<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://xen0vas.github.io/Exploiting-the-LFI-vulnerability-using-the-proc-self-stat-method/</loc>
<lastmod>2018-08-15T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-1-TCP_bind_shell/</loc>
<lastmod>2019-05-13T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Exploiting-Unicodes-in-Windows-Executables-A-case-study/</loc>
<lastmod>2019-05-13T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-2-Reverse_TCP_Shell/</loc>
<lastmod>2019-06-15T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-3-EggHunter/</loc>
<lastmod>2019-08-05T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-4-custom-encoding-scheme/</loc>
<lastmod>2019-09-17T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-5-analyze-shellcode/</loc>
<lastmod>2019-10-20T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-6-create-polymorphic-shellcode/</loc>
<lastmod>2019-11-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/SLAE32-Assignment-7-create-a-custom-crypter/</loc>
<lastmod>2020-04-06T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/cloudme-v1-11-2-dep-bypass-using-rop-gadgets/</loc>
<lastmod>2020-05-20T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Exploiting-Vulneserver-pt1-Reverse-engineering-GTER-with-IDA/</loc>
<lastmod>2020-09-15T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-1-Locating-the-kernelbase-address/</loc>
<lastmod>2021-07-07T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-2-Locate-the-Export-Directory-Table/</loc>
<lastmod>2021-07-20T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-3-Constructing-the-reverse-shell-connection/</loc>
<lastmod>2021-08-05T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Leveraging-the-SpEL-Injection-Vulnerability-to-get-RCE/</loc>
<lastmod>2021-11-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Android-APK-debugging-All-in-one-setup-in-VSCode-IDE/</loc>
<lastmod>2023-04-22T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/Make-a-COFFee-relax-and-bypass-AMSI/</loc>
<lastmod>2024-05-05T00:00:00+03:00</lastmod>
</url>
<url>
<loc>https://xen0vas.github.io/About/</loc>
</url>
<url>
<loc>https://xen0vas.github.io/</loc>
</url>
<url>
<loc>https://xen0vas.github.io/page2/</loc>
</url>
<url>
<loc>https://xen0vas.github.io/page3/</loc>
</url>
<url>
<loc>https://xen0vas.github.io/page4/</loc>
</url>
<url>
<loc>https://xen0vas.github.io/googled363bba5c93b61f5.html</loc>
<lastmod>2025-06-11T09:28:23+03:00</lastmod>
</url>
</urlset>
