<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://h4ck3r5.code.blog/2020/11/13/tfsec-security-scanner-for-your-terraform-code/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/da6fe-tfsec_9_scanningalert.png</image:loc><image:title>tfsec_9_scanningalert</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/fa653-tfsec_8_codescanning.png</image:loc><image:title>tfsec_8_codescanning</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/0126e-tfsec_7_screenshot.png</image:loc><image:title>tfsec_7_screenshot</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/60a60-tfsec_1_tfsec.png</image:loc><image:title>tfsec_1_tfsec</image:title></image:image><lastmod>2020-11-13T21:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/platypus-attack-novel-power-side-channel-attack-threatening-intel-devices/</loc><lastmod>2020-11-13T15:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/google-address-two-more-chrome-zero-day-vulnerabilities/</loc><lastmod>2020-11-13T15:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/scripthunter-tool-to-find-javascript-files-on-websites/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/2c7f0-scripthunter_2_telegram.png</image:loc><image:title>scripthunter_2_telegram</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/7151f-scripthunter_1_logo.png</image:loc><image:title>scripthunter_1_logo</image:title></image:image><lastmod>2020-11-13T12:16:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/live-webinar-reducing-complexity-by-increasing-consolidation-for-smes/</loc><lastmod>2020-11-13T09:10:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/sad-dns-new-flaws-re-enable-dns-cache-poisoning-attacks/</loc><lastmod>2020-11-13T08:10:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/how-to-hack-computers-over-wi-fi-with-the-wifi-duck-payload-deliverer/</loc><lastmod>2020-11-13T02:12:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/13/add-matlab-to-your-programming-toolkit-with-this-bundle/</loc><lastmod>2020-11-13T02:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/hat-trick-for-google-as-it-patches-two-more-zero-days-in-chrome/</loc><lastmod>2020-11-12T22:26:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/fama-forensic-analysis-for-mobile-apps/</loc><lastmod>2020-11-12T21:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/surviving-college-distance-learning-during-the-pandemic-a-cybersecurity-guide/</loc><lastmod>2020-11-12T17:26:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/evading-filters-to-perform-the-arbitrary-url-redirection-attack/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9fe1b-1ln6w9w8n_7se797roywdcw.png</image:loc><image:title>1*ln6w9W8N_7sE797rOyWDCw</image:title></image:image><lastmod>2020-11-12T15:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/microsoft-november-patch-tuesday-comes-with-much-awaited-zero-day-fix/</loc><lastmod>2020-11-12T15:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/finding-and-exploiting-s3-amazon-buckets/</loc><lastmod>2020-11-12T14:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/uncovered-apt-hackers-for-hire-target-financial-entertainment-firms/</loc><lastmod>2020-11-12T13:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/identifying-vulnerabilities-in-ssl-tls-and-attacking-them/</loc><lastmod>2020-11-12T12:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/leonidas-automated-attack-simulation-in-the-cloud-complete-with-detection-use-cases/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/3c19a-leonidas_1_architecture.png</image:loc><image:title>leonidas_1_architecture</image:title></image:image><lastmod>2020-11-12T12:12:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/new-modpipe-point-of-sale-pos-malware-targeting-restaurants-hotels/</loc><lastmod>2020-11-12T11:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/missions-the-next-level-of-interactive-developer-security-training/</loc><lastmod>2020-11-12T11:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/10-websites-to-play-real-money-games-on/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/afc20-websites-to-play-real-money-games-on.jpg</image:loc><image:title>websites-to-play-real-money-games-on</image:title></image:image><lastmod>2020-11-12T09:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/11-ways-to-speed-%e2%80%8b%e2%80%8bup-your-wordpress-website/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/bc321-best-ways-to-speed-up-wordpress-site.jpg</image:loc><image:title>best-ways-to-speed-up-wordpress-site</image:title></image:image><lastmod>2020-11-12T08:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/free-recover-data-from-format-pen-drive-or-hard-disk-using-foremost/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/3f3e1-1_k0t1jfwhjxxieadmxl_1ua.jpeg</image:loc><image:title>1_K0t1jfwhJxxIeAdMxl_1UA</image:title></image:image><lastmod>2020-11-12T07:20:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/12/two-new-chrome-0-days-under-active-attacks-update-your-browser/</loc><lastmod>2020-11-12T04:09:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/regretlocker-new-ransomware-can-encrypt-windows-virtual-hard-disks/</loc><lastmod>2020-11-11T21:44:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/octopus-waf-web-application-firewall-made-in-c-language-and-use-libevent/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d95b3-octopuswaf_1_octopuswaf2.png</image:loc><image:title>OctopusWAF_1_octopuswaf2</image:title></image:image><lastmod>2020-11-11T21:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/black-friday-vs-cyber-monday-best-time-to-buy-a-vpn-service/</loc><lastmod>2020-11-11T20:49:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/how-does-military-communicate-on-a-battlefield-today/</loc><lastmod>2020-11-11T20:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/common-ways-to-avoid-hacking-your-personal-data-on-the-internet/</loc><lastmod>2020-11-11T20:49:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/creating-a-fake-wireless-acess-point-in-2-minutes/</loc><lastmod>2020-11-11T13:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/v8-array-overflow-exploitation-2019-kctf-problem-5-%e5%b0%8f%e8%99%8e%e8%bf%98%e4%b9%a1/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/5aefa-1a82frjato-nf4cval2w9dw.png</image:loc><image:title>1*A82fRjATo-Nf4cvAL2w9dw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d237f-1mgdftjryyo7qf1lbgz79iq.png</image:loc><image:title>1*MGdfTJrYYo7Qf1lBgZ79iQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/02a64-1uxjzxop6zws-wp-pjpnusa.png</image:loc><image:title>1*UXJzXop6ZWs-WP-PjpnusA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/6bb9c-14umojhzhy43qfkhfugajdg.png</image:loc><image:title>1*4uMoJhzHy43QfKHfuGaJdg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/85c8a-1jwjzzr39ossafxwstq3y3q.png</image:loc><image:title>1*jWJzzR39OsSAFxWsTq3Y3Q</image:title></image:image><lastmod>2020-11-11T12:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/unlimited-balance-in-an-online-transportation-application-account/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/2101c-1rzzisazqluoimnecmuzynq.jpeg</image:loc><image:title>1*rZZISAZqLUOImNecmuzynQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d85dd-1mmeeh3twlkbsirbs02koqg.jpeg</image:loc><image:title>1*mmEEh3TWLKbsIrbS02KoQg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9cb9d-1xi0gmvbykeqbfdlhoioyqg.jpeg</image:loc><image:title>1*xi0GMVbyKEQBfdlhoiOYQg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/68db8-1pszkqyju4wmu5pcwwse_6w.jpeg</image:loc><image:title>1*pSzkQyju4wMu5PCWwsE_6w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/3229a-15pfq_ronf0q3l9axwijfpg.jpeg</image:loc><image:title>1*5PFq_RoNf0Q3L9AxwIJFpg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/74f27-1_0a1oc2c4v57_vnmkqokqw.jpeg</image:loc><image:title>1*_0a1OC2c4V57_vnMkQokqw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/7ee1b-1b3lwfppclmissiqzithkbw.jpeg</image:loc><image:title>1*b3LwFPpCLmISSIQZiTHkBw</image:title></image:image><lastmod>2020-11-11T11:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/over-2800-e-shops-running-outdated-magento-software-hit-by-credit-card-hackers/</loc><lastmod>2020-11-11T11:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/build-your-2021-cybersecurity-plan-with-this-free-ppt-template/</loc><lastmod>2020-11-11T11:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/microsoft-releases-windows-security-updates-for-critical-flaws/</loc><lastmod>2020-11-11T11:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/ii-national-cyberleague-ctf-forensic-challenge/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d1bce-1fq15pcjekckzsmtmrli02g.png</image:loc><image:title>1*FQ15PCJekckzsMTMRlI02g</image:title></image:image><lastmod>2020-11-11T10:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/11/htb-tabby-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/c89a9-1topnq-rbiqkpfwmudzjz3a.png</image:loc><image:title>1*TopNQ-rBiqKPfWMuDzjz3A</image:title></image:image><lastmod>2020-11-11T10:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/new-pay2key-ransomware-emerges-as-the-latest-threat-for-organizations/</loc><lastmod>2020-11-10T21:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/py3webfuzz-a-python3-module-to-assist-in-fuzzing-web-applications/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/34c2c-py3webfuzz_4_encode_functions.gif</image:loc><image:title>py3webfuzz_4_encode_functions</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/79fa4-py3webfuzz_3_sqli-code-test.gif</image:loc><image:title>py3webfuzz_3_sqli-code-test</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/e13b6-py3webfuzz_3_sqli-code-test.gif</image:loc><image:title>py3webfuzz_3_sqli-code-test</image:title></image:image><lastmod>2020-11-10T21:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/feds-seize-1-billion-from-famous-bitcoin-wallet-threatwire/</loc><lastmod>2020-11-10T20:10:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/mozilla-patches-critical-security-issues-in-firefox-and-thunderbird/</loc><lastmod>2020-11-10T16:28:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/welcart-e-commerce-plugin-bug-exposed-wordpress-sites-to-code-injection-attacks/</loc><lastmod>2020-11-10T15:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/brazil-court-system-went-down-following-cyber-attack/</loc><lastmod>2020-11-10T12:48:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/paradoxiarat-native-windows-remote-access-tool/</loc><lastmod>2020-11-10T12:16:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/chaining-password-reset-link-poisoning-idoraccount-information-leakage-to-achieve-account/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d67da-19elyutem8styvo2r6jinwg.png</image:loc><image:title>1*9ELyuteM8StyVo2r6jinWg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/f9e26-1lh8jtz0cw3besh9sawj88w.png</image:loc><image:title>1*lH8jtZ0cW3BEsh9SAWJ88w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/a6716-1x1ay2ptkpmdwauvmbp8bzq.png</image:loc><image:title>1*x1ay2pTkPmDwauvMbP8bzQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/46ebc-1lpblqf9bme37tpcj_nvx2q.png</image:loc><image:title>1*LPBlQf9bmE37tPcJ_Nvx2Q</image:title></image:image><lastmod>2020-11-10T09:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/wacky-xss-challenge-with-amazon-by-bugpoc/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/1fb2e-1wb1fqqoddgpben0cm4vi4g.png</image:loc><image:title>1*wB1fqQOddGPBen0cM4vI4g</image:title></image:image><lastmod>2020-11-10T08:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/78-nerdcore/</loc><lastmod>2020-11-10T08:27:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/watch-out-new-android-banking-trojan-steals-from-112-financial-apps/</loc><lastmod>2020-11-10T08:10:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/10/best-websites-to-send-anonymous-text-messages/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/256e2-best-websites-to-send-anonymous-text-messages.jpg</image:loc><image:title>Best-Websites-To-Send-Anonymous-Text-Messages</image:title></image:image><lastmod>2020-11-10T07:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/reconnote-web-application-security-automation-framework-which-recons-the-target-for-various-assets-to-maximize-the-attack-surface-for-security-professionals-bug-hunters/</loc><lastmod>2020-11-09T21:