def get_content(): """ Returns structured content for client-side exploitation techniques. """ return [ { "title": "Common Client-Side Attack Vectors", "content": """ - Web browsers, browser extensions. - Document and image rendering applications. """ }, { "title": "Common File Format Attacks", "content": """ - Exploits weaknesses in how applications handle file requests. - Examples: PDF, DOC(X), RTF, WMF. """ }, { "title": "Malvertising", "content": """ - Injecting malicious code into trusted websites. """ }, { "title": "Phishing", "content": """ - Goals: Click a link, open an attachment. - Vectors: Emails with malicious attachments (e.g., PDF, DOC(X), WMF). """ } ]