<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.skullsecurity.org/authors/mtgarden.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/authors/ron.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/authors/symmetric.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/april-fools.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/bsidessf-2022.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/bsidessf-2023.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/bsidessf-2024.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/conferences.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/crypto.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/ctfs.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/defcon-quals-2014.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/dns.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/forensics.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/gits-2014.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/gits-2015.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/hacking.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/humour.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/lockpicking.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/malware.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/nmap.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/passwords.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/plaidctf-2013.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/plaidctf-2014.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/random.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/re.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/reviews.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/smb.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/tools.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/categories/video.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/nbtool-002-released-also-a-primer-on-netbios</loc>
<lastmod>2008-08-26T02:03:05+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/andx-and-what</loc>
<lastmod>2008-08-29T00:08:22+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/lanman-and-ntlm-not-as-complex-as-you-think</loc>
<lastmod>2008-09-01T01:46:08+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/ntlmv2-as-promised-plus-some-random-smb-stuff</loc>
<lastmod>2008-09-03T01:37:35+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/scripting-with-nmap</loc>
<lastmod>2008-09-14T21:41:06+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/what-time-is-it</loc>
<lastmod>2008-10-01T15:20:25+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/83</loc>
<lastmod>2008-10-16T03:13:41+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/matching-passwords</loc>
<lastmod>2008-10-16T03:22:15+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/calling-rpc-functions-over-smb</loc>
<lastmod>2008-10-31T03:45:19+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/ms08-068-preventing-smbrelay-attacks</loc>
<lastmod>2008-11-12T17:38:29+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/getting-hkey_performance_data</loc>
<lastmod>2008-12-16T21:41:14+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2008/how-not-to-do-captchas</loc>
<lastmod>2008-12-17T15:54:50+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/password-dictionaries</loc>
<lastmod>2009-01-05T19:09:46+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/more-password-dictionaries</loc>
<lastmod>2009-02-07T23:44:09+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/how-pwdump6-works-and-how-nmap-can-do-it</loc>
<lastmod>2009-02-09T23:39:53+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/bruteforcing-windows-tips-and-tricks</loc>
<lastmod>2009-02-20T16:27:20+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/scanning-for-conficker-with-nmap</loc>
<lastmod>2009-03-30T16:49:09+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/using-pstools-in-a-pentest</loc>
<lastmod>2009-03-31T21:01:36+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/updated-conficker-detection</loc>
<lastmod>2009-04-02T12:57:37+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/scanning-for-confickers-peer-to-peer</loc>
<lastmod>2009-04-21T21:44:11+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/nmap-485beta9-released</loc>
<lastmod>2009-05-15T19:00:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/bypassing-av-over-the-internet-with-metasploit</loc>
<lastmod>2009-05-15T19:29:48+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/webdav-scanning-with-nmap</loc>
<lastmod>2009-05-19T23:48:32+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/webdav-detection-vulnerability-checking-and-exploitation</loc>
<lastmod>2009-05-20T23:10:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/nbstatnse-a-replacement-for-nbtscan-and-others</loc>
<lastmod>2009-06-10T02:10:36+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/my-sans-gold-paper-nmap-smb-scripts</loc>
<lastmod>2009-06-23T01:29:58+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/two-locks-one-bike</loc>
<lastmod>2009-07-12T22:45:11+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/nmap-500-released-lots-of-new-features</loc>
<lastmod>2009-07-16T22:04:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/scanning-for-microsoft-ftp-with-nmap</loc>
<lastmod>2009-09-02T16:51:09+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/random-picture-traffic-control-box</loc>
<lastmod>2009-09-04T14:14:57+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/scorched-earth-finding-vulnerable-smbv2-systems-with-nmap</loc>
<lastmod>2009-09-14T15:44:07+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/zombie-web-servers-are-you-one</loc>
<lastmod>2009-09-16T14:37:05+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/updated-scanning-for-microsoft-ftp-with-nmap</loc>
<lastmod>2009-09-17T19:30:06+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/toorcon-coming-up</loc>