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/lock-and-code-s1ep19-forecasting-iot-cybersecurity-with-john-donovan-and-adam-kujawa/</loc><lastmod>2020-11-09T19:27:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/mangling-ttl-for-unlimited-data-on-the-road-w-glytch/</loc><lastmod>2020-11-09T19:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/new-ransomexx-ransomware-variant-emerges-that-targets-linux-systems/</loc><lastmod>2020-11-09T18:49:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/how-to-bypass-file-upload-restrictions-on-web-apps-to-get-a-shell/</loc><lastmod>2020-11-09T15:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/webgoat-without-password-challenge/</loc><lastmod>2020-11-09T14:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/8-scary-movies-you-cant-watch-alone/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/74bf0-best-scary-movies-you-cant-watch.jpg</image:loc><image:title>best-scary-movies-you-cant-watch</image:title></image:image><lastmod>2020-11-09T14:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/worried-about-saas-misconfigurations-check-these-5-settings-everybody-misses/</loc><lastmod>2020-11-09T14:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/tryhackme-break-out-the-cage-1-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/ed42b-17sagbdbhf72jfswmvnjuja.png</image:loc><image:title>1*7sAgBdbhF72JfsWMVnjUjA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/dd7f6-1osvithyzhgebuv9qfo_tpg.png</image:loc><image:title>1*oSvIThYzHgeBuv9QFo_tPg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/52158-1l4l8_bhtdyepzlwjesifkg.png</image:loc><image:title>1*L4L8_BHtDyepzLWJEsifKg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/777cc-1t7a0dxohwarljcjyrwtyiq.png</image:loc><image:title>1*T7A0DXOHWArLJCJYrWtYiQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/714b4-1_ipsqjq3ujlo1gz9pfzruq.png</image:loc><image:title>1*_ipSqjq3UjLo1gZ9pfZrUQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/7be71-1mqtdt26ryzvnles5-6egyq.png</image:loc><image:title>1*MQtDT26ryZVNLES5-6EGYQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/6cba4-18x-mnfol4vra5q5htxel0g.png</image:loc><image:title>1*8X-MNfOl4vra5q5hTxEL0g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/68b5a-1lsmgmxlgefoqto_46vvucg.png</image:loc><image:title>1*LsMGmXlgEFOQto_46vvuCg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/5ae59-1ntyp8w-gtnlukzdb_tedjq.png</image:loc><image:title>1*NtYp8w-gtNLUKZDb_TEDJQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/655d5-1qffwyxjqxsdufamrby9iow.png</image:loc><image:title>1*QffwyxjqxsduFAmrBY9iOw</image:title></image:image><lastmod>2020-11-09T12:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/apple-patched-three-ios-zero-day-bugs-following-googles-discovery/</loc><lastmod>2020-11-09T12:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/beverage-giant-campari-went-offline-following-ransomware-attack/</loc><lastmod>2020-11-09T12:48:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/pcwt-a-web-application-that-makes-it-easy-to-run-your-pentest-and-bug-bounty-projects/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/8b00d-pcwt_3_domains.png</image:loc><image:title>PCWT_3_domains</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/02283-pcwt_2_settings.png</image:loc><image:title>PCWT_2_settings</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/98412-pcwt_1_mainpage.png</image:loc><image:title>PCWT_1_mainpage</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/ad19e-pcwt_2_settings.png</image:loc><image:title>PCWT_2_settings</image:title></image:image><lastmod>2020-11-09T12:14:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/lan-captive-portal%e2%80%8a-%e2%80%8abeginners-guide/</loc><lastmod>2020-11-09T10:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/09/windows-10-ios-chrome-firefox-and-others-hacked-at-tianfu-cup-competition/</loc><lastmod>2020-11-09T08:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/08/showstopper-anti-debug-tricks-exploration-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/93628-showstopper_1_showstopper_logo.png</image:loc><image:title>showstopper_1_showstopper_logo</image:title></image:image><lastmod>2020-11-08T21:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/08/hetty-an-http-toolkit-for-security-research/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/a53e6-hetty_5.png</image:loc><image:title>hetty_5</image:title></image:image><lastmod>2020-11-08T12:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/jsmon-javascript-change-monitor-for-bugbounty/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/85531-jsmon_2_diff.png</image:loc><image:title>jsmon_2_diff</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/deaec-jsmon_1_telegram.png</image:loc><image:title>jsmon_1_telegram</image:title></image:image><lastmod>2020-11-07T22:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/capcom-disclosed-cyberattack-ransomware-involvement-suspected/</loc><lastmod>2020-11-07T12:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/threagile-agile-threat-modeling-toolkit/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/dcaf7-threagile.png</image:loc><image:title>Threagile</image:title></image:image><lastmod>2020-11-07T12:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/understanding-exploiting-cross-site-request-forgery%e2%80%8a-%e2%80%8acsrf-vulnerabilities/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/62874-0_vqmjda7qrtsvnvs.gif</image:loc><image:title>0*_vQmJDa7qRtsVnVS</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/84d1a-0dbwv6mcklf8w7sfj.jpg</image:loc><image:title>0*DbWV6MCKlF8W7SFJ</image:title></image:image><lastmod>2020-11-07T10:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/bypass-server-upload-restrictions-create-a-reverse-shell-tutorial/</loc><lastmod>2020-11-07T01:35:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/07/break-into-the-world-of-electrical-engineering-with-this-bundle/</loc><lastmod>2020-11-07T01:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/gwtmap-tool-to-help-map-the-attack-surface-of-google-web-toolkit/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/228a8-gwt-load-fragment.png</image:loc><image:title>GWT-load-fragment</image:title></image:image><lastmod>2020-11-06T21:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/grow-your-business-with-call-tracking-software/</loc><lastmod>2020-11-06T18:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/update-your-ios-now-apple-patches-three-zero-day-vulnerabilities/</loc><lastmod>2020-11-06T18:26:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/regtech-explained-a-crucial-toolset-for-the-financial-industry/</loc><lastmod>2020-11-06T17:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/tempomail-generate-a-custom-email-address-in-1-second-and-receive-emails/</loc><lastmod>2020-11-06T12:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/anatomy-of-disk-recovery-evasion/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/3bfad-1zurlgdmgfmxitiuj9dshtw.jpeg</image:loc><image:title>1*ZUrLGDmGFMxItiUJ9dShTw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/65299-1eczo6fsyduizzwiuwjyovq.jpeg</image:loc><image:title>1*ECzO6FSyDuIzZwIuWjYOVQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/60ba3-14u_w8fqumyrh262ycrvsnq.jpeg</image:loc><image:title>1*4U_W8fqumyrH262YCrVsNQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/96e28-1rx4jq2r7dhp9h3xh_gi8bq.jpeg</image:loc><image:title>1*rx4jq2R7DHp9H3Xh_gi8BQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/20a1b-1lq7kafmy5-vikwiv9hoscw.jpeg</image:loc><image:title>1*Lq7kaFMY5-VIkWIv9Hoscw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/cf47b-17fuo6eobewq3wwuu4rwyza.jpeg</image:loc><image:title>1*7Fuo6eobewQ3WwuU4rWYZA</image:title></image:image><lastmod>2020-11-06T10:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/ubuntu-commands-list-for-beginners/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/52939-ubuntu-commands-list.jpg</image:loc><image:title>ubuntu-commands-list</image:title></image:image><lastmod>2020-11-06T10:43:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/top-5-locations-for-offshore-outsourcing-software-development/</loc><lastmod>2020-11-06T09:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/risks-and-benefits-of-offshore-it-outsourcing/</loc><lastmod>2020-11-06T09:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/challenges-faced-by-an-offshore-product-development-company/</loc><lastmod>2020-11-06T09:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/things-to-consider-when-choosing-the-best-offshore-web-development-company/</loc><lastmod>2020-11-06T09:48:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/how-is-offshore-programming-different-from-nearshore-and-onshore-programming/</loc><lastmod>2020-11-06T09:48:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/everything-you-need-to-know-about-offshore-software-development/</loc><lastmod>2020-11-06T09:48:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/how-to-hire-the-best-offshore-outsourcing-company/</loc><lastmod>2020-11-06T09:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/top-3-offshore-software-models/</loc><lastmod>2020-11-06T09:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/what-are-the-merits-and-demerits-of-offshore-software-services/</loc><lastmod>2020-11-06T09:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/what-is-an-offshore-web-development-company/</loc><lastmod>2020-11-06T09:47:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/update-your-ios-devices-now-3-actively-exploited-0-days-discovered/</loc><lastmod>2020-11-06T08:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/tryhackme-biohazard-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/e7c15-1tsxxhz97xcs4gq570oleyg.png</image:loc><image:title>1*tsxXhZ97xCS4gq570OlEYg</image:title></image:image><lastmod>2020-11-06T07:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/06/how-to-make-access-on-termux-user-android/</loc><lastmod>2020-11-06T06:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/setting-up-a-wireguard-vpn-server-architecture-for-internal-network-access/</loc><lastmod>2020-11-05T21:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/kraken-cross-platform-yara-scanner-written-in-go/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/6e6be-kraken_3_linux.png</image:loc><image:title>kraken_3_linux</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/befa9-kraken_2_cmd.png</image:loc><image:title>kraken_2_cmd</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9a642-kraken_1_kraken.png</image:loc><image:title>kraken_1_kraken</image:title></image:image><lastmod>2020-11-05T21:14:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/north-korean-hackers-used-torisma-spyware-in-job-offers-based-attacks/</loc><lastmod>2020-11-05T20:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/how-to-start-bug-bounty/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9d3e2-10gtlmbwh7lxhyg9jtrgy9g.png</image:loc><image:title>1*0gTlmbWh7LxHyG9JTRGy9g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/c250d-1fqyzui3d8wc6t6q3qqlsxa.jpeg</image:loc><image:title>1*fQyzui3D8wC6T6Q3QqLSxA</image:title></image:image><lastmod>2020-11-05T19:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/bypass-amsi-in-powershell%e2%80%8a-%e2%80%8aa-nice-case-study/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/dd0c4-1qis38pmrcotiqernaa4aww.png</image:loc><image:title>1*Qis38pMrcotIQERNAa4Aww</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9f73b-1yhgffmfko21cv7whw59tma.png</image:loc><image:title>1*yhgFFMFko21Cv7Whw59TMA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/94bfa-1i_9ct2f-ubwwm57oynu1ag.png</image:loc><image:title>1*i_9ct2f-uBwwm57OYNu1ag</image:title></image:image><lastmod>2020-11-05T17:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/beware-of-this-google-drive-phishing-campaign/</loc><lastmod>2020-11-05T15:49:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/prop-24-passes-in-california-will-change-data-privacy-law/</loc><lastmod>2020-11-05T15:28:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/swiftyinsta-instagram-unofficial-private-api-swift/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/3add8-swiftyinsta.png</image:loc><image:title>SwiftyInsta</image:title></image:image><lastmod>2020-11