify the content type and look at its metadata.\nAudacity is the premiere open-source audio file and waveform-viewing tool, and CTF challenge authors love to encode text into audio waveforms, which you can see using the spectogram view (although a specialized tool called Sonic Visualiser is better for this task in particular). Audacity can also enable you to slow down, reverse, and do other manipulations that might reveal a hidden message if you suspect there is one (if you can hear garbled audio, interference, or static). Sox is another useful command-line tool for converting and manipulating audio files.\nIt's also common to check least-significant-bits (LSB) for a secret message. Most audio and video media formats use discrete (fixed-size) \"chunks\" so that they can be streamed; the LSBs of those chunks are a common place to smuggle some data without visibly affecting the file.\nOther times, a message might be encoded into the audio as DTMF tones or morse code. For these, try working with multimon-ng to decode them.\nVideo file formats are really container formats, that contain separate streams of both audio and video that are multiplexed together for playback. For analyzing and manipulating video file formats, ffmpeg is recommended. ffmpeg -i gives initial analysis of the file content. It can also de-multiplex or playback the content streams. The power of ffmpeg is exposed to Python using ffmpy.\nOffice file analysis\nMicrosoft has created dozens of office document file formats, many of which are popular for the distribution of phishing attacks and malware because of their ability to include macros (VBA scripts). Microsoft Office document forensic analysis is not too different from PDF document forensics, and just as relevant to real-world incident response.\nBroadly speaking, there are two generations of Office file format: the OLE formats (file extensions like RTF, DOC, XLS, PPT), and the \"Office Open XML\" formats (file extensions that include DOCX, XLSX, PPTX). Both formats are structured, compound file binary formats that enable Linked or Embedded content (Objects). OOXML files are actually zip file containers (see the section above on archive files), meaning that one of the easiest ways to check for hidden data is to simply unzip the document:\n$ unzip example.docx \nArchive: example.docx\n inflating: [Content_Types].xml \n inflating: _rels/.rels \n inflating: word/_rels/document.xml.rels \n inflating: word/document.xml \n inflating: word/theme/theme1.xml \n extracting: docProps/thumbnail.jpeg \n inflating: word/comments.xml \n inflating: word/settings.xml \n inflating: word/fontTable.xml \n inflating: word/styles.xml \n inflating: word/stylesWithEffects.xml \n inflating: docProps/app.xml \n inflating: docProps/core.xml \n inflating: word/webSettings.xml \n inflating: word/numbering.xml\n$ tree\n.\n├── [Content_Types].xml\n├── _rels\n├── docProps\n│ ├── app.xml\n│ ├── core.xml\n│ └── thumbnail.jpeg\n└── word\n ├── _rels\n │ └── document.xml.rels\n ├── comments.xml\n ├── document.xml\n ├── fontTable.xml\n ├── numbering.xml\n ├── settings.xml\n ├── styles.xml\n ├── stylesWithEffects.xml\n ├── theme\n │ └── theme1.xml\n └── webSettings.xml\nAs you can see, some of the structure is created by the file and folder hierarchy. The rest is specified inside the XML files. New Steganographic Techniques for the OOXML File Format, 2011 details some ideas for data hiding techniques, but CTF challenge authors will always be coming up with new ones.\nOnce again, a Python toolset exists for the examination and analysis of OLE and OOXML documents: oletools. For OOXML documents in particular, OfficeDissector is a very powerful analysis framework (and Python library). The latter includes a quick guide to its usage.\nSometimes the challenge is not to find hidden static data, but to analyze a VBA macro to determine its behavior. This is a more realistic scenario, and one that analysts in the field perform every day. The aforementioned dissector tools can indicate whether a macro is present, and probably extract it for you. A typical VBA macro in an Office document, on Windows, will download a PowerShell script to %TEMP% and attempt to execute it, in which case you now have a PowerShell script analysis task too. But malicious VBA macros are rarely complicated, since VBA is typically just used as a jumping-off platform to bootstrap code execution. In the case where you do need to understand a complicated VBA macro, or if the macro is obfuscated and has an unpacker routine, you don't need to own a license to Microsoft Office to debug this. You can use Libre Office: its interface will be familiar to anyone who has debugged a program; you can set breakpoints and create watch variables and capture values after they have been unpacked but before whatever payload behavior has executed. You can even start a macro of a specific document from a command line:\n$ soffice path/to/test.docx macro://./standard.module1.mymacro\n"},"toolkits/":{"url":"toolkits/","title":"Toolkit Creation","keywords":"","body":"Toolkit Creation\n\n"},"toolkits/prep.html":{"url":"toolkits/prep.html","title":"Toolkit Prep","keywords":"","body":"Toolkit Prep\nWelcome to the module on toolkit creation. A toolkit is a set of utilities that enable you and your team to achieve operational goals in the most efficient manner possible. Your toolkit is a force multiplier that will enable you to minimize the time you spend developing exploits during the game and maximize the return on your development time.\nA good toolkit is well rounded and easy to use. You should incorporate software that allows members of your team to communicate effectively, work collaboratively, automate common tasks and provide situational awareness of the game as it plays out.\nLecture\n\nCreating a SOC\nStealth Rootkit Development\nToolsmithing Case Study\nOrganizing and Participating in CTF\nRTFn \n\nWorkshop\nCreate three lists. Populate the first list with the functionality your ideal toolkit would provide. Populate the second list with software that can provide that functionality. Use the third list to rank in order of importance functionality that is inadequately supported by the software from list two. Begin developing software that fills in the gaps of your ideal toolkit.\nSome functionality you should not neglect:\n\nManagement of exploitation, key aggregation and submission.\nStealthy and secure payloads or persistence methods.\nSecure communication and collaboration.\nNetwork/Host situational awareness.\n\nResources\n\nMeterpreter Functionality Outline\nIDA Python Overview, IDA Python Download\nNASM Documentation\nPyershark\nCode you might find useful from the Pwnies (Python) and Ronin (Ruby)\n\n"},"tradecraft/":{"url":"tradecraft/","title":"Operational Tradecraft","keywords":"","body":"Operational Tradecraft\n\n"},"tradecraft/case_studies.html":{"url":"tradecraft/case_studies.html","title":"Case Studies","keywords":"","body":"Studies in Tradecraft\nOperational tradecraft is generally cultivated with a specific goal in mind. While playing competitive wargames you will most likely be focused on evading detection and not putting elements of your toolkit (infrastructure, exploits) at risk of inadvertent exposure.\nLecture\n\nPost-Exploitation and Operational Security\nA Brief History of CTF and Tradecraft\nOperational Use of Offensive Cyber\n\nWorkshop\nEvaluate the operational tradecraft displayed during the following campaigns. Each design decision employed in these tools and campaigns has an operational philosophy behind it.\nSome things to think about while evaluating tradecraft:\n\nWhy did the actor chose to perform/implement X action/capability?\nWere any mistakes made? Was a decision flawed or shortsighted in some way?\nWas an action/capability anomalus? Does it fit with the rest of the operational philosophy?\nWhat was the actor most interested in protecting? (ex: Tools, Identities, Employers etc.)\nWhat can be learned from each campaign from an attackers standpoint? Defenders standpoint?\n\nCampaigns\n\nAPT1\nAPT28\nStuxNet\nCareto\n\nResources\nThese are few public examples, groups, or organizations that discuss their own tradecraft. The AMA's below provide a rare glimpse into how extraordinarily talented groups operate.\n\nPlaid Parlement Of Pwning AMA\nSamurai AMA\nTradecraft Lectures 8 & 9\n\n"},"contrib.html":{"url":"contrib.html","title":"Contributing","keywords":"","body":"Contributors\nThis book was built on a lot of hard work, most of which happened elsewhere. Without permission to republish from these folks, this book would still be in development. They have our gratitude and admiration.\nSo, reader, when you’ve completed a few CTFs, and you’re ready for more, reach out to this list. They like to support ambition, and they just might know someone who needs some talent.\n\nAndrew Ruef created the initial proposal and slides\nEvan Jensen developed and refined nearly all of the lessons\nNick Anderson ran through the lessons and made numerous improvements\nAlex Sotirov delivered the ROP lecture and provided feedback\nJay Little reviewed the binary exploitation modules\nBrandon Edwards delivered the source auditing lectures and the newspaper app\nMarcin W and Gotham Digital Science delivered the web security lectures\nDino Dai Zovi delivered the introductory exploitation lectures\nMike Myers for contributing the chapter on forensics\n\nIf you're interested in taking a course like this one for credit, check out NYU Poly. They offer concentrations in cybersecurity and we collaborate with them frequently through their Hacker in Residence program.\nContributing\nIf you want to make a contribution, simply commit your new markdown to the master branch and we'll take it from there. Gitbook has a fantastic editor available to help preview your changes. We're always looking for new or refined content, so please send us your suggestions!\nGitbook Usage\nThe CTF Field Guide is built with Gitbook, a command line tool for building books with Git and Markdown. You can use Gitbook to output the CTF Field Guide as a PDF, an eBook or a single, printable HTML page. Make sure you have NodeJS and npm on your operating system, then install Gitbook and a few of its plugins:\nnpm install gitbook gitbook-plugin-ga gitbook-pdf ebook-convert -g\nWith Gitbook installed, you can run any of these commands from within the book directory:\n\nGenerate an interactive, static website: gitbook build ./myrepo\nGenerate a single page website: gitbook build ./myrepo -f page.\nGenerate a PDF: gitbook pdf ./myrepo. Requires gitbook-pdf.\nGenerate an eBook: gitbook ebook ./myrepo. Requires ebook-convert.\n\n"}}}
\ No newline at end of file
+{"index":{"version":"0.5.12","fields":[{"name":"title","boost":10},{"name":"keywords","boost":15},{"name":"body","boost":1}],"ref":"url","documentStore":{"store":{"./":["(ctf).","ahead,","along","apply.","area","attack","becom","behavior,","best","bit","book","book.","both","captur","case","challeng","chapters,","collabor","come","competit","competition:","comput","contact","creat","creation,","ctf","ctf,","defense,","demand,","design","detail","direct","disciplin","disciplines.","discovery,","distil","do.”","each","easier,","enough","enough;","even","everyth","evolv","exercises.","expert","expert.","exploit","field","field.","find","flag","focu","glad","go","goeth","guid","guidanc","help","here.","hope","ideal","industry.","internet’","introduct","johann","keep","learn","lecture.","lesson","live","look","major","make","materials.","measur","mind","more","need","next","now,","object","offense.","on","onlin","oper","past","peopl","profession","professional,","question","quickli","real","refer","relev","schedul","secur","short,","so,","structur","studi","succe","supplement","support","team","tend","that’","them.","there’","think","toolkit","tradecraft.","trail","tri","us.","von","vulner","walkthrough","want","want,","way,","welcome!","we’ll","we’r","we’v","whether","will","win","wolfgang","work","work.","world","wrote","you.","you’ll","you’r","“know"],"intro/":["appli","approxim","area","areas.","aspect","attack","captur","challeng","compet","competit","competition.","comput","constitut","creation,","ctf","ctf?","demand","difficult","disciplin","discovery,","discret","distil","drawn","due","educ","effici","emerged:","encapsul","essenc","exercis","expert","exploit","flag","flag’","focu","ideal","inform","interdisciplinari","make","management.","mani","measur","measurable.","merg","modern","nature.","object","on","oper","orient","particip","prepar","profession","professional.","rang","repres","scienc","secur","security.","short","singl","spirit","success","technolog","tend","them.","theoret","therefore,","toolkit","topic","tradecraft.","tri","vulner","way","work","‘captur"],"intro/find.html":["(ccdc)","5k","academ","alway","anyth","appli","avoid","calendar","capctf","captur","ccdc?","challeng","cmu","collegi","come","compet","competit","competitions,","complet","corrupt","csaw","ctf","ctf!","cyber","defcon","defens","different?","disguis","else.","encourag","excel","exercis","exploit","favorites:","find","flag","focus","frustrat","fun","futur","goal.","harder","here","here:","high","hsctf","ictf","incred","keep","level","list","littl","made","mainli","micro","more","near","nyu","occur","ongoing.","opinion","organ","overthewir","pick","picoctf","plaidctf","play","poli","practic","principl","probabl","progress","recommend:","red","region","running,","same","schedule.","school","secur","sign","similar","smashthestack","solv","start","student","teach","team","them.","themselv","though!","time","typically,","ucsb","unrealist","up","variations,","visit","want","wargam","way","week","year."],"intro/careers.html":["\"will","\"you","(ccdc)","(code","(common","(isc)2","(isc)2'","(mostli","(not","(nsa","(of","(offensive)","(opportun","(order","(see","....","500","[editor'","a)","abov","academ","academia).","acquir","actual","addit","administr","advic","advice.","afterward.","alon","alone.","analysi","answer","antiviru","anyth","apart","applic","appropri","architect","are:","argument","articl","ask","assessments)","at:","attach","attack","attend","attendees!","audits/app","austin","automat","automation).","avail","avoid","awesome)","b)","bait","ball.","base","be","becom","before,","below","berkeley","bernstein","best","beyond","big","binari","bits,","blog","bodi","boneh","book","both","break","brows","bush","busi","business,","c)","calendar","call","can't","canon","capable.","captur","career","cases,","cash","center","certif","certification.","certified!\"","certified,","certified.","challeng","cheatsheet","choic","cissp","cities.","city,","citysec,","class","clear,","client","co","coast)","code","coe","coe)","colleg","collegi","commun","compani","company,","competit","competitions,","complianc","comput","concise,","confer","conference,","conference.","consist","consult","consulting.","conversational.","corner","cost","count","cours","courses,","cow","creat","cs","ctf","ctf,","current","cyber","cybersecur","d.","dai","dalla","dan","decis","dedic","defcon","defens","determin","develop","development.","differ","different,","dino","directed,","disguis","distract","do","don't","done","done.","down","dozen","drop","dure","each","earli","easiest","edit","educ","edward","else.","email","email.","emphasi","employ","enforc","engin","entir","ethic","even","exam","exampl","example,","excel","exercis","expect","experi","expert,","exploit","extern","fact,","factor","fantastic.","far","fast,","field.","final","financ","finance)","financi","find","firm.","first","five","fix","flag","focu","focus","follow","for,","forc","forens","forget","fortun","fortunately,","frame","friend","frustrat","fun","further","gain","gener","general,","get","give","go","go.","good","googl","govern","government).","graduat","gray","great","guid","guide).","guide.","guideline.","hack","hacker","hacking:","hand","hand,","handler","hard","harm","hat","have","help","high","highli","hire","hole","hovav","human","i'v","idea","identifi","idols,","ie.","im.","imho","in.","incid","incred","individuals,","industri","industry'","industry.","inexpens","inform","infosec","infragard","insid","instead","institut","instructor(s)","interest","intern","intro","involv","isc2","issa","issu","issues.","it,","it.","j.","job","jump","justifi","key","kill","kind","knowledg","knowledge.","languag","larg","law","leader","learn","less","level","limit","lin","link","list","list,","list.","lists.","littl","live","local","locat","long","look","lot","low","lowest","lure","mainli","maintain","major","malwar","manag","mani","materi","me?\"","mean","meet","meetup","mentor","mileag","milk","mine","miss","mit","modern","money","monthli","more","motiv","moyer","moyer'","much","myth","name).","nathan","need","network","network+","neutral","never","new","newer","newest","next","nickolai","no.","non","nop,","normal","note","note:","nsa","nysec.","o'reilli","o'reilly.","obsess","obtain","occur","offens","offer","older","on","onc","ones.","online.","opinion","organization:","organized.","others,","out","over","owasp","paid","paper.","part","particular","pay","penetr","pentest.cryptocity.net","pentesting,","peopl","persuasive.","phone","piec","pitch,","play","point","polici","policy,","pop","possible.","post","practic","present","primarili","principl","probabl","problem","problems.","process","processes,","product","profession","program","programmer,","promis","proof","provid","ptacek","publish","put","qualiti","rais","read","realli","reason","recommend","red","reddit","reduc","reflect","region","relat","remember,","requir","research","resourc","rest","resume,","revers","reversing,","risk","rittenhous","role","role,","role.","role/employ","roles:","rpi","rpisec","said,","sale","sales.","scale","school","scienc","science.","score","script","search","secur","security+","security,","security.","select","sell","set","shacham","shawn","shortcut","similar","similarly,","simul","sizes),","skill","slot.","small","smart","softwar","solv","solve.","someth","sometim","somewher","speak","speaker'","speaker.","special","spend","spent","split","staff","stand","stanford","stay","still","student","studi","subject.","sure","system","take","talk","teach","team","teams,","tech","technic","technical)","technolog","technologist","technologists,","tell,","term","test","tester","testing,","them.","themselv","theoret","thing","think","those","though.","thought","thread","through","time","tip","tml","tom","topic","trail","train","tri","troubl","two","uic","umd","uncertain","understand","univers","university,","unix","up","updating.]","upper","us","users.","usual","ut","valu","value.","variations,","variou","vary.","vendor","view","volum","vrt:","vulner","want","wargame.","water","way","web","websit","weekend:","well","west","whether","without","won't","work","works,","worri","worst","write","write.","written","x","xyz","yang","year","york","you'r","you'v","yourself","z.","zeldovich","zhiqiang","zovi"],"vulnerabilities/":["discoveri","vulner"],"vulnerabilities/source.html":["/epan/dissectors/","1.8.5","10","1998.","6:","accur","achiev","allow","analysi","analysis.","analyst","analyz","analyzer,","api","app","appli","applic","articl","attach","attack.","attacks.","audit","auditing,","auditor","authent","available.","base","below","below.","between","bug","c","c++.","capabl","cases,","cases.","chapter","clang","code","code.","codebas","codebase.","collect","come","common","commonli","compil","complet","complic","comput","continu","control","data","defeat","design","details.","develop","dif","differ","discov","display","dissector","do","doesn't","down","due","each","easi","easier","end","engin","error","errors.","essenti","exampl","execut","exist.","experi","fail","familiar","far","fewer","file","find","flaw","flow.","folder.","format","found","free,","gain","gera'","get","go","help","histor","hope","however,","identifi","ii","includ","independ","industri","inform","insecur","instal","integ","intention","intern","intim","issu","it.","known","languag","larg","learn","lectur","level","libfreetyp","libpng,","libpoppler,","librari","libraries.","libxml,","list","locat","look","lot","machin","make","mani","manifest","mastery.","meld","modul","more","move","much","name","nativ","navig","network","never","new","newspap","on","open","option","order","origin","out,","overflow","packag","page,","pars","parti","pattern","patterns.","pay","potenti","practic","primer","process","processor","profil","program","programm","project","prone","protocol","protocols.","quickli","read","real","recommend","relationships,","remot","resourc","revers","rigor","same.","scitool","secur","see","server","signific","simpli","skills,","small","softwar","sourc","sourcetrail","standard","static","still","strongli","such","sure","system.","take","tantamount","taossa","target","them.","third","through","tool","tools,","toy","track","transform","two","under","understand","understand,","updat","us","usage,","user","variant","version","vulner","vulnerabl","warn","way","wireshark","wireshark,","without","workshop","write","written","you’r"],"vulnerabilities/binary.html":["\"basic","\"comput","\"ultimate\"","(cs:app)","(gdb)","(link","(switches,","(we","3","32","3:","80’","above,","acquir","addit","aim","alert,","allow","alter","amd","amd64","analyz","and,","anoth","anti","appear","arm,","around","aspect","assembl","audit","basic,","becom","behavior","between","binari","bit","blocks\"","bomb","bomb.","bombs.”","both","breakpoint","c","capabl","captur","case","challeng","chapter","cheat","cheatsheet","check","chosen","chunk","cmu","code","code.","command","common","compil","compilation”","complet","complic","comput","conditionals,","construct","contents.","control","correspond","corruption,","covers.","cs:app","current","data","daunt","day","debug","debugg","debugger.","dedic","defin","demo","deriv","desktop","develop","differ","disassembl","disassembler.","disassembler:","discret","distribution.","divid","down","each","easi","eight","employ","encount","end","engin","essenti","examin","example,","exercises.","exist","expect","familiar","finally,","find","first","flag","flavor","flow","flow.","focu","focus","follow","forc","found","fragment","function","further","gdb","gener","give","glance.","gnu","go","goal.","good","guid","handi","helpful.","hide","high","higher","ida","identifi","industri","input","insight","instruct","intel","intel).","intent.","interact","interpret","introduct","involv","itself.","keep","knowledg","lab","labs.","languag","language.","layer","layer,","learn","lectur","less","level","linux","list","lists,","liu","loops)","loops,","machin","made","make","manag","mani","manifest","manual","manual:","market.","master.","mean","memori","mips,","modifi","modul","more","nativ","obfusc","onc","oper","out","packag","painless","perform","person","perspect","perspective\"","phase","point","power","powerpc","predomin","presenc","pro","pro.","process","process,","processor","produc","program","program'","programm","programmer'","progress","provid","pull","purpos","quick","quinn","read","recommend","refer","reference.","regist","represent","requir","resourc","result","revers","rpi","run","saniti","secret","see","seri","server","set","sever","sheet","softwar","solv","sourc","sparc.","stage","standard","state","statement","strategi","structur","studi","subdivid","success","system","systems.","systems:","techniqu","them?","through","today","too.","tool","track","transform","trees)","trick","two","understand","understanding,","univers","us","variou","video","virginia.","want","way","we'v","well","we’r","wikibook","windbg","work","workshop","x86","x86.","you’v","“binari","“defuse”","“revers"],"web/vulnerabilities.html":["\"crimewar","(dvwa)","(pw:","10","3","access","administr","allow","app","applic","applications!","applications.","attack","attent","audit","auditing.","authent","avail","base","broken","browser","burp","bwa","case","challenges.","chapter","click","code","collect","command","common","commonli","complet","compromis","compromises.","contain","control","crimewar","crimin","damn","download","dvwa","dvwa,","dvwa.","easi","end","enough","ensur","exploit","familiar","featur","feel","find","flaw","found","free","fundement","gain","get","give","go","gui.","hack","hosted.","hosts.","html,","http","http,","identifi","ii","implement","includ","infected)","input","intend","introduct","kit","kit.","lectur","level","local","machin","made","manag","mani","massiv","master","materi","material.","method","methodolog","modul","module.","more","move","need","onc","order","over","owasp","pack","pack\"","packag","panel","panel,","part","pay","penetr","perform","php","php.","point","post","practic","pre","primer","process","proxi","recommend","resourc","run","section.","secur","serv","server","sever","siberia","siberia'","simpl","simplifi","skills,","sourc","start","successfulli","suit","tactic","take","tangl","task","test","tester","testing,","testing.","thing","through","tool","top","tri","understand","us","varieti","version","virtual","vmware","vulner","vulnerabilities,","walkthrough.","web","web:","webapp","welcom","well","workshop","workshop.","wrong"],"exploits/":["creation","exploit"],"exploits/binary1.html":["(32","(like",".gdbinit","1","101","101,","102","102,","12346.","12347.","14.04","32","about.","abus","achiev","actual","administrator.","advanc","advantag","allow","anoth","api","applic","apt","arbitrari","attack","attacker.","attempt","attempt,","attent","available.","background","basic","binari","binaries.","bit","bit)","both","boundari","browser","buffer,","bug","c","call","catalogu","cert","challeng","challenge,","challenge:","challenges,","chang","check","child","choosing.","clone","code","code,","code.","come","command","commands:","commonli","compil","compromis","comput","contain","context","control","convent","corrupt","corruption.","cover","critic","data","debug","defens","desktop","develop","differ","difficult","directori","disassembl","each","easi","easy,","elev","end","error","exampl","execut","explan","exploit","exploitation.","file","find","first","flag","flag.","flavor","flow","focu","folder","follow","for.","fork","format","free","function","gdb","gef,","git.","go","goal","goal.","guess","helpful,","hijack","home","host.sh","however,","identifi","import","includ","inform","information.","insid","instal","instruct","integr","intel","intend","it'","know","lectur","lecture,","level","linux,","listen","local","look","low","machine.","make","mani","manipul","memori","misus","mode","modul","more","name","need","note","obtain","onc","open","oper","order","others,","overflow","particular","path","pay","peda,","perform","permiss","player,","port","privileg","process","program","program,","program.","programs,","project","provid","provided.","quick","read","recommend","rememb","remot","repositori","resourc","rewrit","run","running,","same","second","security:","send","server)","servers,","set","set.","setup","similar","size","socat","socat.","social","softwar","sometim","sourc","specif","standard","start","state","step","store","string","strip","subvert","success.","such","sudo","supported.","sure","symbol","system","take","techniqu","termin","them.","then,","three","through","tool","topics,","translat","tri","trust","ubuntu","ultim","unix/linux","us","used.","user","varieti","veri","verifi","violat","virtual","vmware","voltron","vulner","way","web","well","window","windows.","within","without","work","workshop","workshop,","x86","you'll","you'r","you,","you."],"exploits/binary2.html":["(32","(between","(linux","(rop)","*nix.",".rodata,","12345.","12348.","12349.","14.04","2","64","abus","access","achiev","address","aid","alreadi","already,","and,","applic","attack","bc","becom","binari","binutil","bisc","bit)","blog","borrow","bridg","brute_cooki","buffer","build","bypass","chain","challenge:","chunk","clone","code","code.","college:","consid","continu","corelan","cours","cover","creat","creation","dartmouth","data","data.","detail","directori","disallow","disassembl","discoveri","discuss","each","end","engin","entir","etc).","examin","example,","execut","exist","exploit","exploit.","extens","familiar","favorable.","file","flags.","flexibl","focu","folder","format","fragment","frequent","gadget","go","goal.","greater","haven't","helpful.","host.sh","identifi","insid","instal","instruction.","instructions,","introduc","it’","keep","last","layout","lectur","lesson,","lesson.","lib(c)","link","listen","locat","look","machin","make","manag","manpag","manufactur","memori","method","mind","module,","more","much","multipl","nativ","necessari","need","new","nm","objcopy,","objdump,","occasionally,","on","orient","others,","overflow","packag","payload","port","previou","privaci","process","program","program.","programs.","protect","provid","provided.","random","re","read","readelf,","refer","repository.","requir","resourc","return","reus","revers","rop","rop.","rop?","rop_mix","ropgadget","rp","run","same","secur","sever","shellcod","similar","simpl","snippet","sometim","sourc","space","special","specif","specific)","standard","stitch","string","strings,","suit","suitabl","surgic","team","techniqu","them.","time","times,","togeth","tool","two","ubuntu","uncontrol","unorthodox","upon","us","use.","virtual","vulner","want","way","week","week,","week.","without","workshop","write","written","x86","‘gadgets’"],"web/exploits.html":["(beef)","10","10.","3","achiev","applic","application.","around","audit","avail","basic","beef","browser","burp","capabl","challeng","chapter","cheesi","chrome","class","code","code.","comfort","consol","cover","csrf,","dev","develop","directori","dive","each","effect","end","exampl","exercis","exercise.","exploit","find","focu","follow","framework","fun","gain","googl","google.","greater","gruyer","gruyere,","hints,","hook","host","identifi","includ","injection,","insist","interact","learn","lectur","look","mani","map","master","method","modul","module.","more","more.","need","now","on,","owasp","patch","pay","php","play","pleas","power","previou","primer","proxi","refer","revers","section","security,","shell","small,","sourc","specif","sql","suit","tactic","tangl","task","those","through","tool","top","train","travers","tri","ultim","understand","up","user","veri","vulner","vulnerabilities.","web","web:","webapp","with.","works.","workshop","xss","xss,"],"forensics/":["\"'","\"=\"","\"autopsy,\"","\"black","\"chunks\"","\"cover","\"export","\"file","\"filters,\"","\"forensics\"","\"hidden","\"increment","\"insid","\"magic","\"objects\"","\"offic","\"packet","\"plaintext","\"profile\"","\"raw","\"rb\")","\"suspicious\"","\"wb\")","\"xmp\"","\"zipcrypto\")","$","$5,000","$iccpicc","%temp%","'\"0x%08x","'rb').read())","(\"hello","(0","(0x00","(2d","(a","(a.k.a.","(although","(and","(binary)","(both","(byte","(discuss","(disk","(e.g.,","(especi","(file","(fix","(for","(from","(if","(ir).","(it'","(jar","(jpg,","(lsb)","(made","(not","(objects).","(oper","(or","(packet","(pcap)","(pcap,","(pil)","(rtf,","(see","(text","(the","(unless","(vba","(when","(with","(zip,",".","...","/","/mnt/challeng","0's,","0.960","00","00000000","00000010","00000020","00000030","00000040","010","02","04:00","05","06","08","09","0a","0c","0d","0x00000608","0x00006966","0x0a1a0a0d","0x0d000000","0x180000a4","0x43434950","0x43436924","0x474e5089","0x52444849","0x60'","0x6f725020","0x7f,","0x88020000","0xc93d4000","0xca050000","1'","10.53","100","101","101010101,","108","1080,","111","114","12","1335205","13:19:58","1482","1482x648","18","1920","1])","1a","2","20","2008","2011","2017:06:13","2017:06:17","21,","22:34:05","24","255","256,","32","36","38","39","3:","3d","40","40668937","41","43","44","47","48","49","4e","5","50","50mb,","52","55","58","5d","64","648","65","66","67","68","68656c6c6f20776f726c64210a","69","6c","6f","71","72","750","767787","77","79","7z","7z,","8","8,","85","87","88","89","89504e47","9,","95","99","9e","9f",":","=",">",">>>","[content_types].xml","_rel","_rels/.rel","a4","abil","about.","abov","above,","abus","accept","access","accompani","activity.","actual","additionally,","adob","adobe'","advantag","ae","affect","aforement","again","again).","again,","against","agvsbg8gd29ybgqh","aka","albertini","albertini.","all).","all,","alpha","alphanumer","alreadi","also,","alter","altern","although","alway","amount","analysi","analysis,","analysis.","analyst","analyz","and/or","ang","anim","anoth","anyon","anyth","app.xml","appeal","appear","appl","appli","approach.","archiv","archive,","archive:","area","artifact.","artifici","ascii","ascii),","ascii.","aspect","associ","assum","at.","attack","attack\"","attacker\"","attempt","attent","attribution,","audac","audio","audio,","author","avail","avoid","awar","background","bad","barcodes),","base","base64","basi","becam","becom","befor","beginn","behavior","behavior.","behind","believ","belong","best","better","between","bewar","beyond","bgrep","binari","binwalk.","bit","bit/color","bmp,","bootstrap","both","brain","breakpoint","broad","broadli","brows","brute","bs=1","buffer","bust","byte","bytearray","bytearray(b\"hello","bytearray(b'\\x00\\xff')","bytearray(open('challenge.png',","bytearray.fromhex(u'00","bytes\")","bytes,","bytes,\"","bytes:","c","c7","c9","ca","call","camera","capinfo","captur","capture)","capture),","capture.","carefulli","carv","carving\"","carving,","carving.