<lastmod>2009-10-09T14:15:23+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/nmap-script-enumerating-iscsi-devices</loc>
<lastmod>2009-10-11T01:18:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/toorcon-slides</loc>
<lastmod>2009-10-28T03:01:45+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/pwning-hotel-guests</loc>
<lastmod>2009-11-20T03:22:27+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/smb-psexec-nse-owning-windows-fast-part-1</loc>
<lastmod>2009-12-14T17:38:09+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2009/smb-psexec-nse-owning-windows-fast-part-2</loc>
<lastmod>2009-12-21T21:40:55+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/whos-going-to-shmoocon</loc>
<lastmod>2010-01-18T20:53:12+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/smb-psexec-nse-owning-windows-fast-part-3</loc>
<lastmod>2010-01-19T20:23:11+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/why-settle-for-stealing-one-password</loc>
<lastmod>2010-02-02T15:19:12+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/how-to-install-an-nmap-script</loc>
<lastmod>2010-02-10T19:18:33+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/how-to-install-an-nmap-script-2</loc>
<lastmod>2010-02-11T00:05:31+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/watch-out-for-evil-smb-servers-ms10-006</loc>
<lastmod>2010-02-14T21:04:14+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/site-changes</loc>
<lastmod>2010-02-16T20:34:01+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/dns-backdoors-with-dnscat</loc>
<lastmod>2010-02-23T15:38:34+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/how-big-is-the-ideal-dick-tionary</loc>
<lastmod>2010-03-04T22:14:39+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/hard-evidence-that-people-suck-at-passwords</loc>
<lastmod>2010-03-06T22:26:07+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/using-nmap-to-detect-the-arucer-ie-energizer-trojan</loc>
<lastmod>2010-03-08T18:43:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/trusting-the-browser-a-ckeditor-short-story</loc>
<lastmod>2010-03-09T15:38:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/the-ultimate-faceoff-between-password-lists</loc>
<lastmod>2010-03-11T15:51:24+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/robots-txt-important-if-youre-hosting-passwords</loc>
<lastmod>2010-03-16T15:53:08+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/weaponizing-dnscat-with-shellcode-and-metasploit</loc>
<lastmod>2010-03-18T13:50:52+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/are-you-a-real-hacker-or-just-a-skiddie</loc>
<lastmod>2010-03-23T15:24:46+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/taking-apart-the-energizer-trojan-part-1-setup</loc>
<lastmod>2010-03-25T14:13:24+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/taking-apart-the-energizer-trojan-part-2-runtime-analysis</loc>
<lastmod>2010-03-25T14:17:58+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/taking-apart-the-energizer-trojan-part-3-disassembling</loc>
<lastmod>2010-03-25T14:45:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/taking-apart-the-energizer-trojan-part-4-writing-a-probe</loc>
<lastmod>2010-03-25T15:04:25+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/comments-should-work-again</loc>
<lastmod>2010-03-29T02:32:27+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/nmap-script-to-generate-custom-license-plates</loc>
<lastmod>2010-04-01T13:47:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/exotic-xss-the-html-image-tag</loc>
<lastmod>2010-04-06T18:45:54+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/find-the-windows-version-offline</loc>
<lastmod>2010-04-08T14:08:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/stuffing-javascript-into-dns-names</loc>
<lastmod>2010-04-20T15:36:54+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/confidential-information-in-the-cloud</loc>
<lastmod>2010-05-05T14:43:16+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/metasploit-express-beta-first-look</loc>
<lastmod>2010-05-11T14:15:02+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/defeating-expensive-lockdowns-with-cheap-shellscripts</loc>
<lastmod>2010-05-18T15:43:33+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/five-relays-and-a-patch</loc>
<lastmod>2010-05-26T13:57:34+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/call-for-testers-nbtool-0-05-and-dnscat-0-05</loc>
<lastmod>2010-07-07T14:17:34+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/information-security-for-college-students</loc>
<lastmod>2010-07-14T16:44:39+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/return-of-the-facebook-snatchers</loc>
<lastmod>2010-07-27T02:44:32+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/followup-to-my-facebook-research</loc>
<lastmod>2010-08-12T14:52:24+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/finding-mapped-drives-with-meterpreter</loc>
<lastmod>2010-09-01T14:16:20+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/update-on-my-life-conferences-career-etc</loc>
<lastmod>2010-10-29T13:58:56+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/a-call-to-arms-web-app-fingerprints-needed</loc>
<lastmod>2010-11-03T13:01:31+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/faking-demos-for-fun-and-profit</loc>
<lastmod>2010-11-28T00:03:38+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2010/watch-out-for-exim</loc>
<lastmod>2010-12-15T14:24:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/ethics-of-password-crackingdissemination</loc>
<lastmod>2011-01-24T14:03:26+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/hacking-crappy-password-resets-part-1</loc>
<lastmod>2011-03-09T14:14:05+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/hacking-crappy-password-resets-part-2</loc>
<lastmod>2011-03-15T13:09:41+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/mostly-good-password-resets</loc>
<lastmod>2011-03-24T13:08:16+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/locks-that-can-re-key-themselves</loc>