-05T12:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/what-keyboard-trackers-are-for/</loc><lastmod>2020-11-05T11:50:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/premium-rate-phone-fraudsters-hack-voip-servers-of-1200-companies/</loc><lastmod>2020-11-05T11:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/google-chrome-for-android-the-next-victim-of-zero-day-update-now/</loc><lastmod>2020-11-05T10:49:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/deception-technology-no-longer-only-a-fortune-2000-solution/</loc><lastmod>2020-11-05T09:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/05/if-you-dont-have-a-sase-cloud-service-you-dont-have-sase-at-all/</loc><lastmod>2020-11-05T09:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/5-best-parental-control-software-2020/</loc><lastmod>2020-11-04T22:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/qbot-trojan-delivered-via-malspam-campaign-exploiting-us-election-uncertainties/</loc><lastmod>2020-11-04T21:26:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/brutto-easy-brute-forcing-to-whatever-you-want/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/c67f9-bf.png</image:loc><image:title>bf</image:title></image:image><lastmod>2020-11-04T21:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/tryhackme-gamingserver-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/cd97a-18i2vbquhei6maslundbbfq.png</image:loc><image:title>1*8i2VBQUhEI6maSLuNDbBFQ</image:title></image:image><lastmod>2020-11-04T20:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/a-comparison-between-premium-vpns-versus-free-vpns/</loc><lastmod>2020-11-04T19:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/malicious-npm-package-created-backdoor-on-target-devices/</loc><lastmod>2020-11-04T15:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/google-fixes-second-chrome-zero-day-under-active-attack/</loc><lastmod>2020-11-04T12:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/04/feroxbuster-a-fast-simple-recursive-content-discovery-tool-written-in-rust/</loc><lastmod>2020-11-04T12:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/deepbluecli-a-powershell-module-for-threat-hunting-via-windows-event-logs/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/f3dd9-deepbluecli.png</image:loc><image:title>DeepBlueCLI</image:title></image:image><lastmod>2020-11-03T21:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/update-your-chrome-again-as-google-patches-second-zero-day-in-two-weeks/</loc><lastmod>2020-11-03T19:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/writeup-to-the-flare-on-7-challenge/</loc><lastmod>2020-11-03T18:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/maze-ransomware-gang-announces-retirement/</loc><lastmod>2020-11-03T18:26:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/hospitals-targeted-in-ransomware-campaigns-threatwire/</loc><lastmod>2020-11-03T17:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/tryhackme-attackerkb-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d6c7e-1fxrfpqut2u-vwbkul_wy7a.png</image:loc><image:title>1*fxRFpQut2u-VwBkuL_WY7A</image:title></image:image><lastmod>2020-11-03T15:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/hospital-ransomware-gangs-are-back-to-target-healthcare/</loc><lastmod>2020-11-03T13:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/tryhackme-toolsrus-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/086fa-1eseo9ae5gfx1aovmxc6-fq.png</image:loc><image:title>1*Eseo9ae5GFx1aOVMXc6-FQ</image:title></image:image><lastmod>2020-11-03T12:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/exploiting-ilias-learning-management-system/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/0b858-0gdjf4sh501ycpwaq.png</image:loc><image:title>0*gDJF4Sh501ycPWaQ</image:title></image:image><lastmod>2020-11-03T12:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/webshell-analyzer-web-shell-scanner-and-analyzer/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/5d017-webshell-analyzer.png</image:loc><image:title>webshell-analyzer</image:title></image:image><lastmod>2020-11-03T12:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/new-kimsuky-module-makes-north-korean-spyware-more-powerful/</loc><lastmod>2020-11-03T12:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/new-chrome-zero-day-under-active-attacks-update-your-browser/</loc><lastmod>2020-11-03T10:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/03/5-best-free-voice-changer-apps-for-discord/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/57523-best-voice-changer-apps-for-discord.jpg</image:loc><image:title>Best-voice-changer-apps-for-discord</image:title></image:image><lastmod>2020-11-03T06:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/my-first-bug-bounty-reward/</loc><lastmod>2020-11-02T22:51:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/directory-fuzzing/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/a5564-1iczxr4rghyva4acb-ocdzw.png</image:loc><image:title>1*iCZXR4rGhyVa4AcB-oCDzw</image:title></image:image><lastmod>2020-11-02T21:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/trident-automated-password-spraying-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/ce851-trident_4_architecture.png</image:loc><image:title>trident_4_architecture</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/1bcea-trident_4_architecture.png</image:loc><image:title>trident_4_architecture</image:title></image:image><lastmod>2020-11-02T21:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/how-i-did-full-account-takeover-by-clickjacking/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/de6d1-1vfm7jya9nugkj5pjin4kkq.png</image:loc><image:title>1*VFm7JYA9NUgkJ5pjIn4KkQ</image:title></image:image><lastmod>2020-11-02T20:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/webgoat-admin-lost-password-challenge/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/66793-17uihc6sruqkbgl_hrs2cqa.png</image:loc><image:title>1*7uIHc6SRUqkbgL_HrS2cqA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/ab160-1moxkm8iau0s0f55dd8nuza.png</image:loc><image:title>1*MOxKM8iau0s0f55Dd8NUZA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/4fac7-1ua1fflldclseyg9zwf2lkw.png</image:loc><image:title>1*UA1fflLdclSeYG9ZwF2LKw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/31054-1o5jgpefvxxdlty2q8semow.png</image:loc><image:title>1*o5jgPefvXxDlTy2q8sEmow</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/fabb5-1gz7xqm9265wwtramwa20ew.png</image:loc><image:title>1*GZ7XQM9265wwTRaMWa20ew</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/b698b-1t2llxqvlxqnjhxva1elaeq.png</image:loc><image:title>1*T2LlXQVLxqNjHXVa1eLaEQ</image:title></image:image><lastmod>2020-11-02T20:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/a-week-in-security-october-26-november-1/</loc><lastmod>2020-11-02T18:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/basecamp-formally-launch-bug-bounty-program-to-public/</loc><lastmod>2020-11-02T15:47:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/vulnerabilities-in-openemr-software-could-allow-access-to-medical-records/</loc><lastmod>2020-11-02T15:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/how-i-hacked-a-cybercafe-to-teach-them-about-cyber-security/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/25b22-147mwe2swtyv_b7bvj0mhag.jpeg</image:loc><image:title>1*47mWe2sWtYv_B7BvJ0Mhag</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/e4325-1mp9dxvod1wm9llsomnyjzw.png</image:loc><image:title>1*mP9DxVod1wM9llSOMNYjzw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/f10fc-1pronzwp3fbx1cgabsjtbnw.gif</image:loc><image:title>1*ProNzWP3fbX1cgaBsJtbnw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/9b2f4-1l-_pfbtttwjf7dm7jzmlqa.jpeg</image:loc><image:title>1*l-_pFbtttwjF7dM7JZmlqA</image:title></image:image><lastmod>2020-11-02T14:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/how-to-protect-yourself-from-pwned-and-password-reuse-attacks/</loc><lastmod>2020-11-02T13:09:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/new-nat-firewall-bypass-attack-lets-hackers-access-any-tcp-udp-service/</loc><lastmod>2020-11-02T13:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/protect-your-business-from-a-dos-attack-with-your-firewall/</loc><lastmod>2020-11-02T12:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/doppelpaymer-ransomware-gang-leaks-data-stolen-from-georgia-county-hack/</loc><lastmod>2020-11-02T12:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/google-warns-of-unpatched-windows-kernel-zero-day-under-attack/</loc><lastmod>2020-11-02T12:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/powerzure-powershell-framework-to-assess-azure-security/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/967bc-powerzure_1.png</image:loc><image:title>PowerZure_1</image:title></image:image><lastmod>2020-11-02T12:14:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/internet-bank-account-takeover-of-1m-users%e2%80%8a-%e2%80%8areal-scenario/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/8ef58-1empxr4kbge6p2bhfapcyba.png</image:loc><image:title>1*emPxR4kBGe6P2BHFApcYBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/5187e-1jqedeuegiqjb2jwmvr9hia.png</image:loc><image:title>1*jQEDEUegiQjB2JWmVR9hIA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/0d0ef-1b7jck9xwowaxmzoveafkxg.png</image:loc><image:title>1*b7Jck9XwowAXMZOvEAFKxg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/755f1-1pegrlw1l6jxjzxzivyybxa.png</image:loc><image:title>1*pegRLW1l6JxjzXzivyyBXA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/d523b-1iuqnkmblscht3kr1c5uunq.png</image:loc><image:title>1*iuQNkMbLSchT3KR1c5uUnQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/85a1d-1ju2uewbj69yn9_7jw08weq.png</image:loc><image:title>1*JU2uEwBJ69yN9_7jW08WeQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/5dfe3-1a8y6kuex9bpgkbkwjr-tia.png</image:loc><image:title>1*A8Y6kueX9BPGkBkwjr-tIA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/2cb8d-11lap6vcj_9wphcijl0uvqg.png</image:loc><image:title>1*1LAP6vCJ_9wPhCIjl0uvQg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/bded4-1s6gaamotbxacrn2uzemzfq.png</image:loc><image:title>1*S6gAAmOtbXAcRn2uzemZFQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/33c36-1xmww82ztmohafms9j9uonw.png</image:loc><image:title>1*xMwW82ZTMohafMs9J9Uonw</image:title></image:image><lastmod>2020-11-02T10:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/02/warning-google-discloses-windows-zero-day-bug-exploited-in-the-wild/</loc><lastmod>2020-11-02T10:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/01/adaz-automatically-deploy-customizable-active-directory-labs-in-azure/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/60c69-adaz_4_kibana.png</image:loc><image:title>Adaz_4_kibana</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/6b935-adaz_5_dc.png</image:loc><image:title>Adaz_5_dc</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/4545e-adaz_3_architecture.png</image:loc><image:title>Adaz_3_architecture</image:title></image:image><lastmod>2020-11-01T21:12:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/01/lazada-redmart-data-breach-puts-up-data-of-1-1-million-customers-on-dark-web/</loc><lastmod>2020-11-01T13:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/01/powershell-red-team-collection-of-powershell-functions-a-red-teamer-may-use-to-collect-data-from-a-machine/</loc><lastmod>2020-11-01T12:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/01/htb-fuse-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/11/171ba-19hhbbxg9ndcnoaduxhrhwa.png</image:loc><image:title>1*9hHBBXg9ndCNoadUXHRHWA</image:title></image:image><lastmod>2020-11-01T11:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/11/01/baseline-security-check-i/</loc><lastmod>2020-11-01T11:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/apicheck-the-devsecops-toolset-for-rest-apis/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7f761-apicheck_3.png</image:loc><image:title>apicheck_3</image:title></image:image><lastmod>2020-10-31T21:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/maze-ransomware-announces-departure-replacements-already-available/</loc><lastmod>2020-10-31T14:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/link-previews-make-chat-apps-vulnerable-to-data-leak-and-rce-attacks/</loc><lastmod>2020-10-31T14:