\"","case","categori","category).","category,","category.","caution","cd","certain","certainti","challeng","challenge).","challengefil","challenges,","challenges.","challenges:","chang","channel","charact","characterist","charset","check","checksums,","chrome","chunk","cleverli","close","closely.","clue","clues.","cmm","code","code,","code.","color","come","command","command.","command:","comment","comments.xml","commerci","common","common.","commun","compar","compat","compil","complex","complic","complicated,","compound","compress","compressed,","compression,","comput","conceal","concept","confession.","configurations,","confirm","confus","connections,","connections.","consid","consist","contain","contain,","content","content,","content.","contents,","contents.","context","context,","conveni","convers","convert","convert,","converter,","coordinates,","copi","copyright","core.xml","correct","correctly.","corrupt","count=40668937","countermeasures.\"","cours","course,","crack","craft","creat","crimin","crop,","crypto","cryptography),","cryptography,","ctf","ctf,","ctfs.","curv","custom","d","da","damag","data","data\"","data,","data.","data:","databases,","date/tim","day.","dd","de","debug","decod","decompil","decompress.","deeper,","defin","deflate/infl","delet","depth","describ","detail","detect","determin","devic","devices,","didier","differ","difficulti","dig","dimensions,","directli","directly,","directori","disconnect","discret","discuss","disk","disk.","display","dissect","dissector","distribut","do","do.","doc,","docprop","docprops/app.xml","docprops/core.xml","docprops/thumbnail.jpeg","document","document,","document.xml","document.xml.rel","document:","documents:","docx,","domain","don't","done","down","down,","download","dozen","dpkt","draw","dtmf","dump","e","e6","e7","each","easi","easiest","easili","echo","edit","editor","editor,","ef","effect","else,","elsewhere,","emb","embed","embedded,","emerg","employ","enabl","encod","encoder/decod","encoding,","encoding:","encodings,","encodings.","encrypt","endpoint","enforc","enjoy","enough","entir","environ","environments,","especi","etc).","etc.","ethscan","even","everyth","everything,","evid","evidentiari","exact","examin","exampl","example.docx","example2","example2[1]","excel","execut","executed.","execution.","exhausting).","exif","exiftool","exiftool)","exiftool.","exist","exist.","expel","expens","experi","experience.","explain","exploit","explor","export","expos","ext3","ext4","ext4)","extend(),","extens","extern","extract","extracting:","extraordinarili","extrem","extundelete.","f","f).","f.close()","f.read()","f.write(s[::","f8","fact","familiar","fat","fcrackzip","featur","ff","ff')","ffmpeg","ffmpy.","field","fields,","file","file'","file,","file.","file:","filenam","files),","files,","files.","files:","filesystem","filesystem,","filesystem.","filesystems)","filesystems,","filesystems/registries,","filetyp","filetype.","filetypes,","filter","find","firefox","firmwar","first","fix","flag","flag)","flag.","flash.","flat","folder","follow","following,","fonttable.xml","fooled.","for,","forc","foremost,","foremost.","forens","forensics,","format","format,","format.","format:","format;","formats,","formats.","formerli","frame","framework","framework.","free","friendli","full","fun,","fun.","function","fundament","further","game","garbl","gather","gathered),","gear","gener","generation\"","gif","gif,","gimp","github","give","given","glance,","go","goal","gold","good","gp","graphic","grep","grep,","guess","guid","hack","hacker","hand","happen","harder","hardli","hat","have","haystack","header","headers),","headers.","headstart.","hear","height","hello","help","help,","here","here,","here.","here:","heurist","heuristic,","heuristics,","hex","hex:","hexadecim","hexdump","hexdump,","hexdump.","hexdump:","hexidecim","hidden","hide","hierarchy.","high","highlight","histor","histori","history,","hopefulli","however,","html,","http","http://www.nirsoft.net/utils/alternate_data_streams.html.","hue/saturation/lumin","huge","ida","idea","ideal","ident","identif","identifi","identify,","iend","if=./file_with_a_file_in_it.xxx","ihdr","illustr","imag","image,","image.","image/png","image:","imagemagick","implement","import","imposs","inc.","incid","includ","include:","incorpor","incrimin","independ","indic","indirect","individu","industry,","inflating:","inform","initi","inod","input.zip","insert(),","insid","instal","instance,","integ","integrity.","intention","interest","interfac","interface,","interference,","interlac","introductori","invaluable.","involv","ir","is.","iso9660","it'","it,","it.","itself.","javascript","job","jpg","jpg,","jump","kaitai.","kb","keep","keys,","keyword","kind","kit","know","known","lack","languag","larg","larger","latter","law","layer","leads,","learn","length","less","lesser","level","libari","libmag","libmagic,","libpcap).","libr","librari","library).","licens","line","line:","link","link)","linux","linux,","list","list:","littl","local","locat","logs,","longer","look","look.","loss","lossi","lossless","lot","love","low","lsb","maco","macos).","macro","macro,","macro://./standard.module1.mymacro","made","magic","major","make","malici","maliciousness:","malwar","man","mani","manipul","manipulations)","manual","manufactur","map","markdown),","marker","master","mastroshka","materi","matters,","mdl","mean","media","mediainfo","megapixel","memes,","memori","memory,","mention","messag","message.","metadata","metadata,","metadata.","method","methods.","microsoft","microsoft'","mime","mind","mine","miner,","mislead","miss","mkdir","mod","mode:","model","modif","modify,","modul","more","more.","mors","mount","mp3)","mp4)","much","multimon","multiplex","mutabl","mysteri","n","name","narrow","nativ","natur","ne","need","needl","network","new","newer","next.","ng","ngrep.","non","not),","note","nothing.","notic","novelti","now","now,","now.","nsa","ntfs,","number","numbering.xml","numbers\"","o","obfusc","object","objects\"","obscur","obsolet","occasion","occasionally,","occupi","ocean","of=./extracted_file.xxx","offer","offic","office:","officedissector","offset","offset),","offsets.","offsets:","ol","ole,","oletools.","on","on.","onc","ones,","ones.","onlin","online,","only.","ooxml","ooxml)","open","open('itsreversed',","open('reverseit',","oppos","option","order","origami.","origin","os","others,","otherwis","ought","ourselves,","out","output","output,","output.zip","outsid","outweigh","overlap","overview","own.","p","packag","packet","packets,","packettot","pad","paper.","pars","parser,","part","partial","particip","particular","particular).","particular,","partit","partition),","password","passwords,","past","path/to/test.docx","patterns,","paus","payload","pcap","pcapfix.","pcapng","pcapng)","pcapng:","pdf","pdf,","peepdf,","percentages.","perform","permiss","phish","photo","pick","piec","pillow.","pipe","pitfal","pixel","place","place.","plain","platform","platforms.","play","play,","playback","playback.","player","player.","plu","plugin","png","png)","png.","pngcheck.","pngtool","pop(),","popular","possibl","possible).","power","powershel","ppt),","pptx).","practic","practiction","premier","prepar","preponder","present","present).","present,","present.","previou","pride","primari","primit","print(c)","pro","probabl","probably:","process","processes,","processing:","profession","profil","program","program;","programmat","programming,","prohibit","proprietari","protect","protocol","protocols,","provid","pro|","public","publicli","puzzl","puzzles.","python","python'","python)","python,","python.","qpdf","qr","qrtool","quick","quickli","r","rang","rar","rar,","rare","rather,","ray","re","read","readme.md","real","realist","realli","reassembl","receiv","recogn","recommend","recommended.","reconstruct","recov","recover/reconstitut","reduc","refer","regardless,","regex","relat","relev","remot","remove(),","repair","repres","represent","requir","requisit","resize,","resourc","respond","respons","response.","rest","restor","retain","reveal","reverse(),","reverse,","rgb","rgba,","risk","role","rom","routine,","rtf,","rubi","run","runtim","rw","s","s:","same","save","scalpel,","scenario","scenario,","scheme","schemes.","scope","screenshot.png","screenshot.png:","script","scripts).","scripts.","search","search,","second","secret","secret.","section","secur","see","see,","seek","seemingli","seen","separ","sequenc","seri","servers)","servic","session","set","settings.","settings.xml","sever","shellcode,","show","signific","simpl","simpli","singl","site","size","size)","skill","skip=1335205","sleuth","sleuthkit","slow","smartphon","smuggl","snapshot","snort.","so,","soffic","solv","someth","sometim","somewhat","somewher","sonic","sophist","sophisticated,","sourc","source,","sox","space","space.","speaking,","special","specif","specifi","spectogram","split(),","sql","squashf","ssl","start","static","static).","statist","steganograph","steganographi","steganography,","stegonagraphi","stegsolv","step","steven","stick","still","store","str","strategi","strategy,","stream","streamed;","streams.","string","strings,","strings.","strings:","strong","structur","structured,","structures,","studi","style","styles.xml","styleswitheffects.xml","sub","submit","substitut","such","suffice,","suffix","suit","suitabl","support","suppos","suspect","synonym","syntax,","system","system,","systems'","t","tables,","take","tar","task","task,","tasks,","tasks.","tcpdump","tcpxtract,","teaser","technically,","techniqu","techniques,","templated)","term","testdisk:","text","text\"),","text,","text,\"","text.","tgz","tgz)","that,","them,","them.","theme","theme1.xml","themselv","there'","these,","thing","third","this.","those","threat\"","three","through","thumbnail","thumbnail.jpeg","time","timelin","times,","titl","tl","togeth","toler","tone","too.","tool","tool,","tool.","toolkit","tools,","tools.","toolset","toward","trace","tradit","traffic","traffic,","transfer","transform","transmit","tree","tri","triag","triage,","trick","trickeri","tricks.","trid","trope","truncated:","tshark,","two","type","type,","typic","u2ei4hb","ultim","unalloc","uncov","undelet","under","understand","unencrypted/uncompress","unfamiliar","unicod","uniqu","unix","unlik","unnotic","unpack","unravel","unrel","unus","unzip","up","url,","us","usage.","used,","useful.","user","users,","usual","utf","v","valu","variabl","varieti","variou","vba","veri","verifi","version","vessel","video","view","view,","visibl","visual","visualis","vm).","vm.","vmware","volatil","volatility.","volume,","vs","vulner","want","wast","watch","wav,","waveform","waveforms,","way","we'll","we'v","weakness.","web","web,","websettings.xml","well","whatev","wherein","whether","which,","white","width","wiki","window","windows,","wirepy.","wireshark","wireshark'","wireshark,","wireshark.","within","without","wonder","word","word/_rels/document.xml.rel","word/comments.xml","word/document.xml","word/fonttable.xml","word/numbering.xml","word/settings.xml","word/styles.xml","word/styleswitheffects.xml","word/theme/theme1.xml","word/websettings.xml","work","work,","world","world!","world!\")","world\")","world,","world.","world\\!","worth","write","written","wrote","x","xls,","xlsx,","xml","xml\"","xplico","xxd","years,","years.","yet?","you'r","you.","zero","zip","zip,","zipdetail","zipinfo","zlib","zsteg.","|","|....$iccpicc","|.............@=.|","|.g..q..a.y.....9|","|.png........ihdr|","|file..x..y.8u]..|","–","│","└──","├──","😉"],"toolkits/":["creation","toolkit"],"toolkits/prep.html":["(python)","(ruby)","achiev","aggreg","allow","autom","awar","awareness.","begin","case","code","collaboration.","collaboratively,","common","commun","creat","creation.","ctf","develop","document","download","dure","easi","effectively,","effici","enabl","exploit","exploitation,","fill","find","first","forc","function","functionality.","game","gap","goal","good","ida","ideal","import","inadequ","incorpor","key","lectur","list","lists.","manag","manner","maxim","member","meterpret","methods.","minim","modul","multipli","nasm","neglect:","network/host","oper","order","organ","out.","outlin","overview,","particip","payload","persist","play","popul","possible.","prep","provid","provide.","pwni","pyershark","python","rank","resourc","return","ronin","rootkit","round","rtfn","second","secur","set","situat","soc","softwar","spend","stealth","stealthi","studi","submission.","support","task","team","third","three","time","time.","toolkit","toolkit.","toolsmith","two.","us","use.","util","welcom","well","work","workshop"],"tradecraft/":["oper","tradecraft"],"tradecraft/case_studies.html":["&","(ex:","(infrastructure,","8","9","action/cap","action/capability?","actor","ama","ama'","anomalus?","apt1","apt28","attack","behind","below","brief","campaign","campaigns.","careto","case","chose","competit","ctf","cultiv","cyber","decis","defend","design","detect","discuss","display","dure","each","element","employ","etc.)","evad","evalu","examples,","exploit","exploits)","exposure.","extraordinarili","few","fit","flaw","focus","follow","gener","glimps","goal","group","groups,","histori","identities,","inadvert","interest","it.","learn","lectur","made?","mind.","mistak","offens","oper","operate.","organ","parlement","perform/impl","philosophi","philosophy?","plaid","play","post","protecting?","provid","public","put","pwning","rare","resourc","rest","risk","samurai","secur","shortsight","specif","standpoint?","studi","stuxnet","talent","thing","think","tool","toolkit","tools,","tradecraft","tradecraft.","tradecraft:","us","wargam","way?","workshop","x"],"contrib.html":["./myrepo","./myrepo.","admiration.","alex","alway","ambition,","anderson","andrew","app","audit","avail","binari","book","branch","brandon","build","built","changes.","chapter","check","collabor","command","commit","complet","concentr","content,","contribut","contribution,","contributor","convert","convert.","cours","creat","credit,","ctf","ctfs,","cybersecur","dai","deliv","develop","development.","digit","dino","directory:","ebook","ebook:","editor","edward","elsewhere.","evan","exploit","f","fantast","feedback","few","field","folks,","forens","frequent","g","ga","gener","git","gitbook","gitbook,","gotham","gratitud","guid","hacker","happen","hard","help","html","improv","initi","instal","installed,","interactive,","interest","introductori","jay","jensen","know","lectur","lesson","line","list.","littl","look","lot","made","make","marcin","markdown","markdown.","master","mike","modul","more,","myer","nearli","need","new","newspap","nick","nodej","npm","numer","nyu","offer","on","oper","out","output","page","page.","pdf","pdf,","pdf.","pdf:","permiss","pleas","plugin","plugins:","poly.","preview","printabl","program.","propos","provid","ran","reach","reader,","readi","refin","republish","requir","resid","review","rop","ruef","run","scienc","secur","send","simpli","singl","single,","slide","so,","someon","sotirov","sourc","static","still","suggestions!","support","sure","system,","take","talent.","there.","through","tool","us","usag","w","want","we'll","we'r","web","website:","within","without","work,","you'r","you’r","you’v","zovi"]},"length":18},"tokenStore":{"root":{"0":{"0":{"0":{"0":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{}},"1":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"3":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"4":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}},"1":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"4":{"docs":{},":":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"docs":{}},"docs":{}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{},"'":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"9":{"6":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"x":{"0":{"0":{"0":{"0":{"0":{"6":{"0":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"6":{"9":{"6":{"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},"a":{"1":{"docs":{},"a":{"0":{"docs":{},"a":{"0":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"docs":{}}},"docs":{}},"d":{"0":{"0":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"1":{"8":{"0":{"0":{"0":{"0":{"docs":{},"a":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"4":{"3":{"4":{"3":{"4":{"9":{"5":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"6":{"9":{"2":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"7":{"4":{"docs":{},"e":{"5":{"0":{"8":{"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"5":{"2":{"4":{"4":{"4":{"8":{"4":{"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"6":{"0":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"f":{"7":{"2":{"5":{"0":{"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"7":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"8":{"8":{"0":{"2":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},"c":{"9":{"3":{"docs":{},"d":{"4":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{},"a":{"0":{"5":{"0":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}}}},"1":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"1":{"0":{"1":{"0":{"1":{"0":{"1":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"2":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"8":{"0":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},".":{"5":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"1":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"2":{"3":{"4":{"5":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"6":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"7":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"8":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"9":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"3":{"5":{"2":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{},":":{"1":{"9":{"docs":{},":":{"5":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"4":{"8":{"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"x":{"6":{"4":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{},".":{"0":{"4":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"docs":{}},"docs":{}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"2":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"9":{"8":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"docs":{}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3360287511230906}},".":{"8":{"docs":{},".":{"5":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"docs":{}}},"docs":{}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"]":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"2":{"0":{"0":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"1":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{},":":{"0":{"6":{"docs":{},":":{"1":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"1":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"2":{"docs":{},":":{"3":{"4":{"docs":{},":":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"5":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.3367463026166093},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"2":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"4":{"0":{"6":{"6":{"8":{"9":{"3":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"5":{"0":{"0":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"m":{"docs":{},"b":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"6":{"4":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"8":{"6":{"5":{"6":{"docs":{},"c":{"6":{"docs":{},"c":{"6":{"docs":{},"f":{"2":{"0":{"7":{"7":{"6":{"docs":{},"f":{"7":{"2":{"6":{"docs":{},"c":{"6":{"4":{"2":{"1":{"0":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"docs":{}}},"docs":{}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},":":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"7":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"5":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"6":{"7":{"7":{"8":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{},"z":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"8":{"0":{"docs":{},"’":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"9":{"5":{"0":{"4":{"docs":{},"e":{"4":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"docs":{}},"docs":{}},"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"9":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"(":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"x":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}},"2":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"3":{"2":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"docs":{}},"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{},")":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"c":{"docs":{},"d":{"docs":{},"c":{"docs":{},")":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"o":{"docs":{},"d":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"m":{"docs":{},"m":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"s":{"docs":{},":":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},")":{"2":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"docs":{}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"r":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"f":{"docs":{},"r":{"docs":{},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}}}}}},"m":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233}}}}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"o":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"o":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"p":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"g":{"docs":{},"d":{"docs":{},"b":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"u":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"k":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"s":{"docs":{},"b":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"h":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{},"v":{"docs":{},"w":{"docs":{},"a":{"docs":{},")":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},"u":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"docs":{},"w":{"docs":{},":":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"l":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"b":{"docs":{},"e":{"docs":{},"t":{"docs":{},"w":{"docs":{},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"e":{"docs":{},"f":{"docs":{},")":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"y":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"o":{"docs":{},"p":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"t":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"b":{"docs":{},"y":{"docs":{},")":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"\"":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{},"k":{"docs":{},".":{"docs":{},"a":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"e":{"docs":{},".":{"docs":{},"g":{"docs":{},".":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"x":{"docs":{},":":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"j":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"h":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"u":{"docs":{},"n":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"v":{"docs":{},"b":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{},"h":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}},"l":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"w":{"docs":{},"a":{"docs":{},"y":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"x":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{},"h":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"o":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"p":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"y":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016260162601626018},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"!":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"x":{"docs":{},"i":{"docs":{},"m":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},"p":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"t":{"1":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"2":{"8":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"docs":{}},"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.02830188679245283},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"c":{"docs":{},"h":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291}},"e":{"docs":{},"e":{"docs":{},"s":{"docs":{},"!":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"p":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"r":{"docs":{},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.02830188679245283},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399}}}}}},"o":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"c":{"docs":{},"i":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"i":{"docs":{},"a":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"q":{"docs":{},"u":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"t":{"docs":{},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"n":{"docs":{},"/":{"docs":{},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"a":{"docs":{},"b":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}}}}}},"o":{"docs":{},"r":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"a":{"docs":{},"n":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"h":{"docs":{},"i":{"docs":{},"e":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"n":{"docs":{},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"l":{"docs":{},"y":{"docs":{},"s":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.006485484867201977}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"z":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}},"s":{"docs":{},"w":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"t":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564}},"v":{"docs":{},"i":{"docs":{},"r":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"d":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"/":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"r":{"docs":{},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"o":{"docs":{},"t":{"docs":{},"h":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}}}},"m":{"docs":{},"a":{"docs":{},"l":{"docs":{},"u":{"docs":{},"s":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"o":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"b":{"docs":{},"o":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"t":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}}},"d":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"a":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}}}},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"v":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"t":{"docs":{},"a":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"o":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"f":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"u":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":5.010840108401084},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":5.002242152466367},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":5.012711864406779},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"t":{"docs":{},"o":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"h":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"w":{"docs":{},"e":{"docs":{},"s":{"docs":{},"o":{"docs":{},"m":{"docs":{},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"m":{"docs":{},"d":{"6":{"4":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"docs":{}},"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"a":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}},"'":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"g":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"s":{"docs":{},"b":{"docs":{},"g":{"8":{"docs":{},"g":{"docs":{},"d":{"2":{"9":{"docs":{},"y":{"docs":{},"b":{"docs":{},"g":{"docs":{},"q":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"docs":{}},"docs":{}}}},"docs":{}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"g":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"k":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"h":{"docs":{},"a":{"docs":{},"v":{"docs":{},"i":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"i":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"s":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"e":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"k":{"docs":{},"e":{"docs":{},"l":{"docs":{},"e":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"y":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"w":{"docs":{},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"e":{"docs":{},"f":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.025477707006369428}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},")":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"/":{"docs":{},"c":{"docs":{},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":5.006726457399103},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3414195867026053},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.340159271899886},"forensics/":{"ref":"forensics/","tf":0.004014823965410748},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"w":{"docs":{},"a":{"docs":{},"l":{"docs":{},"k":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"s":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.006349206349206349},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"t":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"d":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"n":{"docs":{},"e":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"m":{"docs":{},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"s":{"docs":{},".":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"a":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"l":{"docs":{},"l":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"s":{"docs":{},"e":{"6":{"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"docs":{}},"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"k":{"docs":{},"g":{"docs":{},"r":{"docs":{},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"r":{"docs":{},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{},"e":{"docs":{},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"c":{"docs":{},"k":{"docs":{},"s":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"w":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"k":{"docs":{},"e":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644}}}}},"a":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{},"g":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"e":{"docs":{},"f":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"u":{"docs":{},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"_":{"docs":{},"c":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"c":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"d":{"docs":{},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"u":{"docs":{},"s":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"r":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707}}}},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"i":{"docs":{},"l":{"docs":{},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"contrib.html":{"ref":"contrib.html","tf":0.012987012987012988}}},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}},"w":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"y":{"docs":{},"p":{"docs":{},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"a":{"docs":{},"r":{"docs":{},"r":{"docs":{},"a":{"docs":{},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"(":{"docs":{},"b":{"docs":{},"\"":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"'":{"docs":{},"\\":{"docs":{},"x":{"0":{"0":{"docs":{},"\\":{"docs":{},"x":{"docs":{},"f":{"docs":{},"f":{"docs":{},"'":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"docs":{}},"docs":{}}}}},"o":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"(":{"docs":{},"'":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{},"e":{"docs":{},".":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},".":{"docs":{},"f":{"docs":{},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"h":{"docs":{},"e":{"docs":{},"x":{"docs":{},"(":{"docs":{},"u":{"docs":{},"'":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}}}}}}}}}}}}}}}}},"s":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"m":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"=":{"1":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}}}},"c":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"9":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016260162601626018},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"p":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":5.009433962264151},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":5}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"r":{