Closed gingeleski closed 5 years ago
The legacy hitlist functionality which reads in a list of URLs to attack has been broken out into a "targeting mode".
"Targeting modes" are as modular as the Conspiracy plugins. They tell Conspiracy how to acquire its targets.
The legacy hitlist functionality which reads in a list of URLs to attack has been broken out into a "targeting mode".
"Targeting modes" are as modular as the Conspiracy plugins. They tell Conspiracy how to acquire its targets.