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/smart-irrigation-systems-left-wide-open-to-abuse/</loc><lastmod>2020-10-31T14:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/nethive-project-restructured-and-collaborated-siem-and-cvss-infrastructure/</loc><lastmod>2020-10-31T12:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/how-to-send-free-anonymous-message-to-any-number/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/70d7d-1585688415_how-to-send-anonymous-sms-to-any-number-in-2020-750x420-1.jpg</image:loc><image:title>1585688415_How-To-Send-Anonymous-SMS-To-Any-Number-in-2020-750x420</image:title></image:image><lastmod>2020-10-31T04:20:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/10-best-practices-for-data-encryption/</loc><lastmod>2020-10-31T02:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/why-do-you-need-continuous-data-protection/</loc><lastmod>2020-10-31T02:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/performance-testing-vs-load-testing-vs-stress-testing/</loc><lastmod>2020-10-31T02:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/31/how-to-design-a-website-3-important-tips/</loc><lastmod>2020-10-31T02:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/vastaamo-psychotherapy-data-breach-sees-the-most-vulnerable-victims-extorted/</loc><lastmod>2020-10-30T21:26:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/binbloom-raw-binary-firmware-analysis-software/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cfc10-raw2bbinary2bfirmware.png</image:loc><image:title>RawBinaryFirmware</image:title></image:image><lastmod>2020-10-30T21:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/announcing-the-winners-of-pentester-lab-pro-subscription-giveaway%e2%80%8a-%e2%80%8aoctober-2020/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3d6b6-1bz7biimfdr9ewxele8tbdq.png</image:loc><image:title>1*BZ7BiimFdr9EWXELE8TBDQ</image:title></image:image><lastmod>2020-10-30T20:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/identifying-escalating-http-host-header-injection-attacks/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c78fe-1hhpownyxrmktt83ursipzq.gif</image:loc><image:title>1*hhPOwNYXrmKtt83urSIpzQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0ad38-1l9nsm3kdujdljxpgvgzmbq.png</image:loc><image:title>1*l9NSm3KdujDLjxPGvgzmbQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7b64b-1vf3mrhruejeenegqt4wvtw.png</image:loc><image:title>1*VF3MrhruejeenEgqt4wVtw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/384c1-1gzoooxeff_ri5zyorqf5rq.png</image:loc><image:title>1*gZOoOXEff_rI5zyORqf5rQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a4cfe-1nphitorgbhxfoyfcuuhw8w.png</image:loc><image:title>1*npHitORGbHxfOYfCuUhW8w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/42c1d-1fp_hymav2jl485hfs4w87g.png</image:loc><image:title>1*fP_HYmaV2jL485hfS4w87g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/43a83-10l4bnwk3mw4bcwbl-9wxmg.png</image:loc><image:title>1*0l4BNwK3MW4BCWBl-9Wxmg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/49f82-1lkynvhgldza7yswojrw44q.gif</image:loc><image:title>1*LkyNvhGLdza7ySwoJRW44Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/962ca-13ceox3xhyufcjjguzazxaq.png</image:loc><image:title>1*3ceoX3XhyUfCjJguZAzXAQ</image:title></image:image><lastmod>2020-10-30T19:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/californias-prop-24-splits-data-privacy-supporters/</loc><lastmod>2020-10-30T17:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/21-more-android-apps-part-of-hiddenads-campaign-3-still-available-on-play-store/</loc><lastmod>2020-10-30T15:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/edex-ui-a-cross-platform-customizable-science-fiction-terminal-emulator-with-advanced-monitoring-touchscreen-support/</loc><lastmod>2020-10-30T12:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/30/browsers-bugs-exploited-to-install-2-new-backdoors-on-targeted-computers/</loc><lastmod>2020-10-30T11:10:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/learn-how-to-write-deliver-high-quality-software-with-this-bootcamp/</loc><lastmod>2020-10-29T23:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/widevine-l3-decryptor-a-chrome-extension-that-demonstrates-bypassing-widevine-l3-drm/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e9cdc-widevine-content-descryption-module-1-1-1.jpg</image:loc><image:title>Widevine-Content-descryption-module-1-1-1</image:title></image:image><lastmod>2020-10-29T21:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/lets-talk-about-improper-resource-shutdown/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ed66f-1uqoglhu4liqzxbb8qzkdbq.png</image:loc><image:title>1*UQogLHU4liQzXbb8qzKDBQ</image:title></image:image><lastmod>2020-10-29T18:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/hp-printer-issue-on-mac-what-happened/</loc><lastmod>2020-10-29T18:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/scrying-a-tool-for-collecting-rdp-web-and-vnc-screenshots-all-in-one-place/</loc><lastmod>2020-10-29T12:12:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/kashmirblack-botnet-hijacks-thousands-of-sites-running-on-popular-cms-platforms/</loc><lastmod>2020-10-29T10:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/how-to-run-google-serp-api-without-constantly-changing-proxy-servers/</loc><lastmod>2020-10-29T10:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/10-best-screenshot-apps-for-android/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f0621-best-screenshot-apps-for-android.jpg</image:loc><image:title>Best-screenshot-apps-for-Android</image:title></image:image><lastmod>2020-10-29T09:43:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/fbi-dhs-warn-of-possible-major-ransomware-attacks-on-healthcare-systems/</loc><lastmod>2020-10-29T06:09:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/the-best-free-vpn-for-unblocking-netflix-2020/</loc><lastmod>2020-10-29T00:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/is-roku-worth-it-how-can-i-link-my-roku-with-my-cable-internet/</loc><lastmod>2020-10-29T00:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/29/10-reasons-to-switch-to-ruby/</loc><lastmod>2020-10-29T00:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/create-a-dead-mans-switch-in-python-to-encrypt-a-file-when-you-dont-check-in-tutorial/</loc><lastmod>2020-10-28T23:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/code-a-dead-mans-switch-in-python-3-to-encrypt-delete-files-whenever-you-dont-check-in/</loc><lastmod>2020-10-28T23:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/new-emotet-delivery-method-spotted-during-downward-detection-trend/</loc><lastmod>2020-10-28T22:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/awesome-android-security-a-curated-list-of-android-security-materials-and-resources-for-pentesters-and-bug-hunters/</loc><lastmod>2020-10-28T21:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/unlimited-balance-in-alopeyk-account%e2%80%8a-%e2%80%8aonly-for-study-purpose/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d0c61-1ilwfpcyf4dlod-lmtvjcwg.jpeg</image:loc><image:title>1*iLWFpcYf4dLOD-lMTVjcWg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b74a3-18cyk18fprzfteo9vtk7rkw.jpeg</image:loc><image:title>1*8cYK18fPrzftEO9VTk7RKw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b13bc-1yfubxw7wfcioft58efqsng.jpeg</image:loc><image:title>1*YFuBXW7wfcIoFT58efqSng</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ffa05-1or86-rbp7xrqzwa0u66syg.jpeg</image:loc><image:title>1*or86-RBp7XRqZwa0u66SYg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/53c8f-1hv8yljjb01hlgqkx0utk0g.jpeg</image:loc><image:title>1*Hv8yLJJB01hLGqkX0UTk0g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/18ac9-1c2hgruuadsm3zkrid9zg_w.jpeg</image:loc><image:title>1*C2HgrUUadSm3zKriD9ZG_w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/732a1-18xpwp7mqoafme_bscdig7w.png</image:loc><image:title>1*8XPwp7MqoAfMe_BSCdIG7w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/92dd4-1qfkdxiomxciytlyeg___cg.jpeg</image:loc><image:title>1*QfKdXIomXCIYtLyEG___cg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/be197-1bp-ixornco7y8stdyxe9fg.jpeg</image:loc><image:title>1*bp-iXOrNCo7y8stDyXE9fg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/be0d7-1jo0omsv-v6iifblbe9zu2q.png</image:loc><image:title>1*jO0omsv-V6IifbLBe9Zu2Q</image:title></image:image><lastmod>2020-10-28T20:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/fake-covid-19-survey-hides-ransomware-in-canadian-university-attack/</loc><lastmod>2020-10-28T15:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/scammers-are-spoofing-bank-phone-numbers-to-rob-victims/</loc><lastmod>2020-10-28T15:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/nitro-pdf-suffered-a-data-breach-impacting-google-apple-amazon-and-more/</loc><lastmod>2020-10-28T12:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/ish-linux-shell-for-ios/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/71a12-ish_4.png</image:loc><image:title>ish_4</image:title></image:image><lastmod>2020-10-28T12:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/webgoat-client-side-lessons/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0cbed-1n7woy-3vc2xyo5c8mdssaa.png</image:loc><image:title>1*n7woY-3VC2XYo5c8MdsSAA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/73b8f-14hppgtbxj-8yizeaxiljba.png</image:loc><image:title>1*4HpPgtBXJ-8YIzeAxiLjbA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6a7f9-1dwn1oh85fh0neagv77mm5a.png</image:loc><image:title>1*DWN1oH85Fh0neAgV77mM5A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8bcec-1c1w9enapvxq9jmhksndugg.png</image:loc><image:title>1*c1W9EnapvXq9JmHkSnDUgg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a76c1-1lpd5crynqqk-drwn0rtiqq.png</image:loc><image:title>1*Lpd5CRyNqQk-DRWn0RTIqQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/72771-1czyzcyjsjt9qqjwxcuzm0w.png</image:loc><image:title>1*CzYzCyjsJt9qqjwXcuZm0w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0a852-1zzxi9mfaxy4cara8q2xhrq.png</image:loc><image:title>1*ZZXI9MFaXy4cARa8Q2xhrQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3f36e-1pir2jji8lsxo05gpbcrs0w.png</image:loc><image:title>1*PiR2jjI8LSXO05GpBcRS0w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b5fd7-1123uxs8vgqeekvtvrf9w_q.png</image:loc><image:title>1*123UXs8vgQEEkvtvrF9w_Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a0a56-1bw4oshy8cu6qhgryk7voya.png</image:loc><image:title>1*bW4oShy8Cu6qhgrYK7vOYA</image:title></image:image><lastmod>2020-10-28T11:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/tryhackme-lian_yu-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/77e62-1vote4ktzzsluot27ou2jcw.png</image:loc><image:title>1*voTE4KtzZSLUOT27oU2jCw</image:title></image:image><lastmod>2020-10-28T11:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/webinar-and-ebook-are-youre-getting-the-best-value-from-your-edr-solution/</loc><lastmod>2020-10-28T11:09:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/zip-bombs/</loc><lastmod>2020-10-28T09:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/trickbot-linux-variants-active-in-the-wild-despite-recent-takedown/</loc><lastmod>2020-10-28T09:09:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/speed-up-internet-in-kali-linux-100-working-method-2020/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fd343-screenshot.png</image:loc><image:title>Screenshot</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/afe20-images.jpg</image:loc><image:title>images</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/319c3-screenshot.png</image:loc><image:title>Screenshot</image:title></image:image><lastmod>2020-10-28T08:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/automating-xss-identification-with-dalfox-paramspider/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/af0c5-154xerqnfwazgu2fhw7hxha.png</image:loc><image:title>1*54xerqNFwaZgu2fhW7hxhA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/88c23-1qam1imgedgakic63h9cjvg.png</image:loc><image:title>1*QAM1IMgEdgAKIc63h9CjVg</image:title></image:image><lastmod>2020-10-28T07:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/http-headers-web-app-security-basics/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/765a6-1kf3cqxlrrlacngvhkbp3kg.png</image:loc><image:title>1*KF3cQxLrRLAcngVhkbP3Kg</image:title></image:image><lastmod>2020-10-28T07:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/28/ransomware-for-charity-update-geforce-experience-and-hacking-campaigns-attributed-threatwire/</loc><lastmod>2020-10-28T01:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/tryhackme-gamingserver-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4d36c-16o7vqnr7s0syqaz7nlx3og.png</image:loc><image:title>1*6o7vQnr7s0syQaz7nLx3og</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/af100-1pwz871jfnpyvbfupubjz6w.png</image:loc><image:title>1*PWZ871jfNpYvBFupubjZ6w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3f8c7-1giloyjgbsrkssxroo16qoq.png</image:loc><image:title>1*giLOYjgBSRKssXRoo16qOQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d5fab-1yii_mds6wdm1onulqtjrsw.png</image:loc><image:title>1*yii_mdS6wdM1OnulQtJRSw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d4349-1omszkbnnyv-rjvsarrkagg.png</image:loc><image:title>1*oMSzkBNNYv-RjvSArRkaGg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/dac5a-10w9agxjjbkanlljev2nrvw.png</image:loc><image:title>1*0w9agXjjBkanlljEv2nRvw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9abd8-1hfb8py9cc5fno8s2lhbezq.png</image:loc><image:title>1*HFB8Py9CC5FnO8s2lHBezQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/33acd-179_mzhpm0bnjhbvu-w1e5q.png</image:loc><image:title>1*79_mzhpm0bNjhbVu-W1e5Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/385d4-1zxsatb5z_iyfgkez4gxsoq.png</image:loc><image:title>1*ZXSATB5Z_iYfgkEz4gxsoQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/086bb-1ra-qqdupilusk9niq_tjcg.png</image:loc><image:title>1*RA-QqdUpIluSk9NIQ_tjCg</image:title></image:image><lastmod>2020-10-27T21:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/grype-a-vulnerability-scanner-for-container-images-and-filesystems/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/68e7b-grype_6.gif</image:loc><image:title>grype_6</image:title></image:image><lastmod>2020-10-27T21:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/tryhackme-gotta-catchem-all-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/58f8f-1obi_vwrlcybxdgsr5f-wjq.png</image:loc><image:title>1*OBI_VWrLCYbXDgSR5f-WJQ</image:title></image:image><lastmod>2020-10-27T19:51:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/keeping-ransomware-cash-away-from-your-business/</loc><lastmod>2020-10-27T17:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/taser-python3-resource-library-for-creating-security-related-tooling/</loc><lastmod>2020-10-27T12:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/google-removes-21-malicious-android-apps-from-play-store/</loc><lastmod>2020-10-27T10:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/27/77-olympic-destroyer/</loc><lastmod>2020-10-27T07:27:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/easy-ways-to-ensure-your-new-business-is-protected/</loc><lastmod>2020-10-26T21:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/few-easy-tips-to-improve-your-website-design/</loc><lastmod>2020-10-26T21:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/malicious-apps-repeatedly-bypassed-apple-app-notarization/</loc><lastmod>2020-10-26T21:47:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/french-it-firm-sopra-steria-suffered-ransomware-attack/</loc><lastmod>2020-10-26T21:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/jwt-hack-tool-to-en-decoding-jwt-generate-payload-for-jwt-attack-and-very-fast-crackingdict-brutefoce/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ae888-jwt-hack_9.png</image:loc><image:title>jwt-hack_9</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/56871-jwt-hack_1.png</image:loc><image:title>jwt-hack_1</image:title></image:image><lastmod>2020-10-26T21:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/fluxcloud-frontline%e2%80%8a-%e2%80%8awriteup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/15422-13cgqybkueb8wnd9yzot8sw.png</image:loc><image:title>1*3cGQYbKueb8Wnd9YZot8sw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a837a-1x4v4vcfem-iq2n84ekzqew.png</image:loc><image:title>1*X4V4vCFEM-IQ2N84eKZqew</image:title></image:image><lastmod>2020-10-26T17:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/lock-and-code-s1ep18-finding-consumer-value-in-cybersecurity-awareness-month-with-jamie-court/</loc><lastmod>2020-10-26T16:26:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/experts-warn-of-privacy-risks-caused-by-link-previews-in-messaging-apps/</loc><lastmod>2020-10-26T13:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/georgia-county-voting-system-suffered-ransomware-attack/</loc><lastmod>2020-10-26T12:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/google-removed-three-kids-android-apps-for-data-collection-violations/</loc><lastmod>2020-10-26T12:47:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/decoder-an-extensible-application-for-penetration-testers-and-software-developers-to-decode-encode-data-into-various-formats/</loc><lastmod>2020-10-26T12:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/26/google-patches-actively-exploited-zero-day-bug-that-affects-chrome-users/</loc><lastmod>2020-10-26T11:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/firefox-brings-site-isolation-feature-for-testing-in-nightly-builds/</loc><lastmod>2020-10-25T21:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/cobaltstrikescan-scan-files-or-process-memory-for-cobaltstrike-beacons-and-parse-their-configuration/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3ea15-cobaltstrikescan_1.png</image:loc><image:title>CobaltStrikeScan_1</image:title></image:image><lastmod>2020-10-25T21:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/secure-network-monitoring-with-elastic%e2%80%8a-%e2%80%8apacketbeat-suricata/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a4e70-1poxrrzdzaelrrp9c3zqloq.jpeg</image:loc><image:title>1*poXRRZdZAElrrP9C3ZQLoQ</image:title></image:image><lastmod>2020-10-25T18:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/accidental-observation-to-critical-idor-2/</loc><lastmod>2020-10-25T18:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/latest-google-chrome-update-addressed-actively-exploited-zero-day/</loc><lastmod>2020-10-25T18:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/accidental-observation-to-critical-idor/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cc933-15urhjwgbsvahsfhvpenc9a.png</image:loc><image:title>1*5uRhJwgbSvaHsfhVPEnC9A</image:title></image:image><lastmod>2020-10-25T17:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/bypassing-waf-to-do-error-based-sql-injection/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/23c3a-12malulu8gpxr4kfuhtwlsw.png</image:loc><image:title>1*2MALUlU8GPXr4kFUhtwLsw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/37d98-1zje07q7cef-n9xcx3gerfg.jpeg</image:loc><image:title>1*zje07q7CEF-n9XCx3geRfg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e82ce-1pde56djhinu_ok0nzmqasq.jpeg</image:loc><image:title>1*pde56DJHiNu_OK0nzmqASQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/18e62-1zzda5wr7u6cu0uxrhzssyg.jpeg</image:loc><image:title>1*ZZDA5wR7U6Cu0UXRHzSsyg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f2fd4-1_ochp_xxzwmqscybwhe5qq.jpeg</image:loc><image:title>1*_ochp_xXzWmqScYbWHe5qQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/88c62-1txxmtjqfshsfv7oi562pdq.jpeg</image:loc><image:title>1*tXxMtjqfSHSfv7oI562PDQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9f42e-1r_52nbs2oihqbbqvrun9cg.jpeg</image:loc><image:title>1*R_52nBs2OihqbBqVruN9cg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f0bcb-1l3exw1tvmpjukue1nly8cw.jpeg</image:loc><image:title>1*L3ExW1TVMPjUKUe1nLY8Cw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7a9c9-1uc4eqksfd1t22mtqlligyg.jpeg</image:loc><image:title>1*Uc4eqKsfd1t22MTQLLIgYg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1a55a-1v27vrwprnqu0vnlcyxmadw.jpeg</image:loc><image:title>1*V27VRWpRNQu0vnlCYxmAdw</image:title></image:image><lastmod>2020-10-25T16:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/waze-app-vulnerability-could-allow-tracking-users-location/</loc><lastmod>2020-10-25T15:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/hasta-la-vista-baby/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b1f17-1zdtpoorz8prcnzpkngy1rw.png</image:loc><image:title>1*ZDtpoorZ8PrCnZPKngY1rw</image:title></image:image><lastmod>2020-10-25T14:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/my-first-bug-on-google-observation-wins/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/956e1-1iifagr2n6uk6qea5nkobbq.png</image:loc><image:title>1*iIfAgR2n6UK6Qea5NkobbQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e49a6-1lejggardidzb9exazqyuxw.png</image:loc><image:title>1*LejgGaRdidzb9EXazQYuxw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/71112-1l_d7wkue6bq0mceqvyl8uq.jpeg</image:loc><image:title>1*l_d7wKuE6bQ0McEQvyL8uQ</image:title></image:image><lastmod>2020-10-25T12:51:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/multiple-mobile-browsers-suffer-address-bar-spoofing-vulnerabilities/</loc><lastmod>2020-10-25T12:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/manuka-a-modular-osint-honeypot-for-blue-teamers/</loc><lastmod>2020-10-25T12:12:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/25/7-best-voice-chat-apps-for-gamers/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bda20-raidcall.jpg</image:loc><image:title>RaidCall</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8889e-element.jpg</image:loc><image:title>element</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0e7a1-mumble.jpg</image:loc><image:title>mumble</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b9404-best-voice-chat-apps-for-gamers.jpg</image:loc><image:title>Best-voice-chat-apps-for-gamers</image:title></image:image><lastmod>2020-10-25T08:43:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/pesidious-malware-mutation-using-reinforcement-learning-and-generative-adversarial-networks/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/08dca-pesidious_2.png</image:loc><image:title>Pesidious_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6124d-pesidious_1_pesidoius252520logo.png</image:loc><image:title>Pesidious_1_pesidoius2520logo</image:title></image:image><lastmod>2020-10-24T21:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/tryhackme-ignite-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e3264-1bwekavh6iksd3w_ygeoflw.png</image:loc><image:title>1*bWekAvH6IKsD3w_ygeofLw</image:title></image:image><lastmod>2020-10-24T20:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/google-remove-malicious-adblockers-from-web-store-for-collecting-user-data/</loc><lastmod>2020-10-24T14:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/using-a-pie-binary-as-a-shared-library%e2%80%8a-%e2%80%8ahcsc-2020-ctf-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f2da9-1t1u-i3xg9vwowjx9p4kmag.png</image:loc><image:title>1*t1U-I3xG9vwOwJX9p4kMag</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/81055-1_jlmdp3spxa2m8qmryeeea.png</image:loc><image:title>1*_JlMDP3spXa2M8qmRyeeEA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bc007-1rzstyns-zbywbkqc4zowdw.png</image:loc><image:title>1*rzStyNs-ZbYwbKQC4ZOWDw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/17c1b-1gisth-nmwjqh0lpanvuqgg.png</image:loc><image:title>1*gIsth-nMWJqH0lpanVuqGg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7f054-1pyudm2vw_sfkakuuth0wdq.png</image:loc><image:title>1*pyuDm2vW_SFkaKUuTh0WdQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/82ce4-1lu-rjki04xrwlakl3o3myw.png</image:loc><image:title>1*Lu-rjKI04xRwLaKl3o3myw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e634f-16dyvpwhpkicqguqhqr9npw.png</image:loc><image:title>1*6dyVpwHpKIcQGUQhQr9Npw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9abe8-1at7izzqsoiwsdji-xqmjaa.png</image:loc><image:title>1*AT7izzQsOIWsDji-XqMjaA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bdde6-1-ykwuqkh8hyx-vcohjbsgg.png</image:loc><image:title>1*-YkwUqkh8HYx-vCoHJbSgg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1345b-1m9wxabwhuctwyx2idyywqq.png</image:loc><image:title>1*M9WXaBWhUCtwYx2IDyyWQQ</image:title></image:image><lastmod>2020-10-24T12:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/autogadgetfs-usb-testing-made-easy/