"docs":{},"e":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291}}}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"o":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"a":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{},"u":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"e":{"docs":{},"g":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"y":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"a":{"docs":{},"i":{"docs":{},"g":{"docs":{},"n":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.024390243902439025}},"s":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0067943174799258805}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"p":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"n":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"n":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"s":{"docs":{},"h":{"docs":{},"e":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"u":{"docs":{},"m":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"i":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"o":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"e":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"o":{"docs":{},"s":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"u":{"docs":{},"n":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"l":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"e":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"l":{"docs":{},"l":{"docs":{},"a":{"docs":{},"b":{"docs":{},"o":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}}},"e":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"e":{"docs":{},":":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"c":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"m":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"p":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.02830188679245283},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},":":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"s":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"u":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.07547169811320754},"intro/careers.html":{"ref":"intro/careers.html","tf":0.007407407407407408},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"a":{"docs":{},"n":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016260162601626018},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"m":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"l":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"s":{"docs":{},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"i":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{},"u":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"r":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":10.008658008658008}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"o":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"o":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"e":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}},"n":{"docs":{},"t":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.008465608465608466}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"g":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"n":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"n":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"r":{"docs":{},"r":{"docs":{},"u":{"docs":{},"p":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"p":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"e":{"docs":{},"l":{"docs":{},"a":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"d":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.024390243902439025},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"e":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"=":{"4":{"0":{"6":{"6":{"8":{"9":{"3":{"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"e":{"docs":{},"r":{"docs":{},"m":{"docs":{},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.01164021164021164},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"p":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"y":{"docs":{},"r":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"exploits/":{"ref":"exploits/","tf":5.5},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/":{"ref":"toolkits/","tf":5.5}},",":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.018867924528301886}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"i":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"f":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"p":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{},"y":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"t":{"docs":{},"f":{"docs":{"./":{"ref":"./","tf":0.03067484662576687},"intro/":{"ref":"intro/","tf":0.03773584905660377},"intro/find.html":{"ref":"intro/find.html","tf":5.074380165289257},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.0077208153180975915},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"?":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"!":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"c":{"docs":{},"d":{"docs":{},"c":{"docs":{},"?":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}},"m":{"docs":{},"u":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139}}},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}},"a":{"docs":{},"w":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}},":":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"f":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"y":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.01164021164021164}},"i":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"e":{"docs":{},"d":{"docs":{},"!":{"docs":{},"\"":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"l":{"docs":{},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"n":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}}}},"c":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"o":{"docs":{},"n":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"s":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"u":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"r":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{},"o":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"v":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"+":{"docs":{},"+":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"/":{"docs":{},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"m":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"s":{"docs":{},"i":{"docs":{},"g":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"k":{"docs":{},"t":{"docs":{},"o":{"docs":{},"p":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"c":{"docs":{},"r":{"docs":{},"i":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},"e":{"docs":{},"r":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"m":{"docs":{},"p":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"d":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"v":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"l":{"docs":{},"o":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"b":{"docs":{},"u":{"docs":{},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"i":{"docs":{},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"e":{"docs":{},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}}}}},"p":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"y":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}}}},"o":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"e":{"docs":{},"r":{"docs":{},"y":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"i":{"docs":{"vulnerabilities/":{"ref":"vulnerabilities/","tf":5.5},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"n":{"docs":{},"n":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{},"b":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"g":{"docs":{},"u":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"p":{"docs":{},"l":{"docs":{},"a":{"docs":{},"y":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"f":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"?":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"n":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"e":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"d":{"docs":{},"i":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"”":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"w":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"o":{"docs":{},"a":{"docs":{},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"z":{"docs":{},"e":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"s":{"docs":{},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"p":{"docs":{},"r":{"docs":{},"o":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"n":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{},".":{"docs":{},"j":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"a":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}},"o":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"u":{"docs":{},"e":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"l":{"docs":{},"l":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}},"t":{"docs":{},"a":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.008956145768993206}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"e":{"docs":{},"/":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"y":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"n":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"t":{"docs":{},"m":{"docs":{},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"v":{"docs":{},"w":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"p":{"docs":{},"k":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"m":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"6":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"7":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"s":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"n":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},";":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},"s":{"docs":{},"u":{"docs":{},"l":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}},"o":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}},"e":{"docs":{},"r":{"docs":{},"/":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"t":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}}},"j":{"docs":{},"o":{"docs":{},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"r":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"v":{"docs":{},"e":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"r":{"docs":{},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"a":{"docs":{},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"l":{"docs":{},"u":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"x":{"docs":{},"e":{"docs":{},"r":{"docs":{},"c":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}},"c":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"n":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"o":{"docs":{},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288},"exploits/":{"ref":"exploits/","tf":5.5},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":3.3495058400718776},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":3.3742889647326506},"web/exploits.html":{"ref":"web/exploits.html","tf":5.038216560509555},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"s":{"docs":{},")":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"a":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"c":{"docs":{},"e":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}},"p":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016260162601626018},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},"e":{"2":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"[":{"1":{"docs":{},"]":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"3":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"4":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"d":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.005558987029030266}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}}},"e":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{},"e":{"docs":{},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"h":{"docs":{},"a":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}},"m":{"docs":{},"e":{"docs":{},"r":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{},":":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"p":{"docs":{},"h":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"l":{"docs":{},"o":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"d":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},"t":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"s":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"w":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}},"e":{"docs":{},"v":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"t":{"docs":{},"h":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"c":{"docs":{},"a":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},")":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},")":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"h":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"f":{"8":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"e":{"docs":{},"l":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":5.008264462809917},"intro/careers.html":{"ref":"intro/careers.html","tf":5.005291005291006},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.004323656578134651},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"n":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"e":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"r":{"docs":{},"m":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"e":{"docs":{},"f":{"docs":{},"o":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"x":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"l":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.034898085237801114}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"n":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"/":{"docs":{},"r":{"docs":{},"e":{"docs":{},"g":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"l":{"docs":{},"a":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":5.009433962264151},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"’":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"v":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"s":{"docs":{},"h":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"w":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"e":{"docs":{},"x":{"docs":{},"i":{"docs":{},"b":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}},"k":{"docs":{},"s":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":10.009264978381717},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"c":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}}},"m":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"t":{"docs":{},"u":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"m":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.009882643607164917}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"e":{"docs":{},"r":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"k":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"u":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"n":{"docs":{},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"v":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"c":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"s":{"docs":{},"t":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01084010840108401},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"k":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"u":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}},"r":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"w":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"e":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"d":{"docs":{},"b":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{},"c":{"docs":{},"l":{"docs":{},"o":{"docs":{},"s":{"docs":{},"e":{"docs":{},"(":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"(":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"w":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{},"(":{"docs":{},"s":{"docs":{},"[":{"docs":{},":":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"c":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"'":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"g":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"a":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"m":{"docs":{},"p":{"docs":{},"s":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"o":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"a":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"o":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"g":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}}},"l":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"h":{"docs":{},"a":{"docs":{},"m":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"u":{"docs":{},"i":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"a":{"docs":{},"n":{"docs":{},"c":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"e":{"docs":{},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"a":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"r":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"d":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"p":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"e":{"docs":{},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},"a":{"docs":{},"l":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"r":{"docs":{},"a":{"docs":{},"'":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"f":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"t":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"h":{"docs":{},"u":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.05627705627705628}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"r":{"docs":{},"a":{"docs":{},"d":{"docs":{},"u":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"d":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"e":{"docs":{},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"e":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}},"o":{"docs":{},"u":{"docs":{},"p":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"d":{"docs":{},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965}}}},"n":{"docs":{},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{},"p":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.013550135501355014},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"u":{"docs":{},"r":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"p":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"v":{"docs":{},"a":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"w":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"s":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},".":{"docs":{},"s":{"docs":{},"h":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}}}},"m":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"o":{"docs":{},"k":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"c":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"v":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"p":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"d":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},"d":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}}}}},"j":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"e":{"docs":{},"r":{"docs":{},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}},"u":{"docs":{},"m":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"e":{"docs":{},"/":{"docs":{},"s":{"docs":{},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"/":{"docs":{},"l":{"docs":{},"u":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}},"g":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"m":{"docs":{},"l":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},":":{"docs":{},"/":{"docs":{},"/":{"docs":{},"w":{"docs":{},"w":{"docs":{},"w":{"docs":{},".":{"docs":{},"n":{"docs":{},"i":{"docs":{},"r":{"docs":{},"s":{"docs":{},"o":{"docs":{},"f":{"docs":{},"t":{"docs":{},".":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{},"/":{"docs":{},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{},"s":{"docs":{},"/":{"docs":{},"a":{"docs":{},"l":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"_":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{},"_":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{},"s":{"docs":{},".":{"docs":{},"h":{"docs":{},"t":{"docs":{},"m":{"docs":{},"l":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01084010840108401},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0037059913526868438}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"a":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}},"n":{"docs":{},"d":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"y":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"e":{"docs":{},"t":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}}}}}},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"a":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},")":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"r":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"t":{"docs":{"./":{"ref":"./","tf":10},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.007407407407407408},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.007407407407407408}}}}}},"r":{"docs":{},"a":{"docs":{},"g":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},")":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}}}}}}}}},"c":{"docs":{},"r":{"docs":{},"e":{"docs":{},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"i":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"l":{"docs":{},"u":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"docs":{},"r":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"e":{"docs":{},"x":{"docs":{},"p":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"s":{"docs":{},"t":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"t":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}}}}},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.011210762331838564},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238}},"o":{"docs":{},"r":{"docs":{},"(":{"docs":{},"s":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"a":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"r":{"docs":{},"t":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"v":{"docs":{},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"a":{"docs":{},"l":{"docs":{},"u":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},".":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}}}},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"q":{"docs":{},"u":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}},"'":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"h":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"o":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.010809141445336628}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"/":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"s":{"docs":{},"c":{"2":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"docs":{}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"9":{"6":{"6":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}},"t":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"'":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}},"’":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"f":{"docs":{},"=":{"docs":{},".":{"docs":{},"/":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"_":{"docs":{},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"_":{"docs":{},"a":{"docs":{},"_":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"_":{"docs":{},"i":{"docs":{},"n":{"docs":{},"_":{"docs":{},"i":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"x":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}},"h":{"docs":{},"d":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{},"l":{"docs":{},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"j":{"docs":{},"o":{"docs":{},"h":{"docs":{},"a":{"docs":{},"n":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"b":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":5.003174603174603},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"f":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"a":{"docs":{},"v":{"docs":{},"a":{"docs":{},"s":{"docs":{},"c":{"docs":{},"r":{"docs":{},"i":{"docs":{},"p":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"y":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"k":{"docs":{},"e":{"docs":{},"e":{"docs":{},"p":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"n":{"docs":{},"o":{"docs":{},"w":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"e":{"docs":{},"d":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}},"a":{"docs":{},"i":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.008465608465608466},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018},"contrib.html":{"ref":"contrib.html","tf":0.017316017316017316}},"e":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825}}}}}}}},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"n":{"docs":{},"g":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"e":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"t":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"x":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"f":{"docs":{},"r":{"docs":{},"e":{"docs":{},"e":{"docs":{},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"o":{"docs":{},"p":{"docs":{},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}},"y":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}},"(":{"docs":{},"c":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"c":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"c":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"s":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"c":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"g":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"v":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{},"u":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.013550135501355014},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"b":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"s":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"s":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"j":{"docs":{},"o":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"k":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.013477088948787063},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"s":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}},"i":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.025423728813559324},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"f":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"p":{"docs":{},"u":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"f":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"p":{"docs":{},"a":{"docs":{},"g":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"d":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}},"i":{"docs":{},"n":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"l":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"c":{"docs":{},"h":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{},"/":{"docs":{},"/":{"docs":{},".":{"docs":{},"/":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},".":{"docs":{},"m":{"docs":{},"o":{"docs":{},"d":{"docs":{},"u":{"docs":{},"l":{"docs":{},"e":{"1":{"docs":{},".":{"docs":{},"m":{"docs":{},"y":{"docs":{},"m":{"docs":{},"a":{"docs":{},"c":{"docs":{},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"docs":{}}}}}}}}}}}}}}}}}}}}}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"y":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"r":{"docs":{},"o":{"docs":{},"s":{"docs":{},"h":{"docs":{},"k":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"r":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{},"o":{"docs":{},"w":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"c":{"docs":{},"i":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"p":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"x":{"docs":{},"i":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.018867924528301886}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"r":{"docs":{},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"?":{"docs":{},"\"":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233}},"u":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"n":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"l":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"m":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.016172506738544475},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.004014823965410748}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"d":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"a":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"e":{"docs":{},"r":{"docs":{},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"d":{"docs":{},"i":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"a":{"docs":{},"p":{"docs":{},"i":{"docs":{},"x":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"c":{"docs":{},"r":{"docs":{},"o":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}},"s":{"docs":{},"o":{"docs":{},"f":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"u":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"l":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"a":{"docs":{},"k":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}},"p":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"k":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.008465608465608466},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"r":{"docs":{},"n":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"u":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"i":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"n":{"docs":{},"e":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"t":{"docs":{},"h":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"t":{"docs":{},"i":{"docs":{},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"y":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"v":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"u":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"m":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"d":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"k":{"docs":{},"d":{"docs":{},"i":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"3":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"4":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0033971587399629403},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}},"l":{"docs":{},"i":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"t":{"docs":{},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},"+":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"/":{"docs":{},"h":{"docs":{},"o":{"docs":{},"s":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}}}},"u":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"s":{"docs":{},"p":{"docs":{},"a":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.013550135501355014},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"c":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"g":{"docs":{},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},":":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}},"o":{"docs":{},"w":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}}},"p":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"r":{"docs":{},"m":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"t":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"h":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"d":{"docs":{},"e":{"docs":{},"j":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"a":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"h":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{},"v":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"v":{"docs":{},"i":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009}}}}},"r":{"docs":{},"r":{"docs":{},"o":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"m":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"y":{"docs":{},"u":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"o":{"docs":{},"l":{"docs":{},"a":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"s":{"docs":{},"a":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"m":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"f":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"p":{"docs":{},"m":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"o":{"docs":{},"p":{"docs":{},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}},"s":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"f":{"docs":{},"u":{"docs":{},"s":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"e":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"=":{"docs":{},".":{"docs":{},"/":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},"_":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