<lastmod>2011-04-20T13:56:55+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/a-deeper-look-at-ms11-058</loc>
<lastmod>2011-08-23T14:10:46+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2011/remote-control-manager-fail</loc>
<lastmod>2011-12-19T15:40:59+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2012/battle-net-authentication-misconceptions</loc>
<lastmod>2012-05-24T21:22:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2012/using-git-clone-to-get-pwn3d</loc>
<lastmod>2012-08-07T13:40:42+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks</loc>
<lastmod>2012-09-25T14:03:46+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2012/current-and-future-challenges-of-the-hackerspace-i-founded</loc>
<lastmod>2012-11-05T18:30:48+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2013/padding-oracle-attacks-in-depth</loc>
<lastmod>2013-01-02T16:59:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2013/a-padding-oracle-example</loc>
<lastmod>2013-01-07T15:40:52+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2013/epic-cnot-writeup-plaidctf</loc>
<lastmod>2013-04-25T13:35:22+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2013/ropasaurusrex-a-primer-on-return-oriented-programming</loc>
<lastmod>2013-05-02T14:25:02+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2013/bsides-winnipeg-wrap-up</loc>
<lastmod>2013-12-10T20:33:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/in-depth-malware-unpacking-the-lcmw-trojan</loc>
<lastmod>2014-01-02T17:20:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100</loc>
<lastmod>2014-01-24T17:04:20+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/ghost-in-the-shellcode-gitsmsg-pwnage-299</loc>
<lastmod>2014-01-27T15:57:31+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/ghost-in-the-shellcode-fuzzy-pwnage-301</loc>
<lastmod>2014-04-07T14:39:42+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-web-150-mtpox-hash-extension-attack</loc>
<lastmod>2014-04-14T02:34:50+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-writeup-for-web-200-kpop-bad-deserialization</loc>
<lastmod>2014-04-14T03:57:39+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-writeup-for-web-300-whatscat-sql-injection-via-dns</loc>
<lastmod>2014-04-16T17:29:31+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-writeup-for-pwnage-200-a-simple-overflow-bug</loc>
<lastmod>2014-04-16T19:26:34+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-writeup-for-web-100-blind-sql-injection</loc>
<lastmod>2014-04-17T17:55:06+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/plaidctf-writeup-for-pwn-275-kappa-type-confusion-vuln</loc>
<lastmod>2014-04-18T21:27:59+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/defcon-quals-writeup-for-shitsco-use-after-free-vuln</loc>
<lastmod>2014-05-21T16:33:27+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/defcon-quals-writeup-for-byhd-reversing-a-huffman-tree</loc>
<lastmod>2014-05-21T16:51:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/opening-the-mysterious-hatch-of-mystery</loc>
<lastmod>2014-06-17T18:46:21+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2014/call-for-help-researching-the-recent-gmail-password-leak</loc>
<lastmod>2014-09-12T15:51:28+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/gits-2015-knockers-py-hash-extension-vulnerability</loc>
<lastmod>2015-01-21T22:36:11+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/gits-2015-aart-php-race-condition</loc>
<lastmod>2015-01-22T00:08:55+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/gits-2015-giggles-off-by-one-virtual-machine</loc>
<lastmod>2015-01-28T16:49:59+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/gits-2015-huffy-huffman-encoded-shellcode</loc>
<lastmod>2015-02-04T18:58:12+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/dnscat2-beta-release</loc>
<lastmod>2015-03-26T14:26:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/defcon-quals-r0pbaby-simple-64-bit-rop</loc>
<lastmod>2015-05-20T16:34:06+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/defcon-quals-access-control-simple-reverse-engineer</loc>
<lastmod>2015-05-21T17:30:15+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/defcon-quals-babyecho-format-string-vulns-in-gory-detail</loc>
<lastmod>2015-05-22T18:38:21+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/defcon-quals-wwtw-a-series-of-vulns</loc>
<lastmod>2015-06-09T17:30:04+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/how-i-nearly-almost-saved-the-internet-starring-afl-fuzz-and-dnsmasq</loc>
<lastmod>2015-07-15T15:41:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/if-youre-a-pentester-you-should-love-dns</loc>
<lastmod>2015-08-17T17:34:25+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/dnscat2-now-with-crypto</loc>
<lastmod>2015-11-17T16:43:47+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/sans-hackfest-writeup-hackers-of-gravity</loc>
<lastmod>2015-12-22T17:07:12+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2015/dnscat2-0-05-with-tunnels</loc>
<lastmod>2015-12-24T17:36:18+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2016/going-the-other-way-with-padding-oracles-encrypting-arbitrary-data</loc>
<lastmod>2016-12-19T17:51:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2017/bsidessf-ctf-wrap-up</loc>
<lastmod>2017-02-22T18:04:15+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2017/book-review-the-car-hackers-handbook</loc>
<lastmod>2017-06-12T15:12:32+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2017/solving-b-64-b-tuff-writing-base64-and-alphanumeric-shellcode</loc>
<lastmod>2017-06-13T15:33:13+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2018/technical-rundown-of-webexec</loc>
<lastmod>2018-10-24T16:18:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2019/bsidessf-ctf-author-writeup-genius</loc>
<lastmod>2019-03-11T16:17:10+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2019/some-crypto-challenges-author-writeup-from-bsidessf-ctf</loc>