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c022b-autogadgetfs_14_agfsconsole.png</image:loc><image:title>AutoGadgetFS_14_agfsconsole</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/87d07-autogadgetfs_12_codecov.png</image:loc><image:title>AutoGadgetFS_12_codecov</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/087c7-autogadgetfs_13_selectivefuzz.png</image:loc><image:title>AutoGadgetFS_13_selectivefuzz</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/aabb4-autogadgetfs_11_devfuzzer.png</image:loc><image:title>AutoGadgetFS_11_devfuzzer</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9aff2-autogadgetfs_10_mitm.png</image:loc><image:title>AutoGadgetFS_10_mitm</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/94bdb-autogadgetfs_8_allgadgets3.png</image:loc><image:title>AutoGadgetFS_8_allgadgets3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/02054-autogadgetfs_9_allgadgets4.png</image:loc><image:title>AutoGadgetFS_9_allgadgets4</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e8717-autogadgetfs_7_allgadgets2.png</image:loc><image:title>AutoGadgetFS_7_allgadgets2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3512a-autogadgetfs_6_allgadgets.png</image:loc><image:title>AutoGadgetFS_6_allgadgets</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/934fb-autogadgetfs_1_agfslogos.png</image:loc><image:title>AutoGadgetFS_1_agfslogos</image:title></image:image><lastmod>2020-10-24T12:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/what-are-typical-payment-terms-what-are-alternative-payment-methods/</loc><lastmod>2020-10-24T11:47:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/why-you-cant-use-avast-secureline-vpn-with-netflix/</loc><lastmod>2020-10-24T11:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/6-security-tips-to-protect-your-website-from-hackers/</loc><lastmod>2020-10-24T11:47:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/qualities-to-look-for-when-buying-a-laptop/</loc><lastmod>2020-10-24T11:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/universities-back-on-iranian-hackers-radar-as-the-school-year-begins/</loc><lastmod>2020-10-24T11:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/24/top-7-types-of-software-development/</loc><lastmod>2020-10-24T11:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/23/nosqli-nosql-injection-cli-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/230ca-nosqli.png</image:loc><image:title>nosqli</image:title></image:image><lastmod>2020-10-23T21:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/23/tryhackme-rootme-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fa917-1psl_puhkrepfmdkanztgzw.png</image:loc><image:title>1*PSL_pUhKRepfMdkaNZtGZw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/147a8-1z8r5pfvlae7akp-2hvueca.png</image:loc><image:title>1*z8R5PfVlAe7AKp-2HVuEcA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1a3f6-1ifpzhmbej46p2ir0xpd-ug.png</image:loc><image:title>1*IFpzHmbeJ46p2iR0xpD-Ug</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ccddf-13ytzs0pnxdivnreynqpqka.png</image:loc><image:title>1*3yTzs0PnxdIvnreYnqpqKA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/02f10-1menhwdwlyrocmfzjxpc2yg.png</image:loc><image:title>1*MenhwDwlyrocmFzjXpc2Yg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/82464-1apzr_ohep7n6qotgalzncq.png</image:loc><image:title>1*APzR_OHeP7N6QotgALzNcQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/96d6e-1jg-oqhovbhsuny_3kgky_q.png</image:loc><image:title>1*JG-oQHoVBhsUNY_3KgKY_Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a41c3-19ggdairqhjdkgthygbjhig.png</image:loc><image:title>1*9GgdAIrqHjdkGthYGbJhig</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/645d8-1hvgym2h8roi8bygelc4fqa.png</image:loc><image:title>1*hvgYm2h8roI8BygElc4fQA</image:title></image:image><lastmod>2020-10-23T18:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/23/gitdorker-a-tool-to-scrape-secrets-from-github-through-usage-of-a-large-repository-of-dorks/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9cb3e-gitdorker_3.png</image:loc><image:title>GitDorker_3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/07b3f-gitdorker_2_gitdorker252520help.png</image:loc><image:title>GitDorker_2_GitDorker2520Help</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b9445-gitdorker_1_gitdorker.png</image:loc><image:title>GitDorker_1_GitDorker</image:title></image:image><lastmod>2020-10-23T12:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/23/new-framework-released-to-protect-machine-learning-systems-from-adversarial-attacks/</loc><lastmod>2020-10-23T11:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/oregami-ida-plugins-and-scripts-for-analyzing-register-usage-frame/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d7838-oregami_1_oregami.gif</image:loc><image:title>oregami_1_oregami</image:title></image:image><lastmod>2020-10-22T22:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/tryhackme-madness-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/52160-1fvpvrmxsbdoa67axbibyjg.png</image:loc><image:title>1*FVpVRmXsBdoA67aXbIbYjg</image:title></image:image><lastmod>2020-10-22T18:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/the-value-of-cybersecurity-integration-for-msps/</loc><lastmod>2020-10-22T16:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/phantom-attack-bluffs-self-driving-cars-by-displaying-simulated-objects/</loc><lastmod>2020-10-22T15:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/ti-woocommerce-wishlist-wp-plugin-flaw-could-allow-site-takeovers/</loc><lastmod>2020-10-22T15:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/ntlmrawunhide-a-python3-script-designed-to-parse-network-packet-capture-files-and-extract-ntlmv2-hashes-in-a-crackable-format/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5528d-ntlm.png</image:loc><image:title>ntlm</image:title></image:image><lastmod>2020-10-22T12:13:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/tiktok-launches-bug-bounty-program-as-it-partners-with-hackerone/</loc><lastmod>2020-10-22T09:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/10-best-modded-games-for-android/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/72e02-best-modded-android-games.jpg</image:loc><image:title>Best-Modded-Android-Games</image:title></image:image><lastmod>2020-10-22T09:43:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/22/use-banner-grabbing-to-aid-in-reconnaissance-see-what-services-are-running-on-the-system/</loc><lastmod>2020-10-22T00:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/how-hackers-can-steal-information-from-computers-using-banner-grabbing/</loc><lastmod>2020-10-21T23:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/xss-to-tss-tech-support-scam-campaign-abuses-cross-site-scripting-vulnerability/</loc><lastmod>2020-10-21T21:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/malwaresourcecode-collection-of-malware-source-code-for-a-variety-of-platforms-in-an-array-of-different-programming-languages/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/89c46-malwaresourcecode_1_logo.png</image:loc><image:title>MalwareSourceCode_1_logo</image:title></image:image><lastmod>2020-10-21T21:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/htb-blunder-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cfe44-1k1vwamh91w38bv7bfpawkw.png</image:loc><image:title>1*K1VwAMH91W38Bv7bfpaWkw</image:title></image:image><lastmod>2020-10-21T17:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/new-chrome-0-day-under-active-attacks-update-your-browser-now/</loc><lastmod>2020-10-21T17:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/microsoft-released-out-of-band-fixes-for-two-remote-code-execution-bugs/</loc><lastmod>2020-10-21T12:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/pwndoc-pentest-report-generator/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/67a4e-3_create_and_update_finding.gif</image:loc><image:title>3_create_and_update_finding</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/25fb3-1_shared_audit_demo.gif</image:loc><image:title>1_shared_audit_demo</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/10c9d-1_shared_audit_demo.gif</image:loc><image:title>1_shared_audit_demo</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f68fa-2_audit_finding_demo.gif</image:loc><image:title>2_audit_finding_demo</image:title></image:image><lastmod>2020-10-21T12:13:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/multiple-vulnerabilities-in-discord-desktop-app-could-allow-rce-attacks/</loc><lastmod>2020-10-21T10:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/dell-laptops-with-amazing-specs-you-should-buy/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ba4a8-dell-laptops-with-amazing-specs-you-should-buy.jpg</image:loc><image:title>Dell-Laptops-with-Amazing-Specs-You-should-buy</image:title></image:image><lastmod>2020-10-21T09:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/popular-mobile-browsers-found-vulnerable-to-address-bar-spoofing-attacks/</loc><lastmod>2020-10-21T07:09:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/21/10-best-websites-to-watch-cartoons-online-for-free/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e7011-watch-cartoons-online.jpg</image:loc><image:title>watch-cartoons-online</image:title></image:image><lastmod>2020-10-21T06:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/zap-hud-the-owasp-zap-heads-up-display-hud/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9bdd4-zap-hud_10_zap-launch-browser.png</image:loc><image:title>zap-hud_10_ZAP-Launch-browser</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d00eb-zap-hud_9_toolbar_radar.png</image:loc><image:title>zap-hud_9_toolbar_radar</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c89de-hud-break.gif</image:loc><image:title>hud-break</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8972e-zap-hud_6_zap-hud-welcome-banner.png</image:loc><image:title>zap-hud_6_ZAP-HUD-Welcome-banner</image:title></image:image><lastmod>2020-10-20T21:12:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/tryhackme-basic-pentesting-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1f4b6-1wa1putobbyj468e85fbzha.png</image:loc><image:title>1*wA1PuTobbYj468E85FBzhA</image:title></image:image><lastmod>2020-10-20T15:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/windows-gravityrat-malware-now-also-targets-macos-and-android-devices/</loc><lastmod>2020-10-20T14:09:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/download-ultimate-security-for-management-presentation-template/</loc><lastmod>2020-10-20T14:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/linux-bluetooth-vulnerabilities-barnes-noble-hacked-threatwire/</loc><lastmod>2020-10-20T13:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/brute-force-attacks-increase-due-to-more-open-rdp-ports/</loc><lastmod>2020-10-20T12:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/patchchecker-web-based-check-for-windows-privesc-vulnerabilities/</loc><lastmod>2020-10-20T12:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/review-of-keepsolid-passwarden-your-ultimate-password-manager/</loc><lastmod>2020-10-20T10:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/is-your-organization-handling-secrets-securely/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/70d2f-0omgr9nxbsr85lbpl.jpg</image:loc><image:title>0*OMgR9nXBSr85LbPl</image:title></image:image><lastmod>2020-10-20T08:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/sonicwall-vpn-devices-troubled-with-critical-denial-of-service-dos-vulnerability/</loc><lastmod>2020-10-20T06:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/u-s-charges-6-russian-intelligence-officers-over-destructive-cyberattacks/</loc><lastmod>2020-10-20T06:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/malicious-npm-packages-opened-shells-on-windows-and-linux-systems/</loc><lastmod>2020-10-20T03:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/barnes-noble-went-down-following-cyber-attack/</loc><lastmod>2020-10-20T00:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/zoom-rolls-out-end-to-end-encryption-as-technical-preview/</loc><lastmod>2020-10-20T00:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/new-bleedingtooth-bluetooth-vulnerability-targets-linux/</loc><lastmod>2020-10-20T00:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/hackney-council