{"name":"HackOps v1.0 Beta","short_name":"HackOps Beta","start_url":"/","display":"standalone","background_color":"#050505","lang":"en","scope":"/","description":"Plataforma de Ciberinteligencia y Operaciones Tácticas.","theme_color":"#00FF7F","orientation":"portrait","id":"/","categories":["productivity","security","education"],"icons":[{"src":"https://lucide.dev/icons/shield-alert.svg","sizes":"192x192","type":"image/svg+xml","purpose":"any maskable"},{"src":"https://lucide.dev/icons/shield-alert.svg","sizes":"512x512","type":"image/svg+xml","purpose":"any maskable"}],"shortcuts":[{"name":"Auto Pentest","short_name":"Pentest","description":"Iniciar escaneo de vulnerabilidades","url":"/pentest","icons":[{"src":"https://lucide.dev/icons/zap.svg","sizes":"192x192"}]},{"name":"Voice Ops","short_name":"Ares Voice","description":"Comandos de voz tácticos","url":"/live","icons":[{"src":"https://lucide.dev/icons/mic.svg","sizes":"192x192"}]}],"screenshots":[{"src":"https://images.unsplash.com/photo-1550751827-4bd374c3f58b?q=80&w=1200&auto=format&fit=crop","sizes":"1200x630","type":"image/jpeg","form_factor":"wide","label":"Dashboard Táctico"},{"src":"https://images.unsplash.com/photo-1526374965328-7f61d4dc18c5?q=80&w=1080&auto=format&fit=crop","sizes":"1080x1920","type":"image/jpeg","form_factor":"narrow","label":"Operaciones Móviles"}]}