- Introduced a comprehensive new lab on dynamic and static analysis of malware, covering fundamental techniques for analyzing binary executables and reverse engineering.
- Included detailed sections on static and dynamic analysis methods, safe analysis environments, and practical exercises with Capture The Flag (CTF) challenges.
- Added multiple images to enhance understanding of key concepts, including ASCII representation, ELF file structure, and hex dumps.
- Refactored the lab listing to group labs by unique categories and sort them alphabetically for better organization.
- Added a new CTF challenge titled "Feeling Blu Challenge - Web Security CTF" with comprehensive instructions and resources for penetration testing and privilege escalation.
- Updated the lab layout to include tags for better categorization and improved user navigation.
- Introduced multiple new images to support the new lab content, enhancing visual learning and engagement.
- Introduced a new local configuration file (_config_local.yml) for local development.
- Updated Gemfile to include 'webrick' for Ruby 3.0+ compatibility and removed specific version constraints for 'github-pages'.
- Created a new Gemfile.local for local development with updated dependencies.
- Added multiple new lab sheets covering topics such as scanning, exploitation, and vulnerability analysis, enhancing the educational content.
- Improved lab layout and content presentation, including enhanced syntax highlighting and image handling.
- Added various images to support the new lab content and improve visual learning.
- Updated author display in lab metadata to handle multiple authors correctly.
- Added detailed command formatting instructions in the example highlighting guide, emphasizing the use of markdown code blocks and escaping pipe characters.
- Improved consistency in lab instructions by standardizing headings and formatting for clarity.
- Introduced a new lab on software vulnerabilities, exploits, and remote access payloads, providing a comprehensive overview of the topic.
- Modified permalink structure in the configuration to include category in lab URLs.
- Added author and license metadata to lab sheets for better attribution and clarity.
- Introduced a comprehensive highlighting guide for AI assistants to standardize lab sheet formatting.
- Enhanced JavaScript functionality to support multiple highlight types and improved table of contents generation.
- Updated styles for various highlight types to improve visual distinction in lab content.
- Added a new logo for branding consistency across the site.
- Added a new Action Items Guide to provide styling classes for highlighting important sections in lab sheets.
- Introduced an INSTALL.md file detailing Jekyll installation and testing procedures.
- Implemented action item and warning item styles in the main stylesheet for better visual distinction.
- Updated lab content to utilize new action item classes for clarity and emphasis on critical instructions.
- Enhanced JavaScript functionality to process custom highlight syntax in lab content.
- Replaced Google Fonts with Do Hyeon for headings and Source Code Pro for code, while using Helvetica Neue for body text.
- Adjusted font-family settings in the main stylesheet for improved consistency.
- Added additional styling for challenge links and brand elements to enhance visual appeal.
- Changed the default theme from light to dark mode in the theme toggle functionality.
- Updated the setup documentation to reflect the new default theme.
- Added Google Fonts integration for improved typography in the Hacktivity theme.
- Enhanced the lab layout with a theme toggle button for user convenience.
- Introduced a theme toggle button in the index page for switching between light and dark modes.
- Added a new stylesheet for the Hacktivity theme with CSS variables for theming.
- Updated existing styles in lab and default layouts to utilize CSS variables for consistent theming.
- Enhanced accessibility and visual appeal with improved color contrasts and hover effects.