-london-suffered-a-serious-cyber-attack/</loc><lastmod>2020-10-20T00:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/microsoft-patch-tuesday-october-comes-with-87-security-fixes/</loc><lastmod>2020-10-20T00:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/legal-firm-seyfarth-shaw-suffered-ransomware-attack/</loc><lastmod>2020-10-20T00:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/20/cyber-security-threats-in-the-cannabis-industry/</loc><lastmod>2020-10-20T00:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/tech-savvy-businesses-are-the-future-is-your-business-technology-challenged/</loc><lastmod>2020-10-19T21:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/apk-medit-memory-search-and-patch-tool-on-debuggable-apk-without-root-ndk/</loc><lastmod>2020-10-19T21:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/a-week-in-security-september-12-september-18/</loc><lastmod>2020-10-19T19:26:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/five-eyes-alliance-japan-and-india-demand-tech-firms-for-backdoor-in-end-to-end-encryption/</loc><lastmod>2020-10-19T18:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/diy-rugged-offgrid-power-pack-w-glytch/</loc><lastmod>2020-10-19T18:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/vulnerability-in-comcast-voice-remote-controller-could-allow-eavesdropping/</loc><lastmod>2020-10-19T12:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/ssj-your-everyday-linux-distribution-gone-super-saiyan/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e1367-ssj_6_ssj_ss_msf_nmap.png</image:loc><image:title>ssj_6_ssj_ss_msf_nmap</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/25ba6-ssj_5_ssj_ss_ettercap.png</image:loc><image:title>ssj_5_ssj_ss_ettercap</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3fcfe-ssj_4_ssj_ss_wireshark.png</image:loc><image:title>ssj_4_ssj_ss_wireshark</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/318b9-ssj_3_ssj_ss_burpsuite.png</image:loc><image:title>ssj_3_ssj_ss_burpsuite</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f0d10-ssj_2_ssj_ss_application_launcher.png</image:loc><image:title>ssj_2_ssj_ss_application_launcher</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/806df-ssj_1_ssj.png</image:loc><image:title>ssj_1_ssj</image:title></image:image><lastmod>2020-10-19T12:13:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/basic-fortigate-firewall-configuration-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/61eea-1um-yin_olnzksyfizbmy0q.png</image:loc><image:title>1*um-yIn_oLNzKsyfIzBmy0Q</image:title></image:image><lastmod>2020-10-19T10:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/19/ssrf-web-app-security-basics/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fd8b4-1mvqm6kt2aq-b8hl9mhhsqa.png</image:loc><image:title>1*mVQM6Kt2aq-B8Hl9mHhsqA</image:title></image:image><lastmod>2020-10-19T08:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/18/rmitaste-allows-security-professionals-to-detect-enumerate-interact-and-exploit-rmi-services-by-calling-remote-methods-with-gadgets-from-ysoseria/</loc><lastmod>2020-10-18T21:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/18/taken-takeover-aws-ips-and-have-a-working-poc-for-subdomain-takeover/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0fd1a-taken_2.png</image:loc><image:title>Taken_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5d825-taken_1.png</image:loc><image:title>Taken_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/94f34-taken_1.png</image:loc><image:title>Taken_1</image:title></image:image><lastmod>2020-10-18T12:13:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/18/breaking-down%e2%80%8a-%e2%80%8acommand-injections/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e3223-1acchg6i3ucmjf06f5e3gng.gif</image:loc><image:title>1*AcCHg6i3ucmJf06F5e3gng</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/75a42-13njjzj0y8way3ezurpa0oq.gif</image:loc><image:title>1*3nJJzj0y8Way3EZurpa0OQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/01c06-1yow_lsiisdtktxnyjwyhoa.jpeg</image:loc><image:title>1*YoW_LSiISdTKTxNyJWyHoA</image:title></image:image><lastmod>2020-10-18T11:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/18/webgoat-ssrf-2-3/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/583ec-16r1v_rqrfjbtnbxvuwk-6w.png</image:loc><image:title>1*6R1v_rqrFjbtNBXVUwK-6w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7f12e-1fbgpon6_ueixl0jh_zrkng.png</image:loc><image:title>1*FBGpon6_ueixL0jH_zrkNg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6441a-1-dnfluels7lxmqqcwsbygq.png</image:loc><image:title>1*-DNFLUELs7LXmQqcwsbYGQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/22e92-1gevry3c3df74rq_qqri2fw.png</image:loc><image:title>1*geVRy3C3df74rQ_qQri2Fw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e2b8d-1zrvlwwpsg12iq8ujkgup7a.png</image:loc><image:title>1*zRVlWWPSG12iq8UJKguP7A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/281b3-1fdyvxrytbirywxufdeoqzg.png</image:loc><image:title>1*fDYVxrytBIRyWxUFdEoqzg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3dee4-15k1bridkqks84mn8qf5rmq.png</image:loc><image:title>1*5K1bRidKQKS84mN8qF5rMQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/58da3-1l2hmezezrivoebar9_bl3w.png</image:loc><image:title>1*l2HmeZeZriVoebar9_bL3w</image:title></image:image><lastmod>2020-10-18T01:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/simple-i-p-logger-in-python/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/dd9f9-1ok1p91qbdmcuydywtned9a.png</image:loc><image:title>1*oK1P91QBDMcUyDYwtNeD9A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/12413-1oyqit1-pbfy5iscflqqp9q.gif</image:loc><image:title>1*OYQiT1-pbfY5ISCFlQqP9Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f8ad6-1w2q97_x6r5egrpzipqd-na.png</image:loc><image:title>1*w2Q97_X6R5egRPZipqD-nA</image:title></image:image><lastmod>2020-10-17T23:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/memory-analysis-for-beginners-with-volatility%e2%80%8a-%e2%80%8acoreflood-trojan-part-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/50766-1ihztx-kehnayykj6bvifua.png</image:loc><image:title>1*IHztx-keHNayYKj6bvifuA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b5985-1jfhgmiwhwcrjtkilxjn5ga.png</image:loc><image:title>1*JFhGMiWHwcrjTKilXJn5GA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3b5a2-18gfkjnx8l5yzvx-xjacb7w.png</image:loc><image:title>1*8gFkJnX8L5yZVx-xjACb7w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ae116-17s7kg6buozklwu34afkq2w.png</image:loc><image:title>1*7s7Kg6bUozkLwU34AFKQ2w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ec4e2-1rdvsw-owbwacgr-yf_ccaq.png</image:loc><image:title>1*rdVsw-owbwaCGR-Yf_cCaQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8f946-1jr7cu4lz9i-vu4lozjkevw.png</image:loc><image:title>1*Jr7cU4LZ9I-Vu4LOZJkeVw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5cc3a-1vpx8dki6h6t-11a31b_gyw.png</image:loc><image:title>1*Vpx8dKI6H6T-11a31b_gYw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0bec0-06brrhasdhgj07fgb.png</image:loc><image:title>0*6BrRHasdhGJ07fgB</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/95f05-1oervr_f28ek9nvvhhz9vfw.png</image:loc><image:title>1*oerVR_f28ek9nVvhHz9VFw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bf6d1-0klzuq-lbmcshd64u.png</image:loc><image:title>0*KLzUQ-LBmCsHD64u</image:title></image:image><lastmod>2020-10-17T21:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/tryhackme-c4ptur3-th3-fl4g-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/215eb-1bvzj7zukvazlodwsijupcg.png</image:loc><image:title>1*bVzj7ZukvAZlODWSijuPcg</image:title></image:image><lastmod>2020-10-17T21:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/simple-live-data-collection-simple-live-data-collection-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/445fc-simple-live-data-collection_1_1.png</image:loc><image:title>Simple-Live-Data-Collection_1_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/09962-simple-live-data-collection_2_2.png</image:loc><image:title>Simple-Live-Data-Collection_2_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f839c-simple-live-data-collection_3_3.png</image:loc><image:title>Simple-Live-Data-Collection_3_3</image:title></image:image><lastmod>2020-10-17T21:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/tryhackme-psycho-break-ctf-writeup-super-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5bd5b-1n7pkbrkusrnmt4c3hyoova.png</image:loc><image:title>1*n7PKbRkUsRnMt4c3hYOOvA</image:title></image:image><lastmod>2020-10-17T19:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/how-to-upgrade-a-dumb-shell-to-a-fully-interactive-shell-for-more-flexibility/</loc><lastmod>2020-10-17T17:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/thecl0n3r-tool-to-download-and-manage-your-git-repositories/</loc><lastmod>2020-10-17T12:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/malware-analysis-101%e2%80%8a-%e2%80%8aunpacking-malwares-case-study-a-fresh-emotet-sample/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8a8bb-1ctts19zqs428yxcvcqxqwq.gif</image:loc><image:title>1*ctts19zQs428yxCVCQXqwQ</image:title></image:image><lastmod>2020-10-17T08:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/disk-imaging-and-data-recovery/</loc><lastmod>2020-10-17T08:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/upgrade-a-dumb-reverse-shell-into-a-fully-functional-terminal-tutorial/</loc><lastmod>2020-10-17T00:35:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/17/harness-the-power-of-big-data-with-this-ebook-video-course-bundle/</loc><lastmod>2020-10-17T00:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/eagle-yet-another-vulnerability-scanner/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d9585-eagle.png</image:loc><image:title>Eagle</image:title></image:image><lastmod>2020-10-16T21:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/tryhackme%e2%80%8a-%e2%80%8atartarus-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/02ed9-1ysvt-mgsztmdwtb9slqewq.png</image:loc><image:title>1*ySvT-mgSzTMDWTB9slqewQ</image:title></image:image><lastmod>2020-10-16T17:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/basic-fortigate-firewall-configuration/</loc><lastmod>2020-10-16T17:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/cloudsek-ctf-walkthrough-ewyl/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c22cf-16i6n-z-q1dalwbcdzi04eq.png</image:loc><image:title>1*6I6N-Z-q1DALWBcdZI04eQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e5e58-126hrqm0ffez8v3c58xpxog.png</image:loc><image:title>1*26hRqM0fFeZ8v3c58xpxOg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ac83f-1rgcl6ie6i1axktluh5aqbq.png</image:loc><image:title>1*RGCl6IE6I1axktluh5aqbQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/682ba-1uu5_ihfq3mailwxuinov1w.png</image:loc><image:title>1*uU5_ihFq3MAilwXuInoV1w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3b7bc-1ht7vlpn6sv1cmgvd9oflww.png</image:loc><image:title>1*HT7VlpN6Sv1CMGvd9oFLWw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e38e8-1_gah-4ljirr9n6i3qqdj7a.png</image:loc><image:title>1*_gAh-4LJiRr9n6i3QqDJ7A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6d793-1n2bd5n6qymt0y6ytdwzarq.png</image:loc><image:title>1*N2Bd5N6qyMT0y6YTDWzArQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6b8b2-1ckkgpgofnse7dbzcvlz_4g.png</image:loc><image:title>1*CkkgpGOfNse7dBZCvlZ_4g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0b8cc-1c5rrxq2ahues-s2asyatca.png</image:loc><image:title>1*c5RRxq2AHuES-S2ASYATcA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0a3bf-14tptssrvdluf31ebe7hw8a.png</image:loc><image:title>1*4tPtssRvdLuF31eBe7HW8A</image:title></image:image><lastmod>2020-10-16T16:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ab4e5-1ccuhd-wqrnakepfizpvqlw.png</image:loc><image:title>1*CcUHd-WQrNAKepfIZpvQLw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/684d5-1wefatuxr4bdsocsl6e4mbq.png</image:loc><image:title>1*WeFATUXR4bdSOCSL6e4MBQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6f3ac-1lmjhy0b1_hvn2zawsdggtq.png</image:loc><image:title>1*lmjHy0b1_HVN2ZaWsdgGtQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/55b21-1kvts0aaqgcxmtv-b2qpsla.png</image:loc><image:title>1*kVts0aAQGcXmtV-B2QPSlA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6e17d-1av8fegykyanbvpysb2px_