{"name":"infosam.space","short_name":"cybersec under 5 minutes","description":"Blogging about cybersecurity, scripting, automation, etc.","start_url":"/","background_color":"#fff","theme_color":"#65D9E9","display":"minimal-ui","cacheDigest":"59dacc95a69047ae53a0ea488f9b9235","icons":[{"src":"icons/icon-48x48.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"48x48","type":"image/png"},{"src":"icons/icon-72x72.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"72x72","type":"image/png"},{"src":"icons/icon-96x96.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"96x96","type":"image/png"},{"src":"icons/icon-144x144.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"144x144","type":"image/png"},{"src":"icons/icon-192x192.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"192x192","type":"image/png"},{"src":"icons/icon-256x256.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"256x256","type":"image/png"},{"src":"icons/icon-384x384.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"384x384","type":"image/png"},{"src":"icons/icon-512x512.png?v=59dacc95a69047ae53a0ea488f9b9235","sizes":"512x512","type":"image/png"}]}