<lastmod>2019-03-12T16:23:36+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2019/in-bsidessf-ctf-calc-exe-exploits-you-author-writeup-of-launchcode</loc>
<lastmod>2019-03-15T17:13:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2019/how-do-i-start-picking-locks</loc>
<lastmod>2019-12-16T17:27:33+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2020/bsidessf-ctf-difficult-reverse-engineering-challenge-gman</loc>
<lastmod>2020-02-26T17:46:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2020/bsidessf-ctf-easy-to-hard-rust-reversing-challenges</loc>
<lastmod>2020-02-26T18:01:25+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2020/bsidessf-ctf-hard-reversing-challenge-chameleon</loc>
<lastmod>2020-02-26T18:11:20+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2020/bsidessf-ctf-choose-your-own-keyventure-rsa-debugger-challenge</loc>
<lastmod>2020-03-02T18:40:36+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-shellcode-primer-runme-runme2-and-runme3</loc>
<lastmod>2021-03-14T18:48:21+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-reverseme-and-reverseme2-simpler-reverse-engineering-challenges</loc>
<lastmod>2021-03-15T16:40:00+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-hangman-battle-royale-where-you-defeat-1023-ai-players</loc>
<lastmod>2021-03-16T16:32:50+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-secure-asset-manager-a-reversing-challenge-similar-to-battle-net-bot-dev</loc>
<lastmod>2021-03-17T15:59:18+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-glitter-printer-a-buffer-underflow-where-you-modify-the-actual-code</loc>
<lastmod>2021-03-18T17:07:36+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2021/bsidessf-ctf-2021-author-writeup-log-em-all-a-pokemon-style-collection-game-video</loc>
<lastmod>2021-03-29T15:39:10+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2022/bsidessf-2022-writeups-tutorial-challenges-shurdles-loadit-polyglot-nft</loc>
<lastmod>2022-06-17T20:19:14+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2022/bsidessf-2022-writeups-apache-challenges-mod_ctfauth-refresh</loc>
<lastmod>2022-06-17T20:19:18+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2022/bsidessf-2022-writeups-game-y-challenges-turtle-guessme</loc>
<lastmod>2022-06-17T20:19:21+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2022/bsidessf-2022-writeups-miscellaneous-challenges-loca-reallyprettymundane</loc>
<lastmod>2022-06-17T20:19:23+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/gdb-tricks--tricking-the-application-into-generating-test-data</loc>
<lastmod>2023-01-10T18:02:16+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/blast-from-the-past--how-attackers-compromised-zimbra-with-a-patched-vulnerability</loc>
<lastmod>2023-01-23T20:14:17+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--flat-white--simpler-java-reversing-</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--get-out--difficult-reverse-engineering---exploitation-</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--id-me--easy-file-identification-challenge-</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--overflow--simple-stack-overflow-challenge-</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--rop-petting-zoo--educational-challenge--</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/bsidessf-2023-writeups--too-latte--medium-difficulty-java-exploitation-</loc>
<lastmod>2023-04-24T00:08:44+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/reverse-engineering-tricks-identifying-opaque-network-protocols</loc>
<lastmod>2023-05-02T22:37:26+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/fork-off-three-ways-to-deal-with-forking-processes</loc>
<lastmod>2023-05-12T20:45:30+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2023/how-to-reversing-and-debugging-isapi-modules</loc>
<lastmod>2023-06-27T16:14:05+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/bsidessf-2024-writeups-can-t-give-in-cgi-exploitation-</loc>
<lastmod>2024-05-05T19:59:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/bsidessf-2024-writeups-no-tools-a-puzzling-bash-challenge-</loc>
<lastmod>2024-05-05T19:59:48+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/bsidessf-2024-writeups-safer-streets-web-reversing-</loc>
<lastmod>2024-05-05T19:59:54+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/bsidessf-2024-writeups-slay-the-spider-a-hard-heap-overflow-</loc>
<lastmod>2024-05-05T19:59:56+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/bsidessf-2024-writeups-turing-complete-reversing-exploitation-</loc>
<lastmod>2024-05-05T19:59:58+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2024/goto-zero-a-fake-ctf-challenge-to-show-off-something</loc>
<lastmod>2024-12-10T20:36:11+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2025/bsidessf-2025-bug-me-hard-reversing-challenge-</loc>
<lastmod>2025-04-27T22:59:05+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2025/bsidessf-2025-accan-and-drago-daction-pwn-your-own-memory</loc>
<lastmod>2025-04-27T22:59:10+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2025/bsidessf-2025-101-challenges</loc>
<lastmod>2025-04-27T22:59:15+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2025/bsidessf-2025-miscellaneous-challenges</loc>
<lastmod>2025-04-27T22:59:18+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2026/bsidessf-2026-miscellaneous-challenges-if-it-leads-gitfab-jengacrypt-</loc>
<lastmod>2026-03-30T20:55:38+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2026/bsidessf-2026-nameme-a-dns-based-pwn-challenge</loc>
<lastmod>2026-03-30T20:55:43+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2026/bsidessf-2026-read-write-call-me-progressive-pwn-challenges</loc>
<lastmod>2026-03-30T20:55:46+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/2026/bsidessf-2026-rugdoctor-a-broken-jit-compiler-pwn-challenge</loc>
<lastmod>2026-03-30T20:55:49+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/widgets/categories.html</loc>