"x":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.02830188679245283},"intro/careers.html":{"ref":"intro/careers.html","tf":0.007407407407407408},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"g":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}}},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/":{"ref":"tradecraft/","tf":5.5},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.04878048780487805},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},".":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},"(":{"docs":{},"'":{"docs":{},"i":{"docs":{},"t":{"docs":{},"s":{"docs":{},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"d":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"i":{"docs":{},"t":{"docs":{},"'":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"p":{"docs":{},"o":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802}}}}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"a":{"docs":{},"m":{"docs":{},"i":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{},"z":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"c":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"p":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"e":{"docs":{},"a":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"w":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}}},"f":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"l":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"e":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"'":{"docs":{},"r":{"docs":{},"e":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"y":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"i":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"w":{"docs":{},"e":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"v":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"w":{"docs":{},"a":{"docs":{},"s":{"docs":{},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}}}}},"n":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"s":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"w":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005}},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"u":{"docs":{},"l":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"s":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}},"n":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"l":{"docs":{},"o":{"docs":{},"a":{"docs":{},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"c":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"a":{"docs":{},"g":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"\"":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"t":{"docs":{},"o":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"g":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"/":{"docs":{},"t":{"docs":{},"o":{"docs":{},"/":{"docs":{},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},".":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}},"c":{"docs":{},"h":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"n":{"docs":{},"e":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"o":{"docs":{},"p":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}}}},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"t":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},".":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{},"c":{"docs":{},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"r":{"docs":{},"s":{"docs":{},"u":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"o":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"/":{"docs":{},"i":{"docs":{},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"c":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"g":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"d":{"docs":{},"a":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"e":{"docs":{},"p":{"docs":{},"d":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}}}}},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"y":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"g":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.016260162601626018},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.017937219730941704},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"'":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139}}}}},"a":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"'":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"d":{"docs":{},"u":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}},"m":{"docs":{},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"o":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"t":{"docs":{},"o":{"docs":{},"c":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"x":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"h":{"docs":{},"i":{"docs":{},"b":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"r":{"docs":{},"i":{"docs":{},"e":{"docs":{},"t":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"o":{"docs":{},"s":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"p":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":5.006993006993007}},"a":{"docs":{},"r":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"d":{"docs":{},"o":{"docs":{},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"v":{"docs":{},"i":{"docs":{},"o":{"docs":{},"u":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"m":{"docs":{},"i":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"c":{"docs":{},"i":{"docs":{},"p":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"t":{"docs":{},"(":{"docs":{},"c":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"m":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"v":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"c":{"docs":{},"i":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"d":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"o":{"docs":{},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"f":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"w":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"x":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"l":{"docs":{},"a":{"docs":{},"i":{"docs":{},"d":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"c":{"docs":{},"t":{"docs":{},"f":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"y":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"b":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"a":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"o":{"docs":{},"l":{"docs":{},"i":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}},"c":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"y":{"docs":{},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.002779493514515133}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},"w":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"p":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"s":{"docs":{},"h":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351}}}}},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"t":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"s":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"o":{"docs":{},"s":{"docs":{},"o":{"docs":{},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"y":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}}}}},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"e":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"l":{"docs":{},"l":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"r":{"docs":{},"p":{"docs":{},"o":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"z":{"docs":{},"z":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"f":{"docs":{},"i":{"docs":{},"x":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"d":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"c":{"docs":{},"k":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"p":{"docs":{},"t":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"x":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"w":{"docs":{},"n":{"docs":{},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"n":{"docs":{},"g":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}}}}}},"i":{"docs":{},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"l":{"docs":{},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}}},"n":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"p":{"docs":{},"d":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}},"l":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"r":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"m":{"docs":{},"e":{"docs":{},".":{"docs":{},"m":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"s":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"s":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"f":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.01569506726457399},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"e":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"i":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}},"l":{"docs":{},"e":{"docs":{},"v":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"h":{"docs":{},"i":{"docs":{},"p":{"docs":{},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}}}}}}},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.018867924528301886},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"y":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"a":{"docs":{},"i":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"h":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},":":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}},"g":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"r":{"docs":{},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},"r":{"docs":{},"/":{"docs":{},"r":{"docs":{},"e":{"docs":{},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}},"e":{"docs":{},"i":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"u":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"g":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"e":{"docs":{},"m":{"docs":{},"b":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"o":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"v":{"docs":{},"e":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"q":{"docs":{},"u":{"docs":{},"i":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"s":{"docs":{},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"o":{"docs":{},"u":{"docs":{},"r":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"o":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"l":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"i":{"docs":{},"z":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"e":{"docs":{},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"i":{"docs":{},"e":{"docs":{},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"w":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.020477815699658702},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"u":{"docs":{},"s":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"a":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"d":{"docs":{},"o":{"docs":{},"m":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"k":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"i":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"y":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"u":{"docs":{},"n":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"n":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"b":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"f":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"s":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"t":{"docs":{},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"g":{"docs":{},"o":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}},"o":{"docs":{},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"/":{"docs":{},"e":{"docs":{},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{},"o":{"docs":{},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"s":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"p":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.013651877133105802},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"?":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},"_":{"docs":{},"m":{"docs":{},"i":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}}},"g":{"docs":{},"a":{"docs":{},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"u":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"n":{"docs":{},"d":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"n":{"docs":{},"i":{"docs":{},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"o":{"docs":{},"t":{"docs":{},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"p":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"g":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"f":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"n":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"c":{"docs":{},"h":{"docs":{},"e":{"docs":{},"d":{"docs":{},"u":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"e":{"docs":{},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}},"m":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"i":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.018867924528301886},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"t":{"docs":{},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},"a":{"docs":{},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"p":{"docs":{},"e":{"docs":{},"l":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"r":{"docs":{},"i":{"docs":{},"p":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"e":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"h":{"docs":{},"o":{"docs":{},"t":{"docs":{},".":{"docs":{},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}},"e":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"e":{"docs":{},"c":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.018404907975460124},"intro/":{"ref":"intro/","tf":0.04716981132075472},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.02433862433862434},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}},"+":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},":":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},"o":{"docs":{},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.002779493514515133}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"u":{"docs":{},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"e":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"m":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"l":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"r":{"docs":{},"v":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}},")":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"n":{"docs":{},"d":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"p":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"q":{"docs":{},"u":{"docs":{},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"h":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"c":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"s":{"docs":{},"i":{"docs":{},"g":{"docs":{},"h":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"w":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}},"e":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"l":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"o":{"docs":{},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"l":{"docs":{},"v":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"f":{"docs":{},"t":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01084010840108401},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.027972027972027972}}}}}},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"m":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"i":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"w":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"o":{"docs":{},"n":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"u":{"docs":{},"r":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":5.021680216802168},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"i":{"docs":{},"a":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238}}}}}},"n":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"t":{"docs":{},"i":{"docs":{},"r":{"docs":{},"o":{"docs":{},"v":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}},"t":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"u":{"docs":{},"c":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"e":{"docs":{},"d":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"l":{"docs":{},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"g":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0021618282890673254}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"d":{"docs":{},";":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"u":{"docs":{},"d":{"docs":{},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":5.008130081300813}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233}}}}}},"x":{"docs":{},"n":{"docs":{},"e":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"a":{"docs":{},"r":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"f":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"p":{"docs":{},"o":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.016260162601626018}}}}}}}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}},"y":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"g":{"docs":{},"e":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"t":{"docs":{},"c":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"p":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{},"o":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}}}}}}}}},"o":{"docs":{},"n":{"docs":{},"a":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"p":{"docs":{},"h":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"s":{"docs":{},"o":{"docs":{},"l":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"v":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"l":{"docs":{},"t":{"docs":{},"h":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"i":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"y":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"u":{"docs":{},"c":{"docs":{},"c":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},"s":{"docs":{},"s":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},"l":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"h":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}},"p":{"docs":{},"p":{"docs":{},"l":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"d":{"docs":{},"i":{"docs":{},"v":{"docs":{},"i":{"docs":{},"d":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}}}}},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"t":{"docs":{},"u":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"r":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}},"i":{"docs":{},"t":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"d":{"docs":{},"o":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"p":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"g":{"docs":{},"g":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},"!":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}}}}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"l":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},",":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"g":{"docs":{},"n":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}},"i":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"u":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"p":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"i":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"f":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"z":{"docs":{},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"s":{"docs":{},")":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"a":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.01694915254237288}},"'":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"a":{"docs":{},"t":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}}}}}}},"p":{"docs":{},"i":{"docs":{},"r":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}},"e":{"docs":{},"a":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"e":{"docs":{},"r":{"docs":{},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"c":{"docs":{},"i":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"f":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"c":{"docs":{},")":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"t":{"docs":{},"o":{"docs":{},"g":{"docs":{},"r":{"docs":{},"a":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"(":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"a":{"docs":{},"r":{"docs":{},"c":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"c":{"docs":{},"e":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"u":{"docs":{},"r":{"docs":{},"a":{"docs":{},"i":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}},"i":{"docs":{},"d":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"l":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"n":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"m":{"docs":{},"a":{"docs":{},"s":{"docs":{},"h":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"r":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"p":{"docs":{},"h":{"docs":{},"o":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"g":{"docs":{},"g":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"k":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"p":{"docs":{},"=":{"1":{"3":{"3":{"5":{"2":{"0":{"5":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}},"docs":{}}}}},"l":{"docs":{},"o":{"docs":{},"t":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"e":{"docs":{},"u":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"i":{"docs":{},"d":{"docs":{},"e":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}},"y":{"docs":{},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"s":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},":":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"m":{"docs":{},"b":{"docs":{},"o":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"n":{"docs":{},"o":{"docs":{},"n":{"docs":{},"y":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"a":{"docs":{},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"n":{"docs":{},"i":{"docs":{},"p":{"docs":{},"p":{"docs":{},"e":{"docs":{},"t":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"a":{"docs":{},"p":{"docs":{},"s":{"docs":{},"h":{"docs":{},"o":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"q":{"docs":{},"l":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.01910828025477707},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"u":{"docs":{},"a":{"docs":{},"s":{"docs":{},"h":{"docs":{},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"a":{"docs":{},"m":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"c":{"docs":{},"h":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"n":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943}}}},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}},"n":{"docs":{},"o":{"docs":{},"l":{"docs":{},"o":{"docs":{},"g":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}}},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"a":{"docs":{},"l":{"docs":{},")":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"q":{"docs":{},"u":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.008968609865470852},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"l":{"docs":{},"l":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"r":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662}},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"k":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"m":{"docs":{},"p":{"docs":{},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0033971587399629403}},"\"":{"docs":{},")":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"h":{"docs":{},"a":{"docs":{},"t":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"m":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"v":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"?":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"1":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"r":{"docs":{},"e":{"docs":{},"’":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},",":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"t":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"n":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"s":{"docs":{},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"n":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006349206349206349},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"r":{"docs":{},"d":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{},"!":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"s":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"t":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}}},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"n":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},".":{"docs":{},"j":{"docs":{},"p":{"docs":{},"e":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"o":{"docs":{},"o":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.013550135501355014},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.006726457399103139},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.012711864406779662},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.017064846416382253},"web/exploits.html":{"ref":"web/exploits.html","tf":0.03821656050955414},"forensics/":{"ref":"forensics/","tf":0.007103150092649784},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"k":{"docs":{},"i":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"intro/":{"ref":"intro/","tf":0.009433962264150943},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/":{"ref":"toolkits/","tf":5.5},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":5.041958041958042},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}},"s":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},"i":{"docs":{},"c":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"s":{"docs":{},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"y":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"d":{"docs":{},"a":{"docs":{},"y":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"l":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"n":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"r":{"docs":{},"a":{"docs":{},"d":{"docs":{},"e":{"docs":{},"c":{"docs":{},"r":{"docs":{},"a":{"docs":{},"f":{"docs":{},"t":{"docs":{"tradecraft/":{"ref":"tradecraft/","tf":5.5},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.04065040650406504}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}},":":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}}}}}}},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"i":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"n":{"docs":{},"s":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"m":{"docs":{},"i":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"c":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"o":{"docs":{},"u":{"docs":{},"b":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"p":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"e":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},")":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"u":{"docs":{},"s":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"n":{"docs":{},"c":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"s":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"p":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"t":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"y":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}}}},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0030883261272390363}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"a":{"docs":{},"k":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}},"l":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.004232804232804233}}},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}}}},"n":{"docs":{},"t":{"docs":{},"a":{"docs":{},"m":{"docs":{},"o":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}},"g":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"o":{"docs":{},"s":{"docs":{},"s":{"docs":{},"a":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005}}}}}},"c":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}},"s":{"docs":{},"k":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.002779493514515133},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"m":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"w":{"docs":{},"o":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"c":{"docs":{},"p":{"docs":{},"d":{"docs":{},"u":{"docs":{},"m":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"x":{"docs":{},"t":{"docs":{},"r":{"docs":{},"a":{"docs":{},"c":{"docs":{},"t":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"g":{"docs":{},"z":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"2":{"docs":{},"e":{"docs":{},"i":{"4":{"docs":{},"h":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"docs":{}}}},"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.005291005291005291},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.013550135501355014},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.013452914798206279},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.018867924528301886},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.030716723549488054},"forensics/":{"ref":"forensics/","tf":0.011426806670784434},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.013986013986013986},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}},"f":{"docs":{},"u":{"docs":{},"l":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"a":{"docs":{},"g":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"e":{"docs":{},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"s":{"docs":{},"b":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}},"n":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"l":{"docs":{},"i":{"docs":{},"s":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}}}}}},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}},"a":{"docs":{},"v":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"e":{"docs":{},"r":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"r":{"docs":{},"o":{"docs":{},"l":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},"t":{"docs":{},"a":{"docs":{},"n":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.01084010840108401},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},",":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}}},"l":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"i":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006349206349206349},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}}}}}}}},"x":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"/":{"docs":{},"l":{"docs":{},"i":{"docs":{},"n":{"docs":{},"u":{"docs":{},"x":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"q":{"docs":{},"u":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"d":{"docs":{},"o":{"docs":{},"x":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"o":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}},"e":{"docs":{},"n":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"e":{"docs":{},"d":{"docs":{},"/":{"docs":{},"u":{"docs":{},"n":{"docs":{},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}},"f":{"docs":{},"a":{"docs":{},"m":{"docs":{},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"a":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"l":{"docs":{},"i":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"n":{"docs":{},"o":{"docs":{},"t":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"u":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"p":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"]":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}}},"p":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"o":{"docs":{},"n":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}},"i":{"docs":{},"c":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"m":{"docs":{},"d":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}},"f":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"i":{"docs":{},"l":{"docs":{"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}}},"b":{"docs":{},"u":{"docs":{},"n":{"docs":{},"t":{"docs":{},"u":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"l":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"o":{"docs":{},"n":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"l":{"docs":{},"u":{"docs":{},"m":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"e":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"r":{"docs":{},"o":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"i":{"docs":{},"t":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"u":{"docs":{},"l":{"docs":{},"n":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/":{"ref":"vulnerabilities/","tf":5.5},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.037940379403794036},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.029661016949152543},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.008086253369272238},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.010238907849829351},"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}},"i":{"docs":{},"l":{"docs":{},"i":{"docs":{},"t":{"docs":{},"i":{"docs":{},"e":{"docs":{},"s":{"docs":{},",":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}}}}}}}}}}}}}},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{},"a":{"docs":{},"t":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{},"s":{"docs":{},",":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}},"n":{"docs":{},"t":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"o":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}},"e":{"docs":{},"t":{"docs":{},"i":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"y":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"l":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"i":{"docs":{},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},"b":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}}}}},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"i":{"docs":{},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"e":{"docs":{},"w":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"d":{"docs":{},"e":{"docs":{},"o":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293}}}}},"r":{"docs":{},"g":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"a":{"docs":{},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"t":{"docs":{},"u":{"docs":{},"a":{"docs":{},"l":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"o":{"docs":{},"l":{"docs":{},"a":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},"o":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0031746031746031746}}}}}},"r":{"docs":{},"s":{"docs":{},"i":{"docs":{},"o":{"docs":{},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}}},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"f":{"docs":{},"i":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"t":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"m":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{},"e":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},")":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"b":{"docs":{},"a":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}},"s":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"w":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"a":{"docs":{},"l":{"docs":{},"k":{"docs":{},"t":{"docs":{},"h":{"docs":{},"r":{"docs":{},"o":{"docs":{},"u":{"docs":{},"g":{"docs":{},"h":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}}}}},"n":{"docs":{},"t":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/find.html":{"ref":"intro/find.html","tf":0.01652892561983471},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}},"y":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.005420054200542005},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.01078167115902965},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},",":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"?":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"r":{"docs":{},"g":{"docs":{},"a":{"docs":{},"m":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.024793388429752067},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"e":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},"n":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"c":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"s":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"v":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"e":{"docs":{},"f":{"docs":{},"o":{"docs":{},"r":{"docs":{},"m":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"e":{"docs":{},"l":{"docs":{},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},"e":{"docs":{},"!":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0009264978381717109},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}}}},"’":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}},"v":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}}}},"e":{"docs":{},"k":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},"e":{"docs":{},"n":{"docs":{},"d":{"docs":{},":":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.006825938566552901}}}}},"b":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.0635593220338983},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"web/exploits.html":{"ref":"web/exploits.html","tf":0.03184713375796178},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}},"s":{"docs":{},"i":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},"e":{"docs":{},":":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},":":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}},"a":{"docs":{},"p":{"docs":{},"p":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":5},"web/exploits.html":{"ref":"web/exploits.html","tf":5}}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"'":{"docs":{},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"l":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"r":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"a":{"docs":{},"k":{"docs":{},"n":{"docs":{},"e":{"docs":{},"s":{"docs":{},"s":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"h":{"docs":{},"e":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"r":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"r":{"docs":{},"e":{"docs":{},"i":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"v":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"i":{"docs":{},"c":{"docs":{},"h":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"t":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}},"n":{"docs":{"./":{"ref":"./","tf":0.012269938650306749}},"d":{"docs":{},"b":{"docs":{},"g":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"o":{"docs":{},"w":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"s":{"docs":{},".":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"t":{"docs":{},"h":{"docs":{},"o":{"docs":{},"u":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0012353304508956147},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"n":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"r":{"docs":{},"e":{"docs":{},"s":{"docs":{},"h":{"docs":{},"a":{"docs":{},"r":{"docs":{},"k":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},",":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}},"p":{"docs":{},"y":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"k":{"docs":{},"i":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"b":{"docs":{},"o":{"docs":{},"o":{"docs":{},"k":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426}}}}}}}},"d":{"docs":{},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}},"o":{"docs":{},"l":{"docs":{},"f":{"docs":{},"g":{"docs":{},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}}}},"r":{"docs":{},"k":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"intro/":{"ref":"intro/","tf":0.009433962264150943},"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.004484304932735426},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.0024706609017912293},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993}},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}},"s":{"docs":{},",":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"h":{"docs":{},"o":{"docs":{},"p":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00847457627118644},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357},"toolkits/prep.html":{"ref":"toolkits/prep.html","tf":0.006993006993006993},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},".":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}},".":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"l":{"docs":{},"d":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},"!":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"\\":{"docs":{},"!":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"r":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"/":{"docs":{},"_":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{},"s":{"docs":{},"/":{"docs":{},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"d":{"docs":{},"o":{"docs":{},"c":{"docs":{},"u":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},"f":{"docs":{},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"t":{"docs":{},"a":{"docs":{},"b":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"n":{"docs":{},"u":{"docs":{},"m":{"docs":{},"b":{"docs":{},"e":{"docs":{},"r":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"t":{"docs":{},"y":{"docs":{},"l":{"docs":{},"e":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"w":{"docs":{},"i":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"f":{"docs":{},"f":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"/":{"docs":{},"t":{"docs":{},"h":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"1":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"docs":{}}}}}}}}}}}},"w":{"docs":{},"e":{"docs":{},"b":{"docs":{},"s":{"docs":{},"e":{"docs":{},"t":{"docs":{},"t":{"docs":{},"i":{"docs":{},"n":{"docs":{},"g":{"docs":{},"s":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}},"t":{"docs":{},"h":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"n":{"docs":{},"'":{"docs":{},"t":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165}}}},"d":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"r":{"docs":{},"o":{"docs":{},"t":{"docs":{},"e":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"n":{"docs":{},"g":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}},"i":{"docs":{},"t":{"docs":{},"e":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0021164021164021165},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.008130081300813009},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"y":{"docs":{},"o":{"docs":{},"u":{"docs":{},".":{"docs":{"./":{"ref":"./","tf":0.006134969325153374},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"’":{"docs":{},"l":{"docs":{},"l":{"docs":{"./":{"ref":"./","tf":0.018404907975460124}}}},"r":{"docs":{"./":{"ref":"./","tf":0.012269938650306749},"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"v":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}},"'":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.006349206349206349},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.005390835579514825},"forensics/":{"ref":"forensics/","tf":0.0006176652254478073},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}},"v":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"l":{"docs":{},"l":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}},"r":{"docs":{},"s":{"docs":{},"e":{"docs":{},"l":{"docs":{},"f":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}},",":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}},"r":{"docs":{},"k":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"e":{"docs":{},"a":{"docs":{},"r":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}},".":{"docs":{"intro/find.html":{"ref":"intro/find.html","tf":0.008264462809917356}}},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"t":{"docs":{},"?":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}},"“":{"docs":{},"k":{"docs":{},"n":{"docs":{},"o":{"docs":{},"w":{"docs":{"./":{"ref":"./","tf":0.006134969325153374}}}}}},"b":{"docs":{},"i":{"docs":{},"n":{"docs":{},"a":{"docs":{},"r":{"docs":{},"i":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}},"d":{"docs":{},"e":{"docs":{},"f":{"docs":{},"u":{"docs":{},"s":{"docs":{},"e":{"docs":{},"”":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"r":{"docs":{},"e":{"docs":{},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}},"‘":{"docs":{},"c":{"docs":{},"a":{"docs":{},"p":{"docs":{},"t":{"docs":{},"u":{"docs":{},"r":{"docs":{"intro/":{"ref":"intro/","tf":0.009433962264150943}}}}}}}},"g":{"docs":{},"a":{"docs":{},"d":{"docs":{},"g":{"docs":{},"e":{"docs":{},"t":{"docs":{},"s":{"docs":{},"’":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}}}},"\"":{"docs":{},"w":{"docs":{},"i":{"docs":{},"l":{"docs":{},"l":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"b":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"y":{"docs":{},"o":{"docs":{},"u":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"b":{"docs":{},"a":{"docs":{},"s":{"docs":{},"i":{"docs":{},"c":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"l":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"c":{"docs":{},"o":{"docs":{},"m":{"docs":{},"p":{"docs":{},"u":{"docs":{},"t":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}},"v":{"docs":{},"e":{"docs":{},"r":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}},"r":{"docs":{},"i":{"docs":{},"m":{"docs":{},"e":{"docs":{},"w":{"docs":{},"a":{"docs":{},"r":{"docs":{"web/vulnerabilities.html":{"ref":"web/vulnerabilities.html","tf":0.00423728813559322}}}}}}}}},"h":{"docs":{},"u":{"docs":{},"n":{"docs":{},"k":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"u":{"docs":{},"l":{"docs":{},"t":{"docs":{},"i":{"docs":{},"m":{"docs":{},"a":{"docs":{},"t":{"docs":{},"e":{"docs":{},"\"":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}}}}}}}}},"'":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"=":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"a":{"docs":{},"u":{"docs":{},"t":{"docs":{},"o":{"docs":{},"p":{"docs":{},"s":{"docs":{},"y":{"docs":{},",":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}},"e":{"docs":{},"x":{"docs":{},"p":{"docs":{},"o":{"docs":{},"r":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}},"t":{"docs":{},"e":{"docs":{},"r":{"docs":{},"s":{"docs":{},",":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"o":{"docs":{},"r":{"docs":{},"e":{"docs":{},"n":{"docs":{},"s":{"docs":{},"i":{"docs":{},"c":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}},"h":{"docs":{},"i":{"docs":{},"d":{"docs":{},"d":{"docs":{},"e":{"docs":{},"n":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"c":{"docs":{},"r":{"docs":{},"e":{"docs":{},"m":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"s":{"docs":{},"i":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"m":{"docs":{},"a":{"docs":{},"g":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}}}},"o":{"docs":{},"b":{"docs":{},"j":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}},"f":{"docs":{},"f":{"docs":{},"i":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"p":{"docs":{},"a":{"docs":{},"c":{"docs":{},"k":{"docs":{},"e":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"l":{"docs":{},"a":{"docs":{},"i":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"x":{"docs":{},"t":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"r":{"docs":{},"a":{"docs":{},"w":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"b":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"s":{"docs":{},"u":{"docs":{},"s":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"i":{"docs":{},"o":{"docs":{},"u":{"docs":{},"s":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}},"x":{"docs":{},"m":{"docs":{},"p":{"docs":{},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"z":{"docs":{},"i":{"docs":{},"p":{"docs":{},"c":{"docs":{},"r":{"docs":{},"y":{"docs":{},"p":{"docs":{},"t":{"docs":{},"o":{"docs":{},"\"":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},".":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0012353304508956147}},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}},"g":{"docs":{},"d":{"docs":{},"b":{"docs":{},"i":{"docs":{},"n":{"docs":{},"i":{"docs":{},"t":{"docs":{"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125}}}}}}}}},"r":{"docs":{},"o":{"docs":{},"d":{"docs":{},"a":{"docs":{},"t":{"docs":{},"a":{"docs":{},",":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}}}},"/":{"docs":{},"m":{"docs":{},"y":{"docs":{},"r":{"docs":{},"e":{"docs":{},"p":{"docs":{},"o":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}},".":{"docs":{"contrib.html":{"ref":"contrib.html","tf":0.008658008658008658}}}}}}}}}}},"[":{"docs":{},"e":{"docs":{},"d":{"docs":{},"i":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"'":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"c":{"docs":{},"o":{"docs":{},"n":{"docs":{},"t":{"docs":{},"e":{"docs":{},"n":{"docs":{},"t":{"docs":{},"_":{"docs":{},"t":{"docs":{},"y":{"docs":{},"p":{"docs":{},"e":{"docs":{},"s":{"docs":{},"]":{"docs":{},".":{"docs":{},"x":{"docs":{},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}}}}}}}},"x":{"8":{"6":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.017937219730941704},"exploits/binary1.html":{"ref":"exploits/binary1.html","tf":0.0026954177897574125},"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}},".":{"docs":{"vulnerabilities/binary.html":{"ref":"vulnerabilities/binary.html","tf":0.002242152466367713}}}},"docs":{}},"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"forensics/":{"ref":"forensics/","tf":0.00030883261272390367},"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}},"y":{"docs":{},"z":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}},"s":{"docs":{},"s":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.012738853503184714}},",":{"docs":{"web/exploits.html":{"ref":"web/exploits.html","tf":0.006369426751592357}}}}},"l":{"docs":{},"s":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"x":{"docs":{},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}},"m":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"\"":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"p":{"docs":{},"l":{"docs":{},"i":{"docs":{},"c":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}},"x":{"docs":{},"d":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}}}},"z":{"docs":{},".":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}},"e":{"docs":{},"l":{"docs":{},"d":{"docs":{},"o":{"docs":{},"v":{"docs":{},"i":{"docs":{},"c":{"docs":{},"h":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"r":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}},"h":{"docs":{},"i":{"docs":{},"q":{"docs":{},"i":{"docs":{},"a":{"docs":{},"n":{"docs":{},"g":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583}}}}}}}}},"o":{"docs":{},"v":{"docs":{},"i":{"docs":{"intro/careers.html":{"ref":"intro/careers.html","tf":0.0010582010582010583},"contrib.html":{"ref":"contrib.html","tf":0.004329004329004329}}}}},"i":{"docs":{},"p":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}},",":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"d":{"docs":{},"e":{"docs":{},"t":{"docs":{},"a":{"docs":{},"i":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"i":{"docs":{},"n":{"docs":{},"f":{"docs":{},"o":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"l":{"docs":{},"i":{"docs":{},"b":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}},"s":{"docs":{},"t":{"docs":{},"e":{"docs":{},"g":{"docs":{},".":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"/":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}},"e":{"docs":{},"p":{"docs":{},"a":{"docs":{},"n":{"docs":{},"/":{"docs":{},"d":{"docs":{},"i":{"docs":{},"s":{"docs":{},"s":{"docs":{},"e":{"docs":{},"c":{"docs":{},"t":{"docs":{},"o":{"docs":{},"r":{"docs":{},"s":{"docs":{},"/":{"docs":{"vulnerabilities/source.html":{"ref":"vulnerabilities/source.html","tf":0.0027100271002710027}}}}}}}}}}}}}}}}}},"m":{"docs":{},"n":{"docs":{},"t":{"docs":{},"/":{"docs":{},"c":{"docs":{},"h":{"docs":{},"a":{"docs":{},"l":{"docs":{},"l":{"docs":{},"e":{"docs":{},"n":{"docs":{},"g":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}}}}}}}}}}}}}}},"*":{"docs":{},"n":{"docs":{},"i":{"docs":{},"x":{"docs":{},".":{"docs":{"exploits/binary2.html":{"ref":"exploits/binary2.html","tf":0.0034129692832764505}}}}}}},"$":{"5":{"docs":{},",":{"0":{"0":{"0":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}},"docs":{}},"docs":{}},"docs":{}}},"docs":{"forensics/":{"ref":"forensics/","tf":0.0037059913526868438}},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},"%":{"docs":{},"t":{"docs":{},"e":{"docs":{},"m":{"docs":{},"p":{"docs":{},"%":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"'":{"docs":{},"\"":{"0":{"docs":{},"x":{"docs":{},"%":{"0":{"8":{"docs":{},"x":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}},"docs":{}}}},"docs":{}},"r":{"docs":{},"b":{"docs":{},"'":{"docs":{},")":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"a":{"docs":{},"d":{"docs":{},"(":{"docs":{},")":{"docs":{},")":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}},":":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0077208153180975915}}},"=":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0018529956763434219}}},">":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},">":{"docs":{},">":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"_":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0006176652254478073}},"s":{"docs":{},"/":{"docs":{},".":{"docs":{},"r":{"docs":{},"e":{"docs":{},"l":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"$":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{},"p":{"docs":{},"i":{"docs":{},"c":{"docs":{},"c":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"@":{"docs":{},"=":{"docs":{},".":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}},"g":{"docs":{},".":{"docs":{},".":{"docs":{},"q":{"docs":{},".":{"docs":{},".":{"docs":{},"a":{"docs":{},".":{"docs":{},"y":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"9":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"docs":{}}}}}}}}}}}}}}},"p":{"docs":{},"n":{"docs":{},"g":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},".":{"docs":{},"i":{"docs":{},"h":{"docs":{},"d":{"docs":{},"r":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}}}}}}}}}}}}},"f":{"docs":{},"i":{"docs":{},"l":{"docs":{},"e":{"docs":{},".":{"docs":{},".":{"docs":{},"x":{"docs":{},".":{"docs":{},".":{"docs":{},"y":{"docs":{},".":{"8":{"docs":{},"u":{"docs":{},"]":{"docs":{},".":{"docs":{},".":{"docs":{},"|":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}}}}}},"docs":{}}}}}}}}}}}}},"–":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0009264978381717109}}},"│":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}},"└":{"docs":{},"─":{"docs":{},"─":{"docs":{"forensics/":{"ref":"forensics/","tf":0.0015441630636195182}}}}},"├":{"docs":{},"─":{"docs":{},"─":{"docs":{"forensics/":{"ref":"forensics/","tf":0.004323656578134651}}}}},"�":{"docs":{},"�":{"docs":{"forensics/":{"ref":"forensics/","tf":0.00030883261272390367}}}},"&":{"docs":{"tradecraft/case_studies.html":{"ref":"tradecraft/case_studies.html","tf":0.008130081300813009}}}},"length":4110},"corpusTokens":["\"'","\"=\"","\"autopsy,\"","\"basic","\"black","\"chunks\"","\"comput","\"cover","\"crimewar","\"export","\"file","\"filters,\"","\"forensics\"","\"hidden","\"increment","\"insid","\"magic","\"objects\"","\"offic","\"packet","\"plaintext","\"profile\"","\"raw","\"rb\")","\"suspicious\"","\"ultimate\"","\"wb\")","\"will","\"xmp\"","\"you","\"zipcrypto\")","$","$5,000","$iccpicc","%temp%","&","'\"0x%08x","'rb').read())","(\"hello","(0","(0x00","(2d","(32","(a","(a.k.a.","(although","(and","(beef)","(between","(binary)","(both","(byte","(ccdc)","(code","(common","(cs:app)","(ctf).","(discuss","(disk","(dvwa)","(e.g.,","(especi","(ex:","(file","(fix","(for","(from","(gdb)","(if","(infrastructure,","(ir).","(isc)2","(isc)2'","(it'","(jar","(jpg,","(like","(link","(linux","(lsb)","(made","(mostli","(not","(nsa","(objects).","(of","(offensive)","(oper","(opportun","(or","(order","(packet","(pcap)","(pcap,","(pil)","(pw:","(python)","(rop)","(rtf,","(ruby)","(see","(switches,","(text","(the","(unless","(vba","(we","(when","(with","(zip,","*nix.",".","...","....","./myrepo","./myrepo.",".gdbinit",".rodata,","/","/epan/dissectors/","/mnt/challeng","0's,","0.960","00","00000000","00000010","00000020","00000030","00000040","010","02","04:00","05","06","08","09","0a","0c","0d","0x00000608","0x00006966","0x0a1a0a0d","0x0d000000","0x180000a4","0x43434950","0x43436924","0x474e5089","0x52444849","0x60'","0x6f725020","0x7f,","0x88020000","0xc93d4000","0xca050000","1","1'","1.8.5","10","10.","10.53","100","101","101,","101010101,","102","102,","108","1080,","111","114","12","12345.","12346.","12347.","12348.","12349.","1335205","13:19:58","14.04","1482","1482x648","18","1920","1998.","1])","1a","2","20","2008","2011","2017:06:13","2017:06:17","21,","22:34:05","24","255","256,","3","32","36","38","39","3:","3d","40","40668937","41","43","44","47","48","49","4e","5","50","500","50mb,","52","55","58","5d","5k","64","648","65","66","67","68","68656c6c6f20776f726c64210a","69","6:","6c","6f","71","72","750","767787","77","79","7z","7z,","8","8,","80’","85","87","88","89","89504e47","9","9,","95","99","9e","9f",":","=",">",">>>","[content_types].xml","[editor'","_rel","_rels/.rel","a)","a4","abil","about.","abov","above,","abus","academ","academia).","accept","access","accompani","accur","achiev","acquir","action/cap","action/capability?","activity.","actor","actual","addit","additionally,","address","administr","administrator.","admiration.","adob","adobe'","advanc","advantag","advic","advice.","ae","affect","aforement","afterward.","again","again).","again,","against","aggreg","agvsbg8gd29ybgqh","ahead,","aid","aim","aka","albertini","albertini.","alert,","alex","all).","all,","allow","alon","alone.","along","alpha","alphanumer","alreadi","already,","also,","alter","altern","although","alway","ama","ama'","ambition,","amd","amd64","amount","analysi","analysis,","analysis.","analyst","analyz","analyzer,","and,","and/or","anderson","andrew","ang","anim","anomalus?","anoth","answer","anti","antiviru","anyon","anyth","apart","api","app","app.xml","appeal","appear","appl","appli","applic","application.","applications!","applications.","apply.","approach.","appropri","approxim","apt","apt1","apt28","arbitrari","architect","archiv","archive,","archive:","are:","area","areas.","argument","arm,","around","articl","artifact.","artifici","ascii","ascii),","ascii.","ask","aspect","assembl","assessments)","associ","assum","at.","at:","attach","attack","attack\"","attack.","attacker\"","attacker.","attacks.","attempt","attempt,","attend","attendees!","attent","attribution,","audac","audio","audio,","audit","auditing,","auditing.","auditor","audits/app","austin","authent","author","autom","automat","automation).","avail","available.","avoid","awar","awareness.","awesome)","b)","background","bad","bait","ball.","barcodes),","base","base64","basi","basic","basic,","bc","be","becam","becom","beef","befor","before,","begin","beginn","behavior","behavior,","behavior.","behind","believ","belong","below","below.","berkeley","bernstein","best","better","between","bewar","beyond","bgrep","big","binari","binaries.","binutil","binwalk.","bisc","bit","bit)","bit/color","bits,","blocks\"","blog","bmp,","bodi","bomb","bomb.","bombs.”","boneh","book","book.","bootstrap","borrow","both","boundari","brain","branch","brandon","break","breakpoint","bridg","brief","broad","broadli","broken","brows","browser","brute","brute_cooki","bs=1","buffer","buffer,","bug","build","built","burp","bush","busi","business,","bust","bwa","bypass","byte","bytearray","bytearray(b\"hello","bytearray(b'\\x00\\xff')","bytearray(open('challenge.png',","bytearray.fromhex(u'00","bytes\")","bytes,","bytes,\"","bytes:","c","c)","c++.","c7","c9","ca","calendar","call","camera","campaign","campaigns.","can't","canon","capabl","capable.","capctf","capinfo","captur","capture)","capture),","capture.","career","carefulli","careto","carv","carving\"","carving,","carving.\"","case","cases,","cases.","cash","catalogu","categori","category).","category,","category.","caution","ccdc?","cd","center","cert","certain","certainti","certif","certification.","certified!\"","certified,","certified.","chain","challeng","challenge).","challenge,","challenge:","challengefil","challenges,","challenges.","challenges:","chang","changes.","channel","chapter","chapters,","charact","characterist","charset","cheat","cheatsheet","check","checksums,","cheesi","child","choic","choosing.","chose","chosen","chrome","chunk","cissp","cities.","city,","citysec,","clang","class","clear,","cleverli","click","client","clone","close","closely.","clue","clues.","cmm","cmu","co","coast)","code","code,","code.","codebas","codebase.","coe","coe)","collabor","collaboration.","collaboratively,","collect","colleg","college:","collegi","color","come","comfort","command","command.","command:","commands:","comment","comments.xml","commerci","commit","common","common.","commonli","commun","compani","company,","compar","compat","compet","competit","competition.","competition:","competitions,","compil","compilation”","complet","complex","complianc","complic","complicated,","compound","compress","compressed,","compression,","compromis","compromises.","comput","conceal","concentr","concept","concise,","conditionals,","confer","conference,","conference.","confession.","configurations,","confirm","confus","connections,","connections.","consid","consist","consol","constitut","construct","consult","consulting.","contact","contain","contain,","content","content,","content.","contents,","contents.","context","context,","continu","contribut","contribution,","contributor","control","conveni","convent","convers","conversational.","convert","convert,","convert.","converter,","coordinates,","copi","copyright","core.xml","corelan","corner","correct","correctly.","correspond","corrupt","corruption,","corruption.","cost","count","count=40668937","countermeasures.