<lastmod>2026-03-30T21:02:03+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/16-bit_Assembly</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/About</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Adventure_1,_Session_1</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Adventure_1,_Session_2</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Adventure_1,_Session_3</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Andrew&apos;s_thoughts</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Arkham</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Asparagus_with_Almond_Mushroom_Sauce</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Assembly</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Assembly_Examples</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Assembly_Guide</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Assembly_Summary</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Banana_Bread</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/BerserkerDice</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Birthdays</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Borscht</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/BrokenSHA1</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Brute</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/CBinaryBot</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/CIFSTest</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/CattleChat</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Character_Creation</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Chess</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Cinnamon_Buns</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/ColorText</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Config_Files</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Contest</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Cooking</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Cracking_a_Game</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Cream_of_Soup</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Crypto_and_Hashing</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D&amp;D_Session_3</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D&amp;D_Session_4</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D&amp;D_Session_5</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D&amp;D_Session_6</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D&amp;D_Session_7</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/D2Plugin</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/DQVIII_Item_Generator</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/DSRelay</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Dnscat</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Dnslogger</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Dnstest</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Dnsxss</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Easy_Mushroom_Lasagna</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Eggless_Benedict</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_1</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_10</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_2</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_2b</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_3</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_4</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_5</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_6</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_7</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_7_Final</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_7_Step_1</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_7_Step_1b</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_8</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Example_9</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/FakeBattlenet</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Filtertest</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/FirefoxSavedPasswords</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/FuelPricing</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Functions</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Fundamentals</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Fuzzer</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/GaimPlugins</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Google_Commands</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Gravy_Ideas</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Gtk</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Guides</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Guitar</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/HLKeyChanger</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Hacking</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/House_Rules</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Injector</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/IntFromByteArray</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Key_Generation_in_C</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Key_Generation_in_Java</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/List_of_Occupations</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Lockdown</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Lottery</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/MP3_Fixer</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Mac_OS_X_Commands</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Machine_Code</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Main_Page</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Marinated_Portabello_Mushrooms</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Match</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Memory_Searching</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/MessageSpoofer</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Miscellaneous_useful_&apos;