\"","cours","course,","courses,","cover","covers.","cow","crack","craft","creat","creation","creation,","creation.","credit,","crimewar","crimin","critic","crop,","crypto","cryptography),","cryptography,","cs","cs:app","csaw","csrf,","ctf","ctf!","ctf,","ctf?","ctfs,","ctfs.","cultiv","current","curv","custom","cyber","cybersecur","d","d.","da","dai","dalla","damag","damn","dan","dartmouth","data","data\"","data,","data.","data:","databases,","date/tim","daunt","day","day.","dd","de","debug","debugg","debugger.","decis","decod","decompil","decompress.","dedic","deeper,","defcon","defeat","defend","defens","defense,","defin","deflate/infl","delet","deliv","demand","demand,","demo","depth","deriv","describ","design","desktop","detail","details.","detect","determin","dev","develop","development.","devic","devices,","didier","dif","differ","different,","different?","difficult","difficulti","dig","digit","dimensions,","dino","direct","directed,","directli","directly,","directori","directory:","disallow","disassembl","disassembler.","disassembler:","disciplin","disciplines.","disconnect","discov","discoveri","discovery,","discret","discuss","disguis","disk","disk.","display","dissect","dissector","distil","distract","distribut","distribution.","dive","divid","do","do.","do.”","doc,","docprop","docprops/app.xml","docprops/core.xml","docprops/thumbnail.jpeg","document","document,","document.xml","document.xml.rel","document:","documents:","docx,","doesn't","domain","don't","done","done.","down","down,","download","dozen","dpkt","draw","drawn","drop","dtmf","due","dump","dure","dvwa","dvwa,","dvwa.","e","e6","e7","each","earli","easi","easier","easier,","easiest","easili","easy,","ebook","ebook:","echo","edit","editor","editor,","educ","edward","ef","effect","effectively,","effici","eight","element","elev","else,","else.","elsewhere,","elsewhere.","email","email.","emb","embed","embedded,","emerg","emerged:","emphasi","employ","enabl","encapsul","encod","encoder/decod","encoding,","encoding:","encodings,","encodings.","encount","encourag","encrypt","end","endpoint","enforc","engin","enjoy","enough","enough;","ensur","entir","environ","environments,","error","errors.","especi","essenc","essenti","etc).","etc.","etc.)","ethic","ethscan","evad","evalu","evan","even","everyth","everything,","evid","evidentiari","evolv","exact","exam","examin","exampl","example,","example.docx","example2","example2[1]","examples,","excel","execut","executed.","execution.","exercis","exercise.","exercises.","exhausting).","exif","exiftool","exiftool)","exiftool.","exist","exist.","expect","expel","expens","experi","experience.","expert","expert,","expert.","explain","explan","exploit","exploit.","exploitation,","exploitation.","exploits)","explor","export","expos","exposure.","ext3","ext4","ext4)","extend(),","extens","extern","extract","extracting:","extraordinarili","extrem","extundelete.","f","f).","f.close()","f.read()","f.write(s[::","f8","fact","fact,","factor","fail","familiar","fantast","fantastic.","far","fast,","fat","favorable.","favorites:","fcrackzip","featur","feedback","feel","few","fewer","ff","ff')","ffmpeg","ffmpy.","field","field.","fields,","file","file'","file,","file.","file:","filenam","files),","files,","files.","files:","filesystem","filesystem,","filesystem.","filesystems)","filesystems,","filesystems/registries,","filetyp","filetype.","filetypes,","fill","filter","final","finally,","financ","finance)","financi","find","firefox","firm.","firmwar","first","fit","five","fix","flag","flag)","flag.","flags.","flag’","flash.","flat","flavor","flaw","flexibl","flow","flow.","focu","focus","folder","folder.","folks,","follow","following,","fonttable.xml","fooled.","for,","for.","forc","foremost,","foremost.","forens","forensics,","forget","fork","format","format,","format.","format:","format;","formats,","formats.","formerli","fortun","fortunately,","found","fragment","frame","framework","framework.","free","free,","frequent","friend","friendli","frustrat","full","fun","fun,","fun.","function","functionality.","fundament","fundement","further","futur","g","ga","gadget","gain","game","gap","garbl","gather","gathered),","gdb","gear","gef,","gener","general,","generation\"","gera'","get","gif","gif,","gimp","git","git.","gitbook","gitbook,","github","give","given","glad","glance,","glance.","glimps","gnu","go","go.","goal","goal.","goeth","gold","good","googl","google.","gotham","govern","government).","gp","graduat","graphic","gratitud","gray","great","greater","grep","grep,","group","groups,","gruyer","gruyere,","guess","gui.","guid","guidanc","guide).","guide.","guideline.","hack","hacker","hacking:","hand","hand,","handi","handler","happen","hard","harder","hardli","harm","hat","have","haven't","haystack","header","headers),","headers.","headstart.","hear","height","hello","help","help,","helpful,","helpful.","here","here,","here.","here:","heurist","heuristic,","heuristics,","hex","hex:","hexadecim","hexdump","hexdump,","hexdump.","hexdump:","hexidecim","hidden","hide","hierarchy.","high","higher","highli","highlight","hijack","hints,","hire","histor","histori","history,","hole","home","hook","hope","hopefulli","host","host.sh","hosted.","hosts.","hovav","however,","hsctf","html","html,","http","http,","http://www.nirsoft.net/utils/alternate_data_streams.html.","hue/saturation/lumin","huge","human","i'v","ictf","ida","idea","ideal","ident","identif","identifi","identify,","identities,","idols,","ie.","iend","if=./file_with_a_file_in_it.xxx","ihdr","ii","illustr","im.","imag","image,","image.","image/png","image:","imagemagick","imho","implement","import","imposs","improv","in.","inadequ","inadvert","inc.","incid","includ","include:","incorpor","incred","incrimin","independ","indic","indirect","individu","individuals,","industri","industry'","industry,","industry.","inexpens","infected)","inflating:","inform","information.","infosec","infragard","initi","injection,","inod","input","input.zip","insecur","insert(),","insid","insight","insist","instal","installed,","instance,","instead","institut","instruct","instruction.","instructions,","instructor(s)","integ","integr","integrity.","intel","intel).","intend","intent.","intention","interact","interactive,","interdisciplinari","interest","interfac","interface,","interference,","interlac","intern","internet’","interpret","intim","intro","introduc","introduct","introductori","invaluable.","involv","ir","is.","isc2","iso9660","issa","issu","issues.","it'","it,","it.","itself.","it’","j.","javascript","jay","jensen","job","johann","jpg","jpg,","jump","justifi","kaitai.","kb","keep","key","keys,","keyword","kill","kind","kit","kit.","know","knowledg","knowledge.","known","lab","labs.","lack","languag","language.","larg","larger","last","latter","law","layer","layer,","layout","leader","leads,","learn","lectur","lecture,","lecture.","length","less","lesser","lesson","lesson,","lesson.","level","lib(c)","libari","libfreetyp","libmag","libmagic,","libpcap).","libpng,","libpoppler,","libr","librari","libraries.","library).","libxml,","licens","limit","lin","line","line:","link","link)","linux","linux,","list","list,","list.","list:","listen","lists,","lists.","littl","liu","live","local","locat","logs,","long","longer","look","look.","loops)","loops,","loss","lossi","lossless","lot","love","low","lowest","lsb","lure","machin","machine.","maco","macos).","macro","macro,","macro://./standard.module1.mymacro","made","made?","magic","mainli","maintain","major","make","malici","maliciousness:","malwar","man","manag","management.","mani","manifest","manipul","manipulations)","manner","manpag","manual","manual:","manufactur","map","marcin","markdown","markdown),","markdown.","marker","market.","massiv","master","master.","mastery.","mastroshka","materi","material.","materials.","matters,","maxim","mdl","me?\"","mean","measur","measurable.","media","mediainfo","meet","meetup","megapixel","meld","member","memes,","memori","memory,","mention","mentor","merg","messag","message.","metadata","metadata,","metadata.","meterpret","method","methodolog","methods.","micro","microsoft","microsoft'","mike","mileag","milk","mime","mind","mind.","mine","miner,","minim","mips,","mislead","miss","mistak","misus","mit","mkdir","mod","mode","mode:","model","modern","modif","modifi","modify,","modul","module,","module.","money","monthli","more","more,","more.","mors","motiv","mount","move","moyer","moyer'","mp3)","mp4)","much","multimon","multipl","multiplex","multipli","mutabl","myer","mysteri","myth","n","name","name).","narrow","nasm","nathan","nativ","natur","nature.","navig","ne","near","nearli","necessari","need","needl","neglect:","network","network+","network/host","neutral","never","new","newer","newest","newspap","next","next.","ng","ngrep.","nick","nickolai","nm","no.","nodej","non","nop,","normal","not),","note","note:","nothing.","notic","novelti","now","now,","now.","npm","nsa","ntfs,","number","numbering.xml","numbers\"","numer","nysec.","nyu","o","o'reilli","o'reilly.","obfusc","objcopy,","objdump,","object","objects\"","obscur","obsess","obsolet","obtain","occasion","occasionally,","occupi","occur","ocean","of=./extracted_file.xxx","offens","offense.","offer","offic","office:","officedissector","offset","offset),","offsets.","offsets:","ol","older","ole,","oletools.","on","on,","on.","onc","ones,","ones.","ongoing.","onlin","online,","online.","only.","ooxml","ooxml)","open","open('itsreversed',","open('reverseit',","oper","operate.","opinion","oppos","option","order","organ","organization:","organized.","orient","origami.","origin","os","others,","otherwis","ought","ourselves,","out","out,","out.","outlin","output","output,","output.zip","outsid","outweigh","over","overflow","overlap","overthewir","overview","overview,","owasp","own.","p","pack","pack\"","packag","packet","packets,","packettot","pad","page","page,","page.","paid","painless","panel","panel,","paper.","parlement","pars","parser,","part","parti","partial","particip","particular","particular).","particular,","partit","partition),","password","passwords,","past","patch","path","path/to/test.docx","pattern","patterns,","patterns.","paus","pay","payload","pcap","pcapfix.","pcapng","pcapng)","pcapng:","pdf","pdf,","pdf.","pdf:","peda,","peepdf,","penetr","pentest.cryptocity.net","pentesting,","peopl","percentages.","perform","perform/impl","permiss","persist","person","perspect","perspective\"","persuasive.","phase","philosophi","philosophy?","phish","phone","photo","php","php.","pick","picoctf","piec","pillow.","pipe","pitch,","pitfal","pixel","place","place.","plaid","plaidctf","plain","platform","platforms.","play","play,","playback","playback.","player","player,","player.","pleas","plu","plugin","plugins:","png","png)","png.","pngcheck.","pngtool","point","poli","polici","policy,","poly.","pop","pop(),","popul","popular","port","possibl","possible).","possible.","post","potenti","power","powerpc","powershel","ppt),","pptx).","practic","practiction","pre","predomin","premier","prep","prepar","preponder","presenc","present","present).","present,","present.","preview","previou","pride","primari","primarili","primer","primit","principl","print(c)","printabl","privaci","privileg","pro","pro.","probabl","probably:","problem","problems.","process","process,","processes,","processing:","processor","produc","product","profession","professional,","professional.","profil","program","program'","program,","program.","program;","programm","programmat","programmer'","programmer,","programming,","programs,","programs.","progress","prohibit","project","promis","prone","proof","propos","proprietari","protect","protecting?","protocol","protocols,","protocols.","provid","provide.","provided.","proxi","pro|","ptacek","public","publicli","publish","pull","purpos","put","puzzl","puzzles.","pwni","pwning","pyershark","python","python'","python)","python,","python.","qpdf","qr","qrtool","qualiti","question","quick","quickli","quinn","r","rais","ran","random","rang","rank","rar","rar,","rare","rather,","ray","re","reach","read","readelf,","reader,","readi","readme.md","real","realist","realli","reason","reassembl","receiv","recogn","recommend","recommend:","recommended.","reconstruct","recov","recover/reconstitut","red","reddit","reduc","refer","reference.","refin","reflect","regardless,","regex","region","regist","relat","relationships,","relev","rememb","remember,","remot","remove(),","repair","repositori","repository.","repres","represent","republish","requir","requisit","research","resid","resize,","resourc","respond","respons","response.","rest","restor","result","resume,","retain","return","reus","reveal","revers","reverse(),","reverse,","reversing,","review","rewrit","rgb","rgba,","rigor","risk","rittenhous","role","role,","role.","role/employ","roles:","rom","ronin","rootkit","rop","rop.","rop?","rop_mix","ropgadget","round","routine,","rp","rpi","rpisec","rtf,","rtfn","rubi","ruef","run","running,","runtim","rw","s","s:","said,","sale","sales.","same","same.","samurai","saniti","save","scale","scalpel,","scenario","scenario,","schedul","schedule.","scheme","schemes.","school","scienc","science.","scitool","scope","score","screenshot.png","screenshot.png:","script","scripts).","scripts.","search","search,","second","secret","secret.","section","section.","secur","security+","security,","security.","security:","see","see,","seek","seemingli","seen","select","sell","send","separ","sequenc","seri","serv","server","server)","servers)","servers,","servic","session","set","set.","settings.","settings.xml","setup","sever","shacham","shawn","sheet","shell","shellcod","shellcode,","short","short,","shortcut","shortsight","show","siberia","siberia'","sign","signific","similar","similarly,","simpl","simpli","simplifi","simul","singl","single,","site","situat","size","size)","sizes),","skill","skills,","skip=1335205","sleuth","sleuthkit","slide","slot.","slow","small","small,","smart","smartphon","smashthestack","smuggl","snapshot","snippet","snort.","so,","soc","socat","socat.","social","soffic","softwar","solv","solve.","someon","someth","sometim","somewhat","somewher","sonic","sophist","sophisticated,","sotirov","sourc","source,","sourcetrail","sox","space","space.","sparc.","speak","speaker'","speaker.","speaking,","special","specif","specifi","specific)","spectogram","spend","spent","spirit","split","split(),","sql","squashf","ssl","staff","stage","stand","standard","standpoint?","stanford","start","state","statement","static","static).","statist","stay","stealth","stealthi","steganograph","steganographi","steganography,","stegonagraphi","stegsolv","step","steven","stick","still","stitch","store","str","strategi","strategy,","stream","streamed;","streams.","string","strings,","strings.","strings:","strip","strong","strongli","structur","structured,","structures,","student","studi","stuxnet","style","styles.xml","styleswitheffects.xml","sub","subdivid","subject.","submission.","submit","substitut","subvert","succe","success","success.","successfulli","such","sudo","suffice,","suffix","suggestions!","suit","suitabl","supplement","support","supported.","suppos","sure","surgic","suspect","symbol","synonym","syntax,","system","system,","system.","systems'","systems.","systems:","t","tables,","tactic","take","talent","talent.","talk","tangl","tantamount","taossa","tar","target","task","task,","tasks,","tasks.","tcpdump","tcpxtract,","teach","team","teams,","teaser","tech","technic","technical)","technically,","techniqu","techniques,","technolog","technologist","technologists,","tell,","templated)","tend","term","termin","test","testdisk:","tester","testing,","testing.","text","text\"),","text,","text,\"","text.","tgz","tgz)","that,","that’","them,","them.","them?","theme","theme1.xml","themselv","then,","theoret","there'","there.","therefore,","there’","these,","thing","think","third","this.","those","though!","though.","thought","thread","threat\"","three","through","thumbnail","thumbnail.jpeg","time","time.","timelin","times,","tip","titl","tl","tml","today","togeth","toler","tom","tone","too.","tool","tool,","tool.","toolkit","toolkit.","tools,","tools.","toolset","toolsmith","top","topic","topics,","toward","toy","trace","track","tradecraft","tradecraft.","tradecraft:","tradit","traffic","traffic,","trail","train","transfer","transform","translat","transmit","travers","tree","trees)","tri","triag","triage,","trick","trickeri","tricks.","trid","trope","troubl","truncated:","trust","tshark,","two","two.","type","type,","typic","typically,","u2ei4hb","ubuntu","ucsb","uic","ultim","umd","unalloc","uncertain","uncontrol","uncov","undelet","under","understand","understand,","understanding,","unencrypted/uncompress","unfamiliar","unicod","uniqu","univers","university,","unix","unix/linux","unlik","unnotic","unorthodox","unpack","unravel","unrealist","unrel","unus","unzip","up","updat","updating.]","upon","upper","url,","us","us.","usag","usage,","usage.","use.","used,","used.","useful.","user","users,","users.","usual","ut","utf","util","v","valu","value.","variabl","variant","variations,","varieti","variou","vary.","vba","vendor","veri","verifi","version","vessel","video","view","view,","violat","virginia.","virtual","visibl","visit","visual","visualis","vm).","vm.","vmware","volatil","volatility.","voltron","volum","volume,","von","vrt:","vs","vulner","vulnerabilities,","vulnerabilities.","vulnerabl","w","walkthrough","walkthrough.","want","want,","wargam","wargame.","warn","wast","watch","water","wav,","waveform","waveforms,","way","way,","way?","we'll","we'r","we'v","weakness.","web","web,","web:","webapp","websettings.xml","websit","website:","week","week,","week.","weekend:","welcom","welcome!","well","west","we’ll","we’r","we’v","whatev","wherein","whether","which,","white","width","wiki","wikibook","will","win","windbg","window","windows,","windows.","wirepy.","wireshark","wireshark'","wireshark,","wireshark.","with.","within","without","wolfgang","won't","wonder","word","word/_rels/document.xml.rel","word/comments.xml","word/document.xml","word/fonttable.xml","word/numbering.xml","word/settings.xml","word/styles.xml","word/styleswitheffects.xml","word/theme/theme1.xml","word/websettings.xml","work","work,","work.","works,","works.","workshop","workshop,","workshop.","world","world!","world!\")","world\")","world,","world.","world\\!","worri","worst","worth","write","write.","written","wrong","wrote","x","x86","x86.","xls,","xlsx,","xml","xml\"","xplico","xss","xss,","xxd","xyz","yang","year","year.","years,","years.","yet?","york","you'll","you'r","you'v","you,","you.","yourself","you’ll","you’r","you’v","z.","zeldovich","zero","zhiqiang","zip","zip,","zipdetail","zipinfo","zlib","zovi","zsteg.","|","|....$iccpicc","|.............@=.|","|.g..q..a.y.....9|","|.png........ihdr|","|file..x..y.8u]..|","–","‘captur","‘gadgets’","“binari","“defuse”","“know","“revers","│","└──","├──","😉"],"pipeline":["stopWordFilter","stemmer"]},"store":{"./":{"url":"./","title":"Introduction","keywords":"","body":"CTF Field Guide\n\n“Knowing is not enough; we must apply. Willing is not enough; we must do.” - Johann Wolfgang von Goethe\n\nWelcome!\nWe’re glad you’re here. We need more people like you.\nIf you’re going to make a living in defense, you have to think like the offense.\nSo, learn to win at Capture The Flag (CTF). These competitions distill major disciplines of professional computer security work into short, objectively measurable exercises. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft.\nWhether you want to succeed at CTF, or as a computer security professional, you’ll need to become an expert in at least one of these disciplines. Ideally in all of them.\nThat’s why we wrote this book.\nIn these chapters, you’ll find everything you need to win your next CTF competition:\n\nWalkthroughs and details on past CTF challenges\nGuidance to help you design and create your own toolkits\nCase studies of attacker behavior, both in the real world and in past CTF competitions\n\nTo make your lives easier, we’ve supplemented each lesson with the Internet’s best supporting reference materials. These come from some of the best minds in the computer security field. Looking ahead, we hope you’ll collaborate to keep this book evolving with the industry.\nWe’ve tried to structure this so you can learn as quickly as you want, but if you have questions along the way, contact us. We’ll direct your question to the most relevant expert. If there’s enough demand, we may even schedule an online lecture.\nNow, to work.\n-The Trail of Bits Team\n"},"intro/":{"url":"intro/","title":"Capture the Flag","keywords":"","body":"Capture the Flag\n\n\nWhy CTF?\nComputer security represents a challenge to education due to its interdisciplinary nature. Topics in computer security are drawn from areas ranging from theoretical aspects of computer science to applied aspects of information technology management. This makes it difficult to encapsulate the spirit of what constitutes a computer security professional.\nOne approximation for this measure has emerged: the ‘capture the flag’ competition. Attack-oriented CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft.\nA modern computer security professional should be an expert in at least one of these areas and ideally in all of them. Success in CTF competitions demands that participants be an expert in at least one and ideally all of these areas. Therefore, preparing for and competing in CTF represents a way to efficiently merge discrete disciplines in computer science into a focus on computer security.\n"},"intro/find.html":{"url":"intro/find.html","title":"Find a CTF","keywords":"","body":"Capture the Flag\nFind a CTF\nIf you ever wanted to start running, you were probably encouraged to sign up to a 5k to keep focused on a goal. The same principle applies here: pick a CTF in the near future that you want to compete in and come up with a practice schedule. Here are some CTFs that we can recommend:\n\nPicoCTF and PlaidCTF by CMU\nHSCTF is made for high school students\nCSAW CTF by NYU-Poly\nUCSB iCTF is for academics only\nDefcon CTF\n\nVisit CTF Time and the CapCTF calendar for a more complete list of CTFs occuring every week of the year.\nHow is a Wargame different?\nWargames are similar to a CTF but are always ongoing. Typically, they are organized into levels that get progressively harder as you solve more of them. Wargames are an excellent way to practice for CTF! Here are some of our favorites:\n\nMicro Corruption\nSmashTheStack\nOverTheWire\nExploit Exercises\n\nWhat about CCDC?\nThere are some defense-only competitions that disguise themselves as CTF competitions, mainly the Collegiate Cyber Defense Challenge (CCDC) and its regional variations, and our opinion is that you should avoid them. They are unrealistic exercises in frustration and will teach you little about security or anything else. They are incredibly fun to play as a Red Team though!\n"},"intro/careers.html":{"url":"intro/careers.html","title":"Find a Job","keywords":"","body":"Career Cheatsheet\n[Editor's note: this is an older article written for pentest.cryptocity.net and that we are in the process of updating.]\nThese are my views on information security careers based on the experience I've had and your mileage may vary. The information below will be most appropriate if you live in New York City, you're interested in application security, pentesting, or reversing, and you are early on in your career in information security.\n\nEmployers\nRoles\nLearn from a Book\nLearn from a Course\nUniversity\nCommunication\nMeet People\nConferences\nCertifications\nLinks\nFriends of the Guide\n\nEmployers\nAs far as I can tell, there are five major employers in the infosec industry (not counting academia).\n\nThe Government\nNon-Tech Fortune 500s (mostly finance)\nBig Tech Vendors (mostly West coast)\nBig Consulting (mostly non-technical)\nSmall Consulting (mostly awesome)\n\nThe industry you work in will determine the major problems you have to solve. For example, the emphasis in finance is to reduce risk at the lowest cost to the business (opportunities for large-scale automation). On the other hand, consulting often means selling people on the idea that X is actually a vulnerability and researching to find new ones.\nRoles\nI primarily split up infosec jobs into internal network security, product security, and consulting. I further break down these classes of jobs into the following roles:\n\nApplication Security (code audits/app assessments)\nAttacker (offensive)\nCompliance\nForensics\nIncident Handler\nManager\nNetwork Security Engineer\nPenetration Tester\nPolicy\nResearcher\nReverse Engineer\nSecurity Architect\n\nThe roles above each require a different, highly specialized body of knowledge. This website is a great resource for application security and penetration testing, but you should find other resources if you are interested in a different role.\nLearn from a Book\nFortunately, there are dozens of good books written about each topic inside information security. Dino Dai Zovi and Tom Ptacek both have excellent reading lists. We recommend looking at:\n\nGray Hat Hacking\nThe Myths of Security\nHacking: The Next Generation\nand any book from O'Reilly on a scripting language of your choice\n\nIf you're not sure what you're looking for, then you should browse the selection offered by O'Reilly. They are probably the most consistent and high-quality book publisher in this industry.\nDon't forget that reading the book alone won't give you any additional skills beyond the conversational. You need to practice or create something based on what you read to really gain value and understanding from it.\nLearn from a Course\nIf you're looking for something more hands-on and directed, there are lots of university courses about information security available online. I listed some of the best ones that have course materials available below (ordered by institution name). The RPI course is the most similar to this one and Hovav gets points for the best academic reading list, but every course on this list is fantastic.\n\n\n\nCourse\nInstructor(s)\nInstitution\n\n\n\n\nSecure Software Principles\nRPISEC\nRPI\n\n\nModern Binary Exploitation\nRPISEC\nRPI\n\n\nComputer Security\nvarious\nBerkeley\n\n\nComputer and Network Security\nDan Boneh\nStanford\n\n\nWeb Programming and Security\nDan Boneh\nStanford\n\n\nIntro to Web Application Security\nEdward Z. Yang\nMIT\n\n\nIntro to Software Exploitation\nNathan Rittenhouse\nMIT\n\n\nUNIX Security Holes\nD. J. Bernstein\nUIC\n\n\nMalware Analysis and Antivirus Technologies\nvarious\nTML\n\n\nSystem Security and Binary Code Analysis\nZhiqiang Lin\nUT Dallas\n\n\nCybersecurity Specialization\nvarious\nUMD\n\n\nGraduate Computer Security\nHovav Shacham\nUT Austin\n\n\nComputer Systems Security\nNickolai Zeldovich\nMIT\n\n\n\nUniversity\nThe easiest shortcut to finding a university with a dedicated security program is to look through the NSA Centers of Academic Excellence (NSA-COE) institution list. This certification has become watered down as more universities have obtained it and it might help to focus your search on those that have obtained the newer COE-CO certification. Remember, certifications are only a guideline. You should look into the actual programs at each university instead of basing your decision on a certification alone.\nOnce in university, take classes that force you to write code in large volumes to solve hard problems. IMHO the courses that focus on mainly theoretical or simulated problems provide limited value. Ask upper level students for recommendations if you can't identify the CS courses with programming from the CS courses done entirely on paper. The other way to frame this is to go to school for software development rather than computer science.\nCapture the Flag\nIf you want to acquire and maintain technical skills and you want to do it fast, then you should play in a CTF or jump into a wargame. The one thing to note is that many of these challenges attach themselves to conferences (of all sizes), and by playing in them you will likely miss the entire rest of the conference. Try not to over do it, since conferences are useful in their own way (see the rest of the career guide).\nThere are some defense-only competitions that disguise themselves as normal CTF competitions, mainly the Collegiate Cyber Defense Challenge (CCDC) and its regional variations, and my opinion is that you should avoid them. They are exercises in system administration and frustration and will teach you little about security or anything else. They are incredibly fun to play as a Red Team though.\nCommunication\nIn any role, the majority of your time will be spent communicating with others, primarily through email and meetings and less by phone and IM. The role/employer you have will determine whether you speak more with internal infosec teams, non-security technologists, or business users. For example, expect to communicate more with external technologists if you do network security for a financial firm.\nTips for communicating well in a large organization:\n\nLearn to write clear, concise, and professional email.\nLearn to get things done and stay organized. Do not drop the ball.\nLearn the business that your company or client is in. If you can speak in terms of the business, your arguments a) to not do things b) to fix things and c) to do things that involve time and money will be much more persuasive.\nLearn how your company or client works, ie. key individuals, processes, or other motivators that factor into what gets things done.\n\nIf you are still attending a university, as with CS courses, take humanities courses that force you to write.\nMeet People\nFind and go to your local CitySec, an informal meetup without presentations that occurs once monthly in most cities. At Trail of Bits, we attend our local NYSEC.\nISSA and ISC2 focus on policy, compliance and other issues that will be of uncertain use for a new student in this field. Similarly, InfraGard mainly focuses on non-technical law enforcement-related issues. OWASP is one of the industry's worst examples of vendor capture and is less about technology and more about sales.\nConferences\nIf you've never been to an infosec conference before, use the google calendar below to find a low-cost local one and go. There have been students of mine who think that attending a conference will be some kind of test and put off going to one for as long as possible. I promise I won't pop out of the bushes with a final exam and publish your scores afterward.\n\nInformation Security Conferences Calendar\n\nIf you go to a conference, don't obsess over attending a talk during every time slot. The talks are just bait to lure all the smart hackers to one location for a weekend: you should meet the other attendees! If a particular talk was interesting and useful then you can and should talk to the speaker. This post by Shawn Moyer at the Defcon Speaker's Corner has more on this subject.\nIf you're working somewhere and are having trouble justifying conference attendance to your company, the Infosec Leaders blog has some helpful advice.\nCertifications\nThis industry requires specialized knowledge and skills and studying for a certification exam will not help you gain them. In fact, in many cases, it can be harmful because the time you spend studying for a test will distract you from doing anything else in this guide.\nThat said, there are inexpensive and vendor-neutral certifications that you can reasonably obtain with your current level of experience to help set apart your resume, like the Network+ and Security+ or even a NOP, but I would worry about certifications the least in your job search or professional development.\nIn general, the two best reasons to get certifications are:\n\nIf you are being paid to get certified, through paid training and exams or sometimes through an automatic pay raise after you get the certification (common in the government).\nIf your company or your client is forcing you to get certified. This is usually to help with a sales pitch, ie. \"You should hire us because all of our staff are XYZ certified!\"\n\nIn general, it is far more productive to spend time playing in a CTF, then using your final standing as proof that you're capable.\nLinks\n\nReddit and Hacker News threads about this post\nSecurity Advice\n\nHow to Break Into Security, Ptacek Edition\nVRT: How to Become an Infosec Expert, Part I\nFive pieces of advice for those new to the infosec industry\nHow to Milk a Computer Science Education for Offensive Security Skills\nKill Your Idols, Shawn Moyer's reflections on his first years at Defcon\n\n\nThoughts on Certifications\n\nMy Canons of (ISC)2 Ethics\nNot a CISSP\n(ISC)2's Newest Cash Cow\nWhy You Should Not Get a CISSP\n\n\nGeneral Tech Advice\nAdvice for Computer Science College Students\nDon't call yourself a programmer, and other career advice\nThe answer to \"Will you mentor me?\" is .... no.\n\n\n\n"},"vulnerabilities/":{"url":"vulnerabilities/","title":"Vulnerability Discovery","keywords":"","body":"Vulnerability Discovery\n\n"},"vulnerabilities/source.html":{"url":"vulnerabilities/source.html","title":"Auditing Source","keywords":"","body":"Auditing Source Code\nThis module is about getting familiar with vulnerabilities that manifest in applications that compile to native code. An accurate and complete understanding of an application written in a compiled language cannot be achieved without learning about how the compiler transforms source to machine code and how processors execute that code. An easy way to gain experience with these transforms is by reverse engineering compiled variants of your own code or of projects with source code available. At the end of this module you will be able to identify vulnerabilities in compiled languages like C and C++.\nVulnerabilities are commonly identified in large software packages due to their use of third-party software libraries. Common examples include libraries like libxml, libpng, libpoppler, and libfreetype that parse complicated file formats and protocols. Each of these libraries have historically been prone to software flaws that make the applications using them vulnerable to attack. It doesn't help that most software packages fail to update these libraries when new versions come out, making it significant easier to find known vulnerabilities to apply in these cases.\nLecture\n\nSource Code Auditing I\nSource Code Auditing II\n\nWorkshop\nIn order to practice your skills, we recommend going through the process of identifying as many vulnerabilities as you can in an intentionally vulnerable toy application and then moving on to a real application and doing the same.\nThe Newspaper application is a small server written in C that allows authenticated users to read and write articles to a remote file system. Newspaper is written in such a way that it is vulnerable to many different attacks. You should be capable of identifying at least 10 bugs or potential vulnerabilities in this code.\n\nNewspaper App\nNewspaper App Installer\n\nWireshark, however, is an industry standard network protocol analyzer that has been under continuous development since 1998. Vulnerabilities in this code base are much fewer and far between than in the Newspaper app however many still exist. Take a look at the wireshark security page, find the name of a protocol dissector and see if you can independently discover the vulnerability without looking at the details. Dissectors are located in /epan/dissectors/ folder.\n\nWireshark 1.8.5\n\nTools\nWhen auditing, it is helpful to use a tool design to profile and navigate the codebase. Below are two tools, Source Navigator and Understand, designed to help analysts get familiar with code quickly by collecting and displaying information about data relationships, API usage, design patterns and control flow. An example of a useful diffing tool is also listed below. One example of a free, open source code auditing tool is the Clang Static Analyzer, which can help you track down programming errors in common APIs and vulnerable programming patterns.\n\nSource Navigator\nScitools Understand\nSourcetrail\nMeld\nClang Static Analyzer\n\nResources\nMake sure you’re intimately familiar with the internals of the languages you target for analysis. Vulnerabilities are found by auditors who are more familiar with the language and the codebase than the programmers that originally developed it. In some cases, this level of understanding can be achieved simply by paying attaching to optional compiler warnings or through the use of third-party analysis tools that help track down common programming errors. Computer security is tantamount to computer mastery. Without a rigorous understanding of your targets you can never hope to defeat them.