nippits</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Muhammara</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Munchkin_Quiz</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Mushroom_Consomm%C3%A9</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Mushroom_Onion_Cream_Stew</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Mushroom_Onion_Gravy</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/My_Projects</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/My_notes</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Naming_Conventions</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Nbquery</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Nbsniff</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Nbtool</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/New_Character_Questions</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Onion_Dip</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/OperationStasis</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Ospap</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Ospap2</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/PDDB</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Pad_Thai</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Pandemic</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Passwords</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Privacy_policy</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Pumpkin_Pie</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Pumpkin_Pie_with_Whipped_Topping</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/RPGs</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/References_(Hacking)</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Registers</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Rp</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SANS_560_Notes</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SCBSNickSpoofer</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SHA1_in_C</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SHA1_in_Java</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SMB_Relay</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SRP</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SRP_Implementation</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Select</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Shadowrun_Character_Assistant</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Simple_Instructions</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Simplepoll</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Skill_List</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/SkullSpace</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Stack_Example</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Starcraft_Warden</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Startup_Scripts</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Sweet_&amp;_Sour_Sauce</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tablature</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tagliatelle_with_Artichokes,_Red_Onions_and_Thyme</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Templates</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Thai_Peanut_Sauce</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/The_Stack</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tnt-treasure</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tomato_Wine_Sauce</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tools</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Tools_(Hacking)</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Travelling_Salesman</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/UNickSpoofer</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Banana_Bread</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Breading</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Breakfast_Tacos</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Chocolate_Milk</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Grilled_Portabellos</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Hot_Wingz</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegan_Stadium_Chili</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vegetable_Stew</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Vl</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/War2Decode</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/War3Decode</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Warden_Modules</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Warden_Packets</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Windows_Commands</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/Winsock_Packet_Sender</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki/ZombieMeter</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/about</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/authors.html</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/categories.html</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/cv</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/posts.html</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/wiki</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page2/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page3/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page4/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page5/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page6/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page7/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page8/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/page9/</loc>
</url>
<url>
<loc>https://www.skullsecurity.org/blogdata/Linux%20Syscall%20Reference.pdf</loc>
<lastmod>2026-03-30T21:02:01+00:00</lastmod>
</url>
<url>
<loc>https://www.skullsecurity.org/wp-content/uploads/wpforms/cache/</loc>
<lastmod>2026-03-30T21:02:01+00:00</lastmod>
</url>
</urlset>