\n\nEssential C - Programming in C primer\nTAOSSA Chapter 6: C Language Issues - Strongly recommended reading\nInteger Overflow\nWireshark Security - Examples of lots of vulnerablities\nGera's Insecure Programming by Example - Examples of small vulnerable C programs\n\n"},"vulnerabilities/binary.html":{"url":"vulnerabilities/binary.html","title":"Auditing Binaries","keywords":"","body":"Auditing Binaries\nYou’ve made it all the way down to the native layer, this is what software is after you pull off all the covers. The flavor of native code we’re going to focus on today is 32-bit Intel x86. Intel processors have been a powerful force in personal computing since the 80’s and currently predominate desktop and server market. Understanding this instruction set will give you some insight into how the programs you use every day operate as well as provide a reference point for when you encounter other instruction sets like ARM, MIPS, PowerPC and SPARC.\nThis module is about becoming familiar with the native layer and developing strategies for understanding, analyzing and interpreting native code. By the end of this module you should be capable of performing a “reverse compilation” -- going from assembly fragments to statements in higher level languages -- and, in the process, deriving meaning and programmer intent.\nLecture\nLearning x86 can appear daunting at first and requires some dedicated study to master. We recommend reading Chapter 3 of \"Computer Systems: A Programmer's Perspective\" to learn how C programs get compiled into machine code. Once you you have some basic, working knowledge of this process then keep a handy reference guide around like the x86 Assembly Guide from the University of Virginia. We've found this video series from Quinn Liu to be a quick and painless introduction too.\n\nCS:APP Chapter 3: Machine-Level Representation of Programs\nx86 Assembly Guide\nIntroduction to x86 Assembly\n\nWorkshop\nThe following programs are both “binary bombs.” Reverse engineer the following linux programs to identify the series of inputs that will “defuse” the bomb. Each successive level of the bomb focuses on a different aspect of native code. For example, in the lab from CMU you will encounter different data structures (linked lists, trees) as well as how control flow structures (switches, loops) manifest in native code. While reversing these programs you may find it useful to keep track of your progress by transforming what you see into C or another high level language.\nYou should aim to solve at least eight stages between the two labs. The CMU bomb lab has a secret phase and the RPI bomb lab has a phase that involves memory corruption, can you find and solve them?\n\nCMU Binary Bomb Lab\nRPI Binary Bomb Lab\n\nTools\nThe two essential tools for working with native code are the debugger and the disassembler. We recommend you become familiar with the industry standard disassembler: IDA Pro. IDA will divide code into discrete chunks corresponding to the functions defined in the program's source code. Each function is then further subdivided into \"basic blocks\" defined by instructions that alter control flow. This makes it easy to identify loops, conditionals, and other control flow constructs at a glance.\nDebuggers allow you to interact with and examine the state of running code by setting breakpoints and examining memory and register contents. You may find this useful as a sanity check if you are not seeing the results you expect your input to produce but be alert, some programs employ anti-debugger techniques and can modify program behavior in the presence of a debugger. The GNU Debugger (gdb) is the standard debugger for most linux systems. gdb can be acquired through the package manager in your chosen linux distribution.\n\nIDA Pro Demo\ngdb\n\nResources\nMany good resources exist for learning x86 assembly and the various tricks employed in capture the flag exercises. In addition to the resources above, the x86 Wikibook and the AMD instruction set manual are more complete reference guides you may want to refer to (we find the AMD manual can be less daunting than the corresponding manual from Intel).\n\nAMD64 Programmer's Manual: General-Purpose and System Instructions\nx86 Assembly Wikibook\nComputer Systems: A Programmer's Perspective (CS:APP)\n\nSome of the tools used for reverse engineering can be as complicated as assembly language itself. Cheatsheets that list out common commands and use cases can be helpful.\n\ngdb Quick Reference\nIDA Quick Reference\nWinDBG x86 Cheat Sheet\n\nFinally, many capture the flag challenges will make use of anti-debugging and anti-disassembly techniques to hide or obfuscate the goal. Several of these techniques are employed by the bomb labs but you may want a more complete reference.\n\nLinux anti-debugging techniques\nThe \"Ultimate\" Anti-Debugging Reference\n\n"},"web/vulnerabilities.html":{"url":"web/vulnerabilities.html","title":"Auditing Webapps","keywords":"","body":"Auditing Web Applications\nWelcome to the web hacking module. This module is about getting familiar with vulnerabilities commonly found in web applications. At the end of this module you will be able to identify common vulnerabilities in web based applications using a variety of testing methodologies and source level auditing. The lecture material will give you all the tools you need to successfully audit the workshop material.\nLecture\n\nWeb Hacking Part I\nWeb Hacking Part II\n\nWorkshop\nIn order to practice your skills, we recommend going through the process of finding and exploiting vulnerabilities in the Damn Vulnerable Web App (DVWA) and the Siberia Exploit Kit. DVWA is a collection of vulnerable test cases implemented in PHP and serves as an easy introduction to the many things that can go wrong in web applications. The Siberia Exploit Kit is a \"crimeware pack\" used by criminals to perform massive compromises. It includes a package of browser exploits and a command and control panel intended to manage compromised hosts. Siberia contains several pre- and post-authentication vulnerabilities that allow an attacker to gain administrative access to the panel, then take over the server on which it is hosted.\nDownload and run the OWASP Broken Web Apps virtual machine in VMware to start this workshop. BWA includes many web applications many for security testing, including DVWA. Once you have mastered DVWA, feel free to move on to other vulnerable web applications! Try auditing Siberia's source code to find the vulnerabilities, paying attention to sources of input in PHP.\n\nOWASP Broken Web Apps\nSiberia Crimeware Pack (pw: infected)\n\nTools\nBurp Suite is a local HTTP proxy intended for security testing. Burp Suite is made for web penetration testers and simplifies many common tasks in a point-and-click GUI. The features available in the free version are more than enough to complete this and many other web security challenges.\n\nBurp Suite\n\nResources\nMany simple testing methods and common web application flaws are available in the walkthrough. Ensure that you understand the fundementals of HTTP, HTML, and PHP to do well on this section.\n\nOWASP Top 10 Tools and Tactics\nThe Tangled Web: Chapter 3\nPHP Primer\n\n"},"exploits/":{"url":"exploits/","title":"Exploit Creation","keywords":"","body":"Exploit Creation\n\n"},"exploits/binary1.html":{"url":"exploits/binary1.html","title":"Binary Exploits 1","keywords":"","body":"Exploiting Binaries 1\nBinary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker. In this module we are going to focus on memory corruption. By abusing vulnerabilities that corrupt memory in software we can often rewrite critical application state information in a way that allows us to elevate privileges inside the context of a particular application (like a remote desktop server) or perform arbitrary computation by hijacking control flow and running code of our choosing.\nIf you're trying to find bugs in compiled C programs, it's important to know what you're looking for. Start with identifying where the data you send to the program is used. If your data is stored in a buffer, take note of the sizes of them. Programming in C without errors is very difficult and the CERT C Coding Standard catalogues many of the ways that errors can come about. Paying attention to commonly misused APIs can be a quick path to success.\nOnce a vulnerability is identified it should be used to compromise the integrity of the program, however, there are a variety of ways to achieve this goal. For programs such as web servers, obtaining the information from another user may be the end goal. In others, changing your permissions may be helpful, for example changing the permissions of a local user to the administrator.\nLecture\nThe first lecture, Memory Corruption 101, provides background and step-by-step explanation of exploiting an overflow on Windows. The second lecture, Memory Corruption 102, covers more advanced topics, including web browser exploitation. Both of these lectures use Windows-specific examples but the techniques and process are applicable across operating systems that use the x86 instruction set. Remember that the names of functions and sometimes the calling conventions will be different when you are working with UNIX/Linux binaries.\n\nMemory Corruption 101\nMemory Corruption 102\n\nTools\nWe recommend using GDB to debug the challenges in this module since all of them are compiled for 32-bit Linux, however, GDB is intended for debugging source code, not stripped binaries without symbols and debugging information. Projects such as GEF, peda, and voltron are attempts at making gdb more useful for debugging when source code is not available. We recommend making a .gdbinit file in your home directory with at least the following commands:\n set disassembly-flavor intel\n set follow-fork-mode child\nWorkshop\nIn order to run these challenges, you'll need to setup an Ubuntu 14.04 (32-bit) virtual machine. We recommend using VMware Player, since it's free and well supported. When you have it running, open a terminal and install socat with command sudo apt-get install socat.\nThere are three challenges in this workshop, each contained within this folder when you clone this repository in git. The ultimate goal of each challenge is to manipulate the executable into reading the flag to you. For each challenge, try to translate the disassembly into C code. After making an attempt, you can verify your guess by checking the actual C source provided. Then, try to exploit it to read you the flag.\nChallenge: Easy\nMake sure the flag is in the same directory as the easy program. Once you execute easy it will listen for instructions on port 12346.\nChallenge: Social\nSimilar to easy, make sure the flag and host.sh are in the same directory as social program. Once you execute social it will listen for instructions on port 12347.\nResources\n\nUsing GDB to Develop Exploits - A Basic Run Through\nExploiting Format String Vulnerabilities\nLow-level Software Security: Attacks and Defenses\n\n"},"exploits/binary2.html":{"url":"exploits/binary2.html","title":"Binary Exploits 2","keywords":"","body":"Exploiting Binaries 2\nIn this module, we continue to examine the ways that native applications can be exploited and focus on using return-oriented programming (ROP) to achieve that goal. ROP is the process of stitching together existing executable fragments of code ending in a return instruction. By creating chains of addresses of these ‘gadgets’ one can write new programs without introducing any new code.\nKeep in mind that you will need to be flexible in identifying methods to exploit programs. Sometimes it’s necessary to abuse a vulnerability multiple times in the course of an exploit. At times, you may only want to use a ROP bridge to make your shellcode executable and, at others, you may want to use a payload written entirely in ROP. Occasionally, the layout of memory makes unorthodox methods of exploitation favorable. For example, have you considered manufacturing an uncontrolled format string vulnerability using ROP?\nLecture\nThe lectures this week will discuss return oriented programming (ROP) and code reuse to bypass protections that disallow the execution of attacker-provided data. These lectures go into much greater detail on exploitation and build upon some of what was discussed last week.\n\nReturn Oriented Exploitation\nPayload already inside data re-use for ROP exploits (Linux-specific)\n\nWorkshop\nSimilar to the previous lesson, there are two executable files located in this folder when you clone the repository. Exploits for each of these programs will require the use of return-oriented programming to read the flags. This week, there is no access to source code provided. You will need to reverse engineer the binaries to discovery the vulnerabilities and the techniques required to exploit them. Use the same Ubuntu 14.04 (32-bit) virtual machine as the previous lesson.\nChallenge: brute_cookie\nRun the bc program. It will listen on port 12345.\nChallenge: space\nRun host.sh in the same directory as the space program. It will listen on port 12348.\nChallenge: rop_mixer\nRun host.sh in the same directory as the rop_mixer program. It will listen on port 12349.\nTools\nRefer to the tools from last week. If you haven't already, you should become familiar with the binutils suite for *NIX. Tools like readelf, strings, objdump, objcopy, and nm are frequently helpful. Use your package manager and the manpages to install and read about their use.\nSeveral tools exist to aid specifically in the creation of exploits that reuse code. They are more specialized than a standard disassembler because they look for executable snippets of code suitable as ROP gadgets (between instructions, in .rodata, etc).\n\nRP\nROPGadget\nBISC - Simple tool covered in the lecture\n\nResources\n\nx86-64 buffer overflow exploits and the borrowed code chunks exploitation technique\nSurgically returning to randomized lib(c)\nExtensive security reference\nDartmouth College: Useful Security and Privacy links\nCorelan Team Blog\n\n"},"web/exploits.html":{"url":"web/exploits.html","title":"Webapp Exploits","keywords":"","body":"Web Exploitation\nThis module follows up on the previous auditing web applications module. In this module we will focus on exploiting those vulnerabilities. By the end of this module you should be comfortable identifying and exploiting the OWASP Top 10.\nLecture\nWe covered the basics in the previous section on web security, so now we can dive into some more capable tools to achieve greater effects in this module. Learn to master Burp Suite and the Chrome Developer tools to gain a greater understanding of the applications you interact with. BeEF is an example of an XSS proxy and it will pay off to look through its source code and learn how it works.\n\nBurp Suite Training\nChrome Dev Tools\nFrom XSS to reverse shell with BeEF\n\nWorkshop\nYou have been tasked with auditing Gruyere, a small, cheesy web application. Gruyere is available through and hosted by Google. It includes exercises for exploiting many classes of web-specific vulnerabilities including XSS, SQL injection, CSRF, directory traversal and more. For each challenge you can find hints, exploits and methods to patch the vulnerable code.\nReferences\n\nGoogle Chrome Console\nOWASP Top 10 Tools and Tactics\nThe Tangled Web: Chapter 3\nPHP Primer\n\nTools\nSQL Map and BeEF are powerful tools and very fun to play around with but ultimately not needed for the exercise. If you insist on playing with BeEF on, then please try not to hook other users auditing the application.\n\nBurp Suite\nSQL Map\nThe Browser Exploitation Framework (BeEF)\n\n"},"forensics/":{"url":"forensics/","title":"Forensics","keywords":"","body":"Forensics\n\n\nIn a CTF context, \"Forensics\" challenges can include file format analysis, steganography, memory dump analysis, or network packet capture analysis. Any challenge to examine and process a hidden piece of information out of static data files (as opposed to executable programs or remote servers) could be considered a Forensics challenge (unless it involves cryptography, in which case it probably belongs in the Crypto category). \nForensics is a broad CTF category that does not map well to any particular job role in the security industry, although some challenges model the kinds of tasks seen in Incident Response (IR). Even in IR work, computer forensics is usually the domain of law enforcement seeking evidentiary data and attribution, rather than the commercial incident responder who may just be interested in expelling an attacker and/or restoring system integrity.\nUnlike most CTF forensics challenges, a real-world computer forensics task would hardly ever involve unraveling a scheme of cleverly encoded bytes, hidden data, mastroshka-like files-within-files, or other such brain-teaser puzzles. One would typically not bust a criminal case by carefully reassembling a corrupted PNG file, revealing a photo of a QR code that decodes to a password for a zip archive containing an NES rom that when played will output the confession. Rather, real-world forensics typically requires that a practictioner find indirect evidence of maliciousness: either the traces of an attacker on a system, or the traces of \"insider threat\" behavior. Real-world computer forensics is largely about knowing where to find incriminating clues in logs, in memory, in filesystems/registries, and associated file and filesystem metadata. Also, network (packet capture) forensics is more about metadata analysis than content analysis, as most network sessions are TLS-encrypted between endpoints now.\nThis disconnect between the somewhat artificial puzzle-game CTF \"Forensics\" and the way that forensics is actually done in the field might be why this category does not receive as much attention as the vulnerability-exploitation style challenges. It may also lack the \"black hat attacker\" appeal that draws many players to participate in CTFs. Regardless, many players enjoy the variety and novelty in CTF forensics challenges. It can also be a more beginner friendly category, in which the playing field is evened out by the fact that there are no $5,000 professional tools like IDA Pro Ultimate Edition with Hex-Rays Decompiler that would give a huge advantage to some players but not others, as is the case with executable analysis challenges.\nRequisite Skills\nFor solving forensics CTF challenges, the three most useful abilities are probably:\n\nKnowing a scripting language (e.g., Python)\nKnowing how to manipulate binary data (byte-level manipulations) in that language\nRecognizing formats, protocols, structures, and encodings\n\nThe first and second you can learn and practice outside of a CTF, but the third may only come from experience. Hopefully with this document, you can at least get a good headstart.\nAnd of course, like most CTF play, the ideal environment is a Linux system with – occasionally – Windows in a VM. MacOS is not a bad environment to substitute for Linux, if you can accept that some open-source tools may not install or compile correctly.\nManipulating Binary Data in Python\nAssuming you have already picked up some Python programming, you still may not know how to effectively work with binary data. Low-level languages like C might be more naturally suited for this task, but Python's many useful packages from the open-source community outweigh its learning curve for working with binary data.\nHere are some examples of working with binary data in Python.\nWriting or reading a file in binary mode:\nf = open('Reverseit', \"rb\")\ns = f.read()\nf.close()\nf = open('ItsReversed', \"wb\")\nf.write(s[::-1])\nf.close()\n\nThe bytearray type is a mutable sequence of bytes, and is available in both Python 2 and 3:\n>>> s = bytearray(b\"Hello World\")\n>>> for c in s: print(c)\n...\n72\n101\n108\n108\n111\n32\n87\n111\n114\n108\n100\n>>>\n\nYou can also define a bytearray from hexidecimal representation Unicode strings:\nexample2 = bytearray.fromhex(u'00 ff')\n>>> example2\nbytearray(b'\\x00\\xff')\n>>> example2[1]\n255\n\nThe bytearray type has most of the same convenient methods as a Python str or list: split(), insert(), reverse(), extend(), pop(), remove(), etc.\nReading a file into a bytearray for processing:\ndata = bytearray(open('challenge.png', 'rb').read())\n\nCommon Forensics Concepts and Tools\nWhat follows is a high-level overview of some of the common concepts in forensics CTF challenges, and some recommended tools for performing common tasks.\nFile format identification (and \"magic bytes\")\nAlmost every forensics challenge will involve a file, usually without any context that would give you a guess as to what the file is. Filetypes, as a concept for users, have historically been indicated either with filetype extensions (e.g., readme.md for MarkDown), MIME types (as on the web, with Content-Type headers), or with metadata stored in the filesystem (as with the mdls command in MacOS). In a CTF, part of the game is to identify the file ourselves, using a heuristic approach.\nThe traditional heuristic for identifying filetypes on UNIX is libmagic, which is a library for identifying so-called \"magic numbers\" or \"magic bytes,\" the unique identifying marker bytes in filetype headers. The libmagic libary is the basis for the file command.\n$ file screenshot.png \nscreenshot.png: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced\nKeep in mind that heuristics, and tools that employ them, can be easily fooled. Because it is a CTF, you may be presented with a file that has been intentionally crafted to mislead file. Also, if a file contains another file embedded somewhere inside it, the file command is only going to identify the containing filetype. In scenarios such as these you may need to examine the file content more closely.\nTrID is a more sophisticated version of file. Although it's closed-source, it's free and works across platforms. It also uses an identification heuristic, but with certainty percentages. Its advantage is its larger set of known filetypes that include a lot of proprietary and obscure formats seen in the real world.\nFile carving\nFiles-within-files is a common trope in forensics CTF challenges, and also in embedded systems' firmware where primitive or flat filesystems are common. The term for identifying a file embedded in another file and extracting it is \"file carving.\" One of the best tools for this task is the firmware analysis tool binwalk. \nscalpel, now a part of SleuthKit (discussed further under Filesystems) is another tool for file-carving, formerly known as Foremost.\nTo manually extract a sub-section of a file (from a known offset to a known offset), you can use the dd command. Many hex-editors also offer the ability to copy bytes and paste them as a new file, so you don't need to study the offsets.\nExample of file-carving with dd from an file-offset of 1335205 for a length of 40668937 bytes:\n$ dd if=./file_with_a_file_in_it.xxx of=./extracted_file.xxx bs=1 skip=1335205 count=40668937\nAlthough the above tools should suffice, in some cases you may need to programmatically extract a sub-section of a file using Python, using things like Python's re or regex modules to identify magic bytes, and the zlib module to extract zlib streams.\nInitial analysis\nAt first you may not have any leads, and need to explore the challenge file at a high-level for a clue toward what to look at next. Some of the useful commands to know are strings to search for all plain-text strings in the file, grep to search for particular strings, bgrep to search for non-text data patterns, and hexdump.\nExample of using strings to find ASCII strings, with file offsets:\n$ strings -o screenshot.png\n 12 IHDR\n 36 $iCCPICC Profile\n 88 U2EI4HB\n...\n 767787 IEND\nUnicode strings, if they are UTF-8, might show up in the search for ASCII strings. But to search for other encodings, see the documentation for the -e flag. Beware the many encoding pitfalls of strings: some caution against its use in forensics at all, but for simple tasks it still has its place.\nExample of searching for the PNG magic bytes in a PNG file:\n$ bgrep 89504e47 screenshot.png \nscreenshot.png: 00000000\nExample of using hexdump:\n$ hexdump -C screenshot.png | less\n00000000 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 |.PNG........IHDR|\n00000010 00 00 05 ca 00 00 02 88 08 06 00 00 00 40 3d c9 |.............@=.|\n00000020 a4 00 00 18 24 69 43 43 50 49 43 43 20 50 72 6f |....$iCCPICC Pro|\n00000030 66 69 6c 65 00 00 58 85 95 79 09 38 55 5d f8 ef |file..X..y.8U]..|\n00000040 da 67 9f c9 71 0c c7 41 e6 79 9e 87 0c 99 e7 39 |.g..q..A.y.....9|\n:\nThe advantage of hexdump is not that it is the best hex-editor (it's not), but that you can pipe output of other commands directly into hexdump, and/or pipe its output to grep, or format its output using format strings.\nExample of using hexdump format strings to output the first 50 bytes of a file as a series of 64-bit integers in hex:\n$ hexdump -n 50 -e '\"0x%08x \"' screenshot.png\n0x474e5089 0x0a1a0a0d 0x0d000000 0x52444849 0xca050000 0x88020000 0x00000608 0xc93d4000 0x180000a4 0x43436924 0x43434950 0x6f725020 0x00006966\nOther uses of the hexdump command.\nBinary-as-text encodings\nBinary is 1's and 0's, but often is transmitted as text. It would be wasteful to transmit actual sequences of 101010101, so the data is first encoded using one of a variety of methods. This is what is referred to as binary-to-text encoding, a popular trope in CTF challenges. When doing a strings analysis of a file as discussed above, you may uncover this binary data encoded as text strings.\nWe mentioned that to excel at forensics CTF challenges, it is important to be able to recognize encodings. Some can be identifed at a glance, such as Base64 encoded content, identifiable by its alphanumeric charset and its \"=\" padding suffix (when present). There are many Base64 encoder/decoders online, or you can use the base64 command:\n$ echo aGVsbG8gd29ybGQh | base64 -D\nhello world!\nASCII-encoded hexadecimal is also identifiable by its charset (0-9, A-F). ASCII characters themselves occupy a certain range of bytes (0x00 through 0x7f, see man ascii), so if you are examining a file and find a string like 68 65 6c 6c 6f 20 77 6f 72 6c 64 21, it's important to notice the preponderance of 0x60's here: this is ASCII. Technically, it's text (\"hello world!\") encoded as ASCII (binary) encoded as hexadecimal (text again). Confused yet? 😉\nThere are several sites that provide online encoder-decoders for a variety of encodings. For a more local converter, try the xxd command.\nExample of using xxd to do text-as-ascii-to-hex encoding:\n$ echo hello world\\! | xxd -p\n68656c6c6f20776f726c64210a\nCommon File formats\nWe've discussed the fundamental concepts and the tools for the more generic forensics tasks. Now, we'll discuss more specific categories of forensics challenges, and the recommended tools for analyzing challenges in each category.\nIt would be impossible to prepare for every possible data format, but there are some that are especially popular in CTFs. If you were prepared with tools for analyzing the following, you would be prepared for the majority of Forensics challenges:\n\nArchive files (ZIP, TGZ)\nImage file formats (JPG, GIF, BMP, PNG)\nFilesystem images (especially EXT4)\nPacket captures (PCAP, PCAPNG)\nMemory dumps\nPDF\nVideo (especially MP4) or Audio (especially WAV, MP3)\nMicrosoft's Office formats (RTF, OLE, OOXML)\n\nSome of the harder CTF challenges pride themselves on requiring players to analyze an especially obscure format for which no publicly available tools exist. You will need to learn to quickly locate documentation and tools for unfamiliar formats. Many file formats are well-described in the public documentation you can find with a web search, but having some familiarity with the file format specifications will also help, so we include links to those here.\nWhen analyzing file formats, a file-format-aware (a.k.a. templated) hex-editor like 010 Editor is invaluable. An open-source alternative has emerged called Kaitai. Additionally, a lesser-known feature of the Wireshark network protocol analyzer is its ability to analyze certain media file formats like GIF, JPG, and PNG. All of these tools, however, are made to analyze non-corrupted and well-formatted files. Many CTF challenges task you with reconstructing a file based on missing or zeroed-out format fields, etc.\nYou also ought to check out the wonderful file-formats illustrated visually by Ange Albertini.\nArchive files\nMost CTF challenges are contained in a zip, 7z, rar, tar or tgz file, but only in a forensics challenge will the archive container file be a part of the challenge itself. Usually the goal here is to extract a file from a damaged archive, or find data embedded somewhere in an unused field (a common forensics challenge). Zip is the most common in the real world, and the most common in CTFs.\nThere are a handful of command-line tools for zip files that will be useful to know about.\n\nunzip will often output helpful information on why a zip will not decompress.\nzipdetails -v will provide in-depth information on the values present in the various fields of the format.\nzipinfo lists information about the zip file's contents, without extracting it.\nzip -F input.zip --out output.zip and zip -FF input.zip --out output.zip attempt to repair a corrupted zip file.\nfcrackzip brute-force guesses a zip password (for passwords \n\nZip file format specification\nOne important security-related note about password-protected zip files is that they do not encrypt the filenames and original file sizes of the compressed files they contain, unlike password-protected RAR or 7z files.\nAnother note about zip cracking is that if you have an unencrypted/uncompressed copy of any one of the files that is compressed in the encrypted zip, you can perform a \"plaintext attack\" and crack the zip, as detailed here, and explained in this paper. The newer scheme for password-protecting zip files (with AES-256, rather than \"ZipCrypto\") does not have this weakness.\nImage file format analysis\nCTFs are supposed to be fun, and image files are good for containing hacker memes, so of course image files often appear in CTF challenges. Image file formats are complex and can be abused in many ways that make for interesting analysis puzzles involving metadata fields, lossy and lossless compression, checksums, steganography, or visual data encoding schemes.\nThe easy initial analysis step is to check an image file's metadata fields with exiftool. If an image file has been abused for a CTF, its EXIF might identify the original image dimensions, camera type, embedded thumbnail image, comments and copyright strings, GPS location coordinates, etc. There might be a gold mine of metadata, or there might be almost nothing. It's worth a look.\nExample of exiftool output, truncated:\n$ exiftool screenshot.png \nExifTool Version Number : 10.53\nFile Name : screenshot.png\nDirectory : .\nFile Size : 750 kB\nFile Modification Date/Time : 2017:06:13 22:34:05-04:00\nFile Access Date/Time : 2017:06:17 13:19:58-04:00\nFile Inode Change Date/Time : 2017:06:13 22:34:05-04:00\nFile Permissions : rw-r--r--\nFile Type : PNG\nFile Type Extension : png\nMIME Type : image/png\nImage Width : 1482\nImage Height : 648\nBit Depth : 8\nColor Type : RGB with Alpha\nCompression : Deflate/Inflate\n...\nPrimary Platform : Apple Computer Inc.\nCMM Flags : Not Embedded, Independent\nDevice Manufacturer : APPL\nDevice Model : \n...\nExif Image Width : 1482\nExif Image Height : 648\nImage Size : 1482x648\nMegapixels : 0.960\nPNG files, in particular, are popular in CTF challenges, probably for their lossless compression suitable for hiding non-visual data in the image. PNG files can be dissected in Wireshark. To verify correcteness or attempt to repair corrupted PNGs you can use pngcheck. If you need to dig into PNG a little deeper, the pngtools package might be useful.\nSteganography, the practice of concealing some amount of secret data within an unrelated data as its vessel (a.k.a. the \"cover text\"), is extraordinarily rare in the real world (made effectively obsolete by strong cryptography), but is another popular trope in CTF forensics challenges. Steganography could be implemented using any kind of data as the \"cover text,\" but media file formats are ideal because they tolerate a certain amount of unnoticeable data loss (the same characteristic that makes lossy compression schemes possible). The difficulty with steganography is that extracting the hidden message requires not only a detection that steganography has been used, but also the exact steganographic tool used to embed it. Given a challenge file, if we suspect steganography, we must do at least a little guessing to check if it's present. Stegsolve (JAR download link) is often used to apply various steganography techniques to image files in an attempt to detect and extract hidden data. You may also try zsteg.\nGimp provides the ability to alter various aspects of the visual data of an image file. CTF challenge authors have historically used altered Hue/Saturation/Luminance values or color channels to hide a secret message. Gimp is also good for confirming whether something really is an image file: for instance, when you believe you have recovered image data from a display buffer in a memory dump or elsewhere, but you lack the image file header that specifies pixel format, image height and width and so on. Open your mystery data as \"raw image data\" in Gimp and experiment with different settings.\nThe ImageMagick toolset can be incorporated into scripts and enable you to quickly identify, resize, crop, modify, convert, and otherwise manipulate image files. It can also find the visual and data difference between two seemingly identical images with its compare tool.\nIf you are writing a custom image file format parser, import the Python Image Library (PIL) aka Pillow. It enables you to extract frames from animated GIFs or even individual pixels from a JPG – it has native support for most major image file formats.\nIf working with QR codes (2D barcodes), also check out the qrtools module for Python. You can decode an image of a QR code with less than 5 lines of Python. Of course, if you just need to decode one QR code, any smartphone will do.\nFilesystems analysis\nOccasionally, a CTF forensics challenge consists of a full disk image, and the player needs to have a strategy for finding a needle (the flag) in this haystack of data. Triage, in computer forensics, refers to the ability to quickly narrow down what to look at. Without a strategy, the only option is looking at everything, which is time-prohibitive (not to mention exhausting).\nExample of mounting a CD-ROM filesystem image:\nmkdir /mnt/challenge\nmount -t iso9660 challengefile /mnt/challenge\nOnce you have mounted the filesystem, the tree command is not bad for a quick look at the directory structure to see if anything sticks out to you for further analysis.\nYou may not be looking for a file in the visible filesystem at all, but rather a hidden volume, unallocated space (disk space that is not a part of any partition), a deleted file, or a non-file filesystem structure like an http://www.nirsoft.net/utils/alternate_data_streams.html. For EXT3 and EXT4 filesystems, you can attempt to find deleted files with extundelete. For everything else, there's TestDisk: recover missing partition tables, fix corrupted ones, undelete files on FAT or NTFS, etc.\nThe Sleuth Kit and its accompanying web-based user interface, \"Autopsy,\" is a powerful open-source toolkit for filesystem analysis. It's a bit geared toward law-enforcement tasks, but can be helpful for tasks like searching for a keyword across the entire disk image, or looking at the unallocated space.\nEmbedded device filesystems are a unique category of their own. Made for fixed-function low-resource environments, they can be compressed, single-file, or read-only. Squashfs is one popular implementation of an embedded device filesystem. For images of embedded devices, you're better off analyzing them with firmware-mod-kit or binwalk.\nPacket Capture (PCAP) file analysis\nNetwork traffic is stored and captured in a PCAP file (Packet capture), with a program like tcpdump or Wireshark (both based on libpcap). A popular CTF challenge is to provide a PCAP file representing some network traffic and challenge the player to recover/reconstitute a transferred file or transmitted secret. Complicating matters, the packets of interest are usually in an ocean of unrelated traffic, so analysis triage and filtering the data is also a job for the player.\nFor initial analysis, take a high-level view of the packets with Wireshark's statistics or conversations view, or its capinfos command. Wireshark, and its command-line version tshark, both support the concept of using \"filters,\" which, if you master the syntax, can quickly reduce the scope of your analysis. There is also an online service called PacketTotal where you can submit PCAP files up to 50MB, and graphically display some timelines of connections, and SSL metadata on the secure connections. Plus it will highlight file transfers and show you any \"suspicious\" activity. If you already know what you're searching for, you can do grep-style searching through packets using ngrep.\nJust as \"file carving\" refers to the identification and extraction of files embedded within files, \"packet carving\" is a term sometimes used to describe the extraction of files from a packet capture. There are expensive commercial tools for recovering files from captured packets, but one open-source alternative is the Xplico framework. Wireshark also has an \"Export Objects\" feature to extract data from the capture (e.g., File -> Export Objects -> HTTP -> Save all). Beyond that, you can try tcpxtract, Network Miner, Foremost, or Snort.\nIf you want to write your own scripts to process PCAP files directly, the dpkt Python package for pcap manipulation is recommended. You could also interface Wireshark from your Python using Wirepy.\nIf trying to repair a damaged PCAP file, there is an online service for repairing PCAP files called PCAPfix.\nA note about PCAP vs PCAPNG: there are two versions of the PCAP file format; PCAPNG is newer and not supported by all tools. You may need to convert a file from PCAPNG to PCAP using Wireshark or another compatible tool, in order to work with it in some other tools.\nMemory dump analysis\nFor years, computer forensics was synonymous with filesystem forensics, but as attackers became more sophisticated, they started to avoid the disk. Also, a snapshot of memory often contains context and clues that are impossible to find on disk because they only exist at runtime (operational configurations, remote-exploit shellcode, passwords and encryption keys, etc). So memory snapshot / memory dump forensics has become a popular practice in incident response. In a CTF, you might find a challenge that provides a memory dump image, and tasks you with locating and extracting a secret or a file from within it.\nThe premiere open-source framework for memory dump analysis is Volatility. Volatility is a Python script for parsing memory dumps that were gathered with an external tool (or a VMware memory image gathered by pausing the VM). So, given the memory dump file and the relevant \"profile\" (the OS from which the dump was gathered), Volatility can start identifying the structures in the data: running processes, passwords, etc. It is also extensible using plugins for extracting various types of artifact.\nEthscan is made to find data in a memory dump that looks like network packets, and then extract it into a pcap file for viewing in Wireshark. There are plugins for extracting SQL databases, Chrome history, Firefox history and much more.\nPDF file analysis\nPDF is an extremely complicated document file format, with enough tricks and hiding places to write about for years. This also makes it popular for CTF forensics challenges. The NSA wrote a guide to these hiding places in 2008 titled \"Hidden Data and Metadata in Adobe PDF Files: Publication Risks and Countermeasures.\" It's no longer available at its original URL, but you can find a copy here. Ange Albertini also keeps a wiki on GitHub of PDF file format tricks.\nThe PDF format is partially plain-text, like HTML, but with many binary \"objects\" in the contents. Didier Stevens has written good introductory material about the format. The binary objects can be compressed or even encrypted data, and include content in scripting languages like JavaScript or Flash. To display the structure of a PDF, you can either browse it with a text editor, or open it with a PDF-aware file-format editor like Origami.\nqpdf is one tool that can be useful for exploring a PDF and transforming or extracting information from it. Another is a framework in Ruby called Origami.\nWhen exploring PDF content for hidden data, some of the hiding places to check include:\n\nnon-visible layers\nAdobe's metadata format \"XMP\"\nthe \"incremental generation\" feature of PDF wherein a previous version is retained but not visible to the user\nwhite text on a white background\ntext behind images\nan image behind an overlapping image\nnon-displayed comments\n\nThere are also several Python packages for working with the PDF file format, like PeepDF, that enable you to write your own parsing scripts.\nVideo and Audio file analysis\nLike image file formats, audio and video file trickery is a common theme in CTF forensics challenges not because hacking or data hiding ever happens this way in the real world, but just because audio and video is fun. As with image file formats, stegonagraphy might be used to embed a secret message in the content data, and again you should know to check the file metadata areas for clues. Your first step should be to take a look with the mediainfo tool (or exiftool) and identify the content type and look at its metadata.\nAudacity is the premiere open-source audio file and waveform-viewing tool, and CTF challenge authors love to encode text into audio waveforms, which you can see using the spectogram view (although a specialized tool called Sonic Visualiser is better for this task in particular). Audacity can also enable you to slow down, reverse, and do other manipulations that might reveal a hidden message if you suspect there is one (if you can hear garbled audio, interference, or static). Sox is another useful command-line tool for converting and manipulating audio files.\nIt's also common to check least-significant-bits (LSB) for a secret message. Most audio and video media formats use discrete (fixed-size) \"chunks\" so that they can be streamed; the LSBs of those chunks are a common place to smuggle some data without visibly affecting the file.\nOther times, a message might be encoded into the audio as DTMF tones or morse code. For these, try working with multimon-ng to decode them.\nVideo file formats are really container formats, that contain separate streams of both audio and video that are multiplexed together for playback. For analyzing and manipulating video file formats, ffmpeg is recommended. ffmpeg -i gives initial analysis of the file content. It can also de-multiplex or playback the content streams. The power of ffmpeg is exposed to Python using ffmpy.\nOffice file analysis\nMicrosoft has created dozens of office document file formats, many of which are popular for the distribution of phishing attacks and malware because of their ability to include macros (VBA scripts). Microsoft Office document forensic analysis is not too different from PDF document forensics, and just as relevant to real-world incident response.\nBroadly speaking, there are two generations of Office file format: the OLE formats (file extensions like RTF, DOC, XLS, PPT), and the \"Office Open XML\" formats (file extensions that include DOCX, XLSX, PPTX). Both formats are structured, compound file binary formats that enable Linked or Embedded content (Objects). OOXML files are actually zip file containers (see the section above on archive files), meaning that one of the easiest ways to check for hidden data is to simply unzip the document:\n$ unzip example.docx \nArchive: example.docx\n inflating: [Content_Types].xml \n inflating: _rels/.rels \n inflating: word/_rels/document.xml.rels \n inflating: word/document.xml \n inflating: word/theme/theme1.xml \n extracting: docProps/thumbnail.jpeg \n inflating: word/comments.xml \n inflating: word/settings.xml \n inflating: word/fontTable.xml \n inflating: word/styles.xml \n inflating: word/stylesWithEffects.xml \n inflating: docProps/app.xml \n inflating: docProps/core.xml \n inflating: word/webSettings.xml \n inflating: word/numbering.xml\n$ tree\n.\n├── [Content_Types].xml\n├── _rels\n├── docProps\n│ ├── app.xml\n│ ├── core.xml\n│ └── thumbnail.jpeg\n└── word\n ├── _rels\n │ └── document.xml.rels\n ├── comments.xml\n ├── document.xml\n ├── fontTable.xml\n ├── numbering.xml\n ├── settings.xml\n ├── styles.xml\n ├── stylesWithEffects.xml\n ├── theme\n │ └── theme1.xml\n └── webSettings.xml\nAs you can see, some of the structure is created by the file and folder hierarchy. The rest is specified inside the XML files. New Steganographic Techniques for the OOXML File Format, 2011 details some ideas for data hiding techniques, but CTF challenge authors will always be coming up with new ones.\nOnce again, a Python toolset exists for the examination and analysis of OLE and OOXML documents: oletools. For OOXML documents in particular, OfficeDissector is a very powerful analysis framework (and Python library). The latter includes a quick guide to its usage.\nSometimes the challenge is not to find hidden static data, but to analyze a VBA macro to determine its behavior. This is a more realistic scenario, and one that analysts in the field perform every day. The aforementioned dissector tools can indicate whether a macro is present, and probably extract it for you. A typical VBA macro in an Office document, on Windows, will download a PowerShell script to %TEMP% and attempt to execute it, in which case you now have a PowerShell script analysis task too. But malicious VBA macros are rarely complicated, since VBA is typically just used as a jumping-off platform to bootstrap code execution. In the case where you do need to understand a complicated VBA macro, or if the macro is obfuscated and has an unpacker routine, you don't need to own a license to Microsoft Office to debug this. You can use Libre Office: its interface will be familiar to anyone who has debugged a program; you can set breakpoints and create watch variables and capture values after they have been unpacked but before whatever payload behavior has executed. You can even start a macro of a specific document from a command line:\n$ soffice path/to/test.docx macro://./standard.module1.mymacro\n"},"toolkits/":{"url":"toolkits/","title":"Toolkit Creation","keywords":"","body":"Toolkit Creation\n\n"},"toolkits/prep.html":{"url":"toolkits/prep.html","title":"Toolkit Prep","keywords":"","body":"Toolkit Prep\nWelcome to the module on toolkit creation. A toolkit is a set of utilities that enable you and your team to achieve operational goals in the most efficient manner possible. Your toolkit is a force multiplier that will enable you to minimize the time you spend developing exploits during the game and maximize the return on your development time.\nA good toolkit is well rounded and easy to use. You should incorporate software that allows members of your team to communicate effectively, work collaboratively, automate common tasks and provide situational awareness of the game as it plays out.\nLecture\n\nCreating a SOC\nStealth Rootkit Development\nToolsmithing Case Study\nOrganizing and Participating in CTF\nRTFn \n\nWorkshop\nCreate three lists. Populate the first list with the functionality your ideal toolkit would provide. Populate the second list with software that can provide that functionality. Use the third list to rank in order of importance functionality that is inadequately supported by the software from list two. Begin developing software that fills in the gaps of your ideal toolkit.\nSome functionality you should not neglect:\n\nManagement of exploitation, key aggregation and submission.\nStealthy and secure payloads or persistence methods.\nSecure communication and collaboration.\nNetwork/Host situational awareness.\n\nResources\n\nMeterpreter Functionality Outline\nIDA Python Overview, IDA Python Download\nNASM Documentation\nPyershark\nCode you might find useful from the Pwnies (Python) and Ronin (Ruby)\n\n"},"tradecraft/":{"url":"tradecraft/","title":"Operational Tradecraft","keywords":"","body":"Operational Tradecraft\n\n"},"tradecraft/case_studies.html":{"url":"tradecraft/case_studies.html","title":"Case Studies","keywords":"","body":"Studies in Tradecraft\nOperational tradecraft is generally cultivated with a specific goal in mind. While playing competitive wargames you will most likely be focused on evading detection and not putting elements of your toolkit (infrastructure, exploits) at risk of inadvertent exposure.\nLecture\n\nPost-Exploitation and Operational Security\nA Brief History of CTF and Tradecraft\nOperational Use of Offensive Cyber\n\nWorkshop\nEvaluate the operational tradecraft displayed during the following campaigns. Each design decision employed in these tools and campaigns has an operational philosophy behind it.\nSome things to think about while evaluating tradecraft:\n\nWhy did the actor chose to perform/implement X action/capability?\nWere any mistakes made? Was a decision flawed or shortsighted in some way?\nWas an action/capability anomalus? Does it fit with the rest of the operational philosophy?\nWhat was the actor most interested in protecting? (ex: Tools, Identities, Employers etc.)\nWhat can be learned from each campaign from an attackers standpoint? Defenders standpoint?\n\nCampaigns\n\nAPT1\nAPT28\nStuxNet\nCareto\n\nResources\nThese are few public examples, groups, or organizations that discuss their own tradecraft. The AMA's below provide a rare glimpse into how extraordinarily talented groups operate.\n\nPlaid Parlement Of Pwning AMA\nSamurai AMA\nTradecraft Lectures 8 & 9\n\n"},"contrib.html":{"url":"contrib.html","title":"Contributing","keywords":"","body":"Contributors\nThis book was built on a lot of hard work, most of which happened elsewhere. Without permission to republish from these folks, this book would still be in development. They have our gratitude and admiration.\nSo, reader, when you’ve completed a few CTFs, and you’re ready for more, reach out to this list. They like to support ambition, and they just might know someone who needs some talent.\n\nAndrew Ruef created the initial proposal and slides\nEvan Jensen developed and refined nearly all of the lessons\nNick Anderson ran through the lessons and made numerous improvements\nAlex Sotirov delivered the ROP lecture and provided feedback\nJay Little reviewed the binary exploitation modules\nBrandon Edwards delivered the source auditing lectures and the newspaper app\nMarcin W and Gotham Digital Science delivered the web security lectures\nDino Dai Zovi delivered the introductory exploitation lectures\nMike Myers for contributing the chapter on forensics\n\nIf you're interested in taking a course like this one for credit, check out NYU Poly. They offer concentrations in cybersecurity and we collaborate with them frequently through their Hacker in Residence program.\nContributing\nIf you want to make a contribution, simply commit your new markdown to the master branch and we'll take it from there. Gitbook has a fantastic editor available to help preview your changes. We're always looking for new or refined content, so please send us your suggestions!\nGitbook Usage\nThe CTF Field Guide is built with Gitbook, a command line tool for building books with Git and Markdown. You can use Gitbook to output the CTF Field Guide as a PDF, an eBook or a single, printable HTML page. Make sure you have NodeJS and npm on your operating system, then install Gitbook and a few of its plugins:\nnpm install gitbook gitbook-plugin-ga gitbook-pdf ebook-convert -g\nWith Gitbook installed, you can run any of these commands from within the book directory:\n\nGenerate an interactive, static website: gitbook build ./myrepo\nGenerate a single page website: gitbook build ./myrepo -f page.\nGenerate a PDF: gitbook pdf ./myrepo. Requires gitbook-pdf.\nGenerate an eBook: gitbook ebook ./myrepo. Requires ebook-convert.\n\n"}}}
\ No newline at end of file
diff --git a/docs/toolkits/index.html b/docs/toolkits/index.html
index b0d7b83..a2787d1 100644
--- a/docs/toolkits/index.html
+++ b/docs/toolkits/index.html
@@ -7,7 +7,7 @@
Toolkit Creation · CTF Field Guide
-
+
@@ -443,7 +443,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Toolkit Creation","level":"1.6","depth":1,"next":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]},"previous":{"title":"Forensics","level":"1.5","depth":1,"path":"forensics/README.md","ref":"forensics/README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"toolkits/README.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Toolkit Creation","level":"1.6","depth":1,"next":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]},"previous":{"title":"Forensics","level":"1.5","depth":1,"path":"forensics/README.md","ref":"forensics/README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"toolkits/README.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/toolkits/prep.html b/docs/toolkits/prep.html
index 2e76eda..94cd122 100644
--- a/docs/toolkits/prep.html
+++ b/docs/toolkits/prep.html
@@ -7,7 +7,7 @@
Toolkit Prep · CTF Field Guide
-
+
@@ -469,7 +469,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"next":{"title":"Operational Tradecraft","level":"1.7","depth":1,"path":"tradecraft/README.md","ref":"tradecraft/README.md","articles":[{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]}]},"previous":{"title":"Toolkit Creation","level":"1.6","depth":1,"path":"toolkits/README.md","ref":"toolkits/README.md","articles":[{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"toolkits/prep.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"next":{"title":"Operational Tradecraft","level":"1.7","depth":1,"path":"tradecraft/README.md","ref":"tradecraft/README.md","articles":[{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]}]},"previous":{"title":"Toolkit Creation","level":"1.6","depth":1,"path":"toolkits/README.md","ref":"toolkits/README.md","articles":[{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"toolkits/prep.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/tradecraft/case_studies.html b/docs/tradecraft/case_studies.html
index 0c9b1a6..6947d7b 100644
--- a/docs/tradecraft/case_studies.html
+++ b/docs/tradecraft/case_studies.html
@@ -7,7 +7,7 @@
Case Studies · CTF Field Guide
-
+
@@ -473,7 +473,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Case Studies","level":"1.7.1","depth":2,"next":{"title":"Contributing","level":"1.8","depth":1,"path":"contrib.md","ref":"contrib.md","articles":[]},"previous":{"title":"Operational Tradecraft","level":"1.7","depth":1,"path":"tradecraft/README.md","ref":"tradecraft/README.md","articles":[{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"tradecraft/case_studies.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Case Studies","level":"1.7.1","depth":2,"next":{"title":"Contributing","level":"1.8","depth":1,"path":"contrib.md","ref":"contrib.md","articles":[]},"previous":{"title":"Operational Tradecraft","level":"1.7","depth":1,"path":"tradecraft/README.md","ref":"tradecraft/README.md","articles":[{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"tradecraft/case_studies.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/tradecraft/index.html b/docs/tradecraft/index.html
index c0aedf9..ceb97ef 100644
--- a/docs/tradecraft/index.html
+++ b/docs/tradecraft/index.html
@@ -7,7 +7,7 @@
Operational Tradecraft · CTF Field Guide
-
+
@@ -443,7 +443,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Operational Tradecraft","level":"1.7","depth":1,"next":{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]},"previous":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"tradecraft/README.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Operational Tradecraft","level":"1.7","depth":1,"next":{"title":"Case Studies","level":"1.7.1","depth":2,"path":"tradecraft/case_studies.md","ref":"tradecraft/case_studies.md","articles":[]},"previous":{"title":"Toolkit Prep","level":"1.6.1","depth":2,"path":"toolkits/prep.md","ref":"toolkits/prep.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"tradecraft/README.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/vulnerabilities/binary.html b/docs/vulnerabilities/binary.html
index a284540..879300b 100644
--- a/docs/vulnerabilities/binary.html
+++ b/docs/vulnerabilities/binary.html
@@ -7,7 +7,7 @@
Auditing Binaries · CTF Field Guide
-
+
@@ -483,7 +483,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"next":{"title":"Auditing Webapps","level":"1.3.3","depth":2,"path":"web/vulnerabilities.md","ref":"web/vulnerabilities.md","articles":[]},"previous":{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/binary.md","mtime":"2017-07-05T22:38:31.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"next":{"title":"Auditing Webapps","level":"1.3.3","depth":2,"path":"web/vulnerabilities.md","ref":"web/vulnerabilities.md","articles":[]},"previous":{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/binary.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/vulnerabilities/index.html b/docs/vulnerabilities/index.html
index 81ea8aa..88eef66 100644
--- a/docs/vulnerabilities/index.html
+++ b/docs/vulnerabilities/index.html
@@ -7,7 +7,7 @@
Vulnerability Discovery · CTF Field Guide
-
+
@@ -443,7 +443,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Vulnerability Discovery","level":"1.3","depth":1,"next":{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},"previous":{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/README.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Vulnerability Discovery","level":"1.3","depth":1,"next":{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},"previous":{"title":"Find a Job","level":"1.2.2","depth":2,"path":"intro/careers.md","ref":"intro/careers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/README.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/vulnerabilities/source.html b/docs/vulnerabilities/source.html
index e921100..27bc44c 100644
--- a/docs/vulnerabilities/source.html
+++ b/docs/vulnerabilities/source.html
@@ -7,7 +7,7 @@
Auditing Source · CTF Field Guide
-
+
@@ -410,8 +410,8 @@
Workshop
In order to practice your skills, we recommend going through the process of identifying as many vulnerabilities as you can in an intentionally vulnerable toy application and then moving on to a real application and doing the same.
The Newspaper application is a small server written in C that allows authenticated users to read and write articles to a remote file system. Newspaper is written in such a way that it is vulnerable to many different attacks. You should be capable of identifying at least 10 bugs or potential vulnerabilities in this code.
Wireshark, however, is an industry standard network protocol analyzer that has been under continuous development since 1998. Vulnerabilities in this code base are much fewer and far between than in the Newspaper app however many still exist. Take a look at the wireshark security page, find the name of a protocol dissector and see if you can independently discover the vulnerability without looking at the details. Dissectors are located in /epan/dissectors/ folder.
Make sure you’re intimately familiar with the internals of the languages you target for analysis. Vulnerabilities are found by auditors who are more familiar with the language and the codebase than the programmers that originally developed it. In some cases, this level of understanding can be achieved simply by paying attaching to optional compiler warnings or through the use of third-party analysis tools that help track down common programming errors. Computer security is tantamount to computer mastery. Without a rigorous understanding of your targets you can never hope to defeat them.
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Auditing Source","level":"1.3.1","depth":2,"next":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},"previous":{"title":"Vulnerability Discovery","level":"1.3","depth":1,"path":"vulnerabilities/README.md","ref":"vulnerabilities/README.md","articles":[{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},{"title":"Auditing Webapps","level":"1.3.3","depth":2,"path":"web/vulnerabilities.md","ref":"web/vulnerabilities.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/source.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Auditing Source","level":"1.3.1","depth":2,"next":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},"previous":{"title":"Vulnerability Discovery","level":"1.3","depth":1,"path":"vulnerabilities/README.md","ref":"vulnerabilities/README.md","articles":[{"title":"Auditing Source","level":"1.3.1","depth":2,"path":"vulnerabilities/source.md","ref":"vulnerabilities/source.md","articles":[]},{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},{"title":"Auditing Webapps","level":"1.3.3","depth":2,"path":"web/vulnerabilities.md","ref":"web/vulnerabilities.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"vulnerabilities/source.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/web/exploits.html b/docs/web/exploits.html
index a2ac685..1915a1c 100644
--- a/docs/web/exploits.html
+++ b/docs/web/exploits.html
@@ -7,7 +7,7 @@
Webapp Exploits · CTF Field Guide
-
+
@@ -466,7 +466,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Webapp Exploits","level":"1.4.3","depth":2,"next":{"title":"Forensics","level":"1.5","depth":1,"path":"forensics/README.md","ref":"forensics/README.md","articles":[]},"previous":{"title":"Binary Exploits 2","level":"1.4.2","depth":2,"path":"exploits/binary2.md","ref":"exploits/binary2.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"web/exploits.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Webapp Exploits","level":"1.4.3","depth":2,"next":{"title":"Forensics","level":"1.5","depth":1,"path":"forensics/README.md","ref":"forensics/README.md","articles":[]},"previous":{"title":"Binary Exploits 2","level":"1.4.2","depth":2,"path":"exploits/binary2.md","ref":"exploits/binary2.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"web/exploits.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});
diff --git a/docs/web/vulnerabilities.html b/docs/web/vulnerabilities.html
index 3970017..7dcdeb1 100644
--- a/docs/web/vulnerabilities.html
+++ b/docs/web/vulnerabilities.html
@@ -7,7 +7,7 @@
Auditing Webapps · CTF Field Guide
-
+
@@ -410,7 +410,7 @@
Workshop
Download and run the OWASP Broken Web Apps virtual machine in VMware to start this workshop. BWA includes many web applications many for security testing, including DVWA. Once you have mastered DVWA, feel free to move on to other vulnerable web applications! Try auditing Siberia's source code to find the vulnerabilities, paying attention to sources of input in PHP.
Burp Suite is a local HTTP proxy intended for security testing. Burp Suite is made for web penetration testers and simplifies many common tasks in a point-and-click GUI. The features available in the free version are more than enough to complete this and many other web security challenges.
@@ -467,7 +467,7 @@
No results matching "
var gitbook = gitbook || [];
gitbook.push(function() {
- gitbook.page.hasChanged({"page":{"title":"Auditing Webapps","level":"1.3.3","depth":2,"next":{"title":"Exploit Creation","level":"1.4","depth":1,"path":"exploits/README.md","ref":"exploits/README.md","articles":[{"title":"Binary Exploits 1","level":"1.4.1","depth":2,"path":"exploits/binary1.md","ref":"exploits/binary1.md","articles":[]},{"title":"Binary Exploits 2","level":"1.4.2","depth":2,"path":"exploits/binary2.md","ref":"exploits/binary2.md","articles":[]},{"title":"Webapp Exploits","level":"1.4.3","depth":2,"path":"web/exploits.md","ref":"web/exploits.md","articles":[]}]},"previous":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"web/vulnerabilities.md","mtime":"2017-07-05T22:35:47.000Z","type":"markdown"},"gitbook":{"version":"3.2.2","time":"2017-07-06T01:15:11.149Z"},"basePath":"..","book":{"language":""}});
+ gitbook.page.hasChanged({"page":{"title":"Auditing Webapps","level":"1.3.3","depth":2,"next":{"title":"Exploit Creation","level":"1.4","depth":1,"path":"exploits/README.md","ref":"exploits/README.md","articles":[{"title":"Binary Exploits 1","level":"1.4.1","depth":2,"path":"exploits/binary1.md","ref":"exploits/binary1.md","articles":[]},{"title":"Binary Exploits 2","level":"1.4.2","depth":2,"path":"exploits/binary2.md","ref":"exploits/binary2.md","articles":[]},{"title":"Webapp Exploits","level":"1.4.3","depth":2,"path":"web/exploits.md","ref":"web/exploits.md","articles":[]}]},"previous":{"title":"Auditing Binaries","level":"1.3.2","depth":2,"path":"vulnerabilities/binary.md","ref":"vulnerabilities/binary.md","articles":[]},"dir":"ltr"},"config":{"plugins":["ga","-mixpanel","-mathjax","fontsettings"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"ga":{"configuration":"auto","token":"UA-37017099-3"},"fontSettings":{"theme":"night","family":"sans","size":2},"fontsettings":{"family":"sans","size":2,"theme":"white"},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"Trail of Bits","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"CTF Field Guide","language":"en","gitbook":"*"},"file":{"path":"web/vulnerabilities.md","mtime":"2019-07-25T13:31:13.000Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-07-25T14:18:14.552Z"},"basePath":"..","book":{"language":""}});
});