a.png</image:loc><image:title>1*av8FegyKYaNbVpysB2Px_A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/05ca9-1mivjep1d2qdjlnzul6zibg.png</image:loc><image:title>1*MiVJEp1D2QdjLNZuL6zIbg</image:title></image:image><lastmod>2020-10-16T16:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/deepfakes-and-the-2020-united-states-election-missing-in-action/</loc><lastmod>2020-10-16T15:26:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/hackbrowserdata-decrypt-passwords-cookies-history-bookmarks-from-the-browser/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c7437-hackbrowserdata.png</image:loc><image:title>HackBrowserData</image:title></image:image><lastmod>2020-10-16T12:12:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/6-mistakes-to-avoid-if-youre-trying-to-win-chicken-dinner/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e5d58-mistakes-to-avoid-when-you-are-trying-to-win-chicken-dinner.jpg</image:loc><image:title>mistakes-to-avoid-when-you-are-trying-to-win-chicken-dinner</image:title></image:image><lastmod>2020-10-16T10:43:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/some-may-call-it-a-dos-attack-i-just-tried-to-find-how-my-streamer-behaves-under-stress/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/67acb-05nn0bntckqn9rjou.jpg</image:loc><image:title>0*5nN0bntCKqn9rJou</image:title></image:image><lastmod>2020-10-16T08:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/10-best-screen-recorders-for-linux/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b6fd9-best-screen-recorders-for-linux.jpg</image:loc><image:title>Best-screen-recorders-for-Linux</image:title></image:image><lastmod>2020-10-16T08:43:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/16/google-warns-of-zero-click-bluetooth-flaws-in-linux-based-devices/</loc><lastmod>2020-10-16T08:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/protect-yourself-online-while-upping-your-internet-productivity-with-this-vpn/</loc><lastmod>2020-10-15T22:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/mail-swipe-script-to-create-temporary-email-addresses-and-receive-emails/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/91a39-mail-swipe_1.gif</image:loc><image:title>Mail-Swipe_1</image:title></image:image><lastmod>2020-10-15T21:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/tryhackme-easy-peasy-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3477e-1dlbkeazcxs90uhm1-wweta.png</image:loc><image:title>1*dlbKeAZCXS90Uhm1-WWETA</image:title></image:image><lastmod>2020-10-15T19:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/recipe-for-a-successful-phishing-campaign-part-2-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c534d-14y8ncd_erlgj87byyrr9mg.png</image:loc><image:title>1*4y8NcD_eRlgJ87bYyrr9Mg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c477d-1qx8y0s_bgzdo6ixv9t9h7q.jpeg</image:loc><image:title>1*Qx8y0s_bgzDO6IXV9t9H7Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e284c-1na5aivhqmquynqatlzmz2g.png</image:loc><image:title>1*NA5aIVhQMquYnqaTlZMZ2g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e1fc0-1rszp4so6d_p5y2e4ulkc9a.png</image:loc><image:title>1*RSZP4SO6D_P5y2E4UlkC9A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ae8d5-1spjlls1umwdnblrbpn8cqw.png</image:loc><image:title>1*SPJlLS1umwDnbLRBPN8cQw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a0e0b-1twlqjghw7qara8tmbd4qcw.png</image:loc><image:title>1*tWlQJGHw7qarA8TmBd4Qcw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9b7cb-1v338jw65qx3anxjamvs4kq.png</image:loc><image:title>1*v338Jw65qx3ANXjAMVs4kQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/15ad1-1thvwg0rorzlnum_8swuxtw.png</image:loc><image:title>1*ThVwg0RorzlnUM_8swUXtw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d78c4-1086prjcphatkt6rqsbrpag.png</image:loc><image:title>1*086prjcphATkt6rqSbrpAg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5b679-1bcbgah8wvjrr0rldcjwbnw.png</image:loc><image:title>1*BcbgaH8wvJRR0RLdcjWBnw</image:title></image:image><lastmod>2020-10-15T18:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/how-covid-fatigue-puts-your-physical-and-digital-health-in-jeopardy/</loc><lastmod>2020-10-15T15:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/qr-code-scams-are-making-a-comeback/</loc><lastmod>2020-10-15T12:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/zracker-zip-file-password-bruteforcing-utility-tool-based-on-cpu-power/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1b303-zracker.png</image:loc><image:title>zracker</image:title></image:image><lastmod>2020-10-15T12:12:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/india-witnessed-spike-in-cyber-attacks-amidst-covid-19-heres-why/</loc><lastmod>2020-10-15T07:09:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/15/how-to-discover-hidden-subdomains-on-any-website-with-subfinder/</loc><lastmod>2020-10-15T00:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/thm-owasp-juice-shop-part-1/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/748bb-15yyvyi6hkxrqcsr-mgg5za.png</image:loc><image:title>1*5YYvyI6HKXRQcSR-MGG5ZA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8ca5d-1l0toqbybzig2_6vrmebxlw.png</image:loc><image:title>1*L0TOqbYBZIG2_6VrMEbXLw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/20d5e-1biq04umy_kv_eimbp0flww.png</image:loc><image:title>1*biq04umY_KV_eIMBp0fLww</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d7ed8-1lqorj-ihdsbomw1_ljrwvw.png</image:loc><image:title>1*lQOrj-IhdSBOmW1_Ljrwvw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/862cc-1mtp2oe6z5xhkuim_lkkkeq.png</image:loc><image:title>1*MTp2oE6z5xhKuIm_LKkKeQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a95bb-1ebqznuv9e1tl2nxfyzfzvq.png</image:loc><image:title>1*eBqZnuv9E1tL2nxfyZFZvQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0c9b6-1tzwhqlpq6-byxeyjqkbtja.jpeg</image:loc><image:title>1*TzwHqlpQ6-ByXeyJQkbTjA</image:title></image:image><lastmod>2020-10-14T21:51:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/blind-union-based-sqli-with-python/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/55b3c-175nglzm2mtwu_iagzmk1hg.jpeg</image:loc><image:title>1*75nGLzm2Mtwu_IaGZmK1hg</image:title></image:image><lastmod>2020-10-14T21:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/tryhackme-bolt-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/06594-1pr3q_8mo-kuxsyhnaofyhg.png</image:loc><image:title>1*pr3Q_8mO-kuXsYHNaofYHg</image:title></image:image><lastmod>2020-10-14T21:51:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/mikrot8over-fast-exploitation-tool-for-mikrotik-routeros/</loc><lastmod>2020-10-14T21:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/null-bytes-first-livestream-with-kody-and-michael/</loc><lastmod>2020-10-14T20:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/hacking-http-cors-from-inside-out/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/07d82-1tglkblq6xatclifretzmzw.png</image:loc><image:title>1*tgLKBLQ6XAtcLIFREtZmZw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bf7d7-1rhlfu0sxzyidnd81p_7maq.png</image:loc><image:title>1*rhLfU0SXzYidnD81P_7MaQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/eca37-1zj6hkckg3yrlf8k7vvna9g.png</image:loc><image:title>1*zj6HKCKg3YRlF8k7vvnA9g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ef240-19ezxycrn8c9zihefpjwnsq.png</image:loc><image:title>1*9EzxYcrn8c9ZiHEfPjWNSQ</image:title></image:image><lastmod>2020-10-14T19:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/police-raided-german-spyware-company-finfisher-offices/</loc><lastmod>2020-10-14T18:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/fifa-21-game-scams-watch-out-for-unsporting-conduct/</loc><lastmod>2020-10-14T16:26:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/exploit-development-101%e2%80%8a-%e2%80%8abuffer-overflow-free-float-ftp/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0315d-1xhnab93eyz7gvnxyzyntia.png</image:loc><image:title>1*xHnAb93eyZ7GVnxYZYntIA</image:title></image:image><lastmod>2020-10-14T15:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/silent-librarian-apt-right-on-schedule-for-20-21-academic-year/</loc><lastmod>2020-10-14T14:26:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/fin11-hackers-spotted-using-new-techniques-in-ransomware-attacks/</loc><lastmod>2020-10-14T13:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/meduza-a-more-or-less-universal-ssl-unpinning-tool-for-ios/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/77791-meduza_1_frida-script.png</image:loc><image:title>MEDUZA_1_frida-script</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bf532-meduza_2_mitmpoxy.png</image:loc><image:title>MEDUZA_2_mitmpoxy</image:title></image:image><lastmod>2020-10-14T12:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/tyler-technologies-paid-ransomware-demand/</loc><lastmod>2020-10-14T11:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/guide-scale-or-fail-why-mssps-need-multitenant-security-solutions/</loc><lastmod>2020-10-14T11:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/microsoft-releases-patches-for-critical-windows-tcp-ip-and-other-bugs/</loc><lastmod>2020-10-14T11:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/tryhackme-lazyadmin-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/338dc-1juk1oyrolcwhv8zasj95lq.png</image:loc><image:title>1*juK1oyROLcwhv8zASj95lQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/df706-1vpqjlwksr-wf93zob8gnqq.png</image:loc><image:title>1*VPQJlWksR-WF93Zob8GnqQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d6889-1xexudmd02nrdm9zmntdt8g.png</image:loc><image:title>1*XeXUDMD02NRdM9ZMNTdT8g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/14b73-1hnkonr0sbvivhvfhgvynna.png</image:loc><image:title>1*HNKOnR0sBViVhVFHGVynnA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/97cc9-1fj7yaqq4w5eskdppdsn6sq.png</image:loc><image:title>1*FJ7YAqQ4w5EskDPPdSn6SQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4ba0a-1mnfausztsjgej0u0obmpsa.png</image:loc><image:title>1*MnFAUSztSjGeJ0U0OBMpSA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9a752-1hw_udgzwmi-a0qxv8cocda.png</image:loc><image:title>1*HW_UdGZWmi-A0qxV8CoCdA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/459b8-1-i-i0egxzbkjxatb3zxdxw.png</image:loc><image:title>1*-i-I0EgXzbkjxatb3zXdXw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1aab4-1bo2dvqs-c4utsbvux5oapa.png</image:loc><image:title>1*bO2DVqs-c4UTSBvuX5OaPA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3e5a6-19_knqpm0ls8rfx_l-e6jwg.png</image:loc><image:title>1*9_knqpM0ls8rfx_L-e6jwg</image:title></image:image><lastmod>2020-10-14T08:52:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/14/self-erasing-chips-can-potentially-help-in-detecting-product-tampering/</loc><lastmod>2020-10-14T08:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/nuubi-tools-information-ghatering-scanner-and-recon/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/009d1-nuubi_1_nuubi.png</image:loc><image:title>nuubi_1_NUUBI</image:title></image:image><lastmod>2020-10-13T21:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/recipe-for-a-successful-phishing-campaign-part-1-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/598f5-1chcewdnjyar9tirrabchcg.png</image:loc><image:title>1*chcewDNjYar9tIRRabchcg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0924f-1wex6uewrqg2bk11ujnal6q.png</image:loc><image:title>1*wex6UEwrqG2BK11UJnAL6Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a5983-1a55jkw0x4x0va85zvliyaq.png</image:loc><image:title>1*A55jkW0x4x0vA85zVLIYAQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e5467-1z1yzdgclol3firlsynfz4w.png</image:loc><image:title>1*Z1yzdgCLol3fIRlSyNfZ4w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/34f49-1ihpcn-zmwbj3f-iukk1odq.png</image:loc><image:title>1*ihPcn-zMWbj3f-iuKK1odQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bc319-1vybd9bngpurijj4tayzhxg.png</image:loc><image:title>1*vybD9BnGPURijJ4TAYZHxg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e620e-1n5vbgn52uo-zslefzx5pna.png</image:loc><image:title>1*n5VBGn52uO-zSLEfzX5pNA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/650bf-1roe2hf0ngkxzhwkn4sri2g.png</image:loc><image:title>1*Roe2HF0NgKXZhWKn4SRI2g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f5564-1th7yhk_cmfdgxh0tibdcia.png</image:loc><image:title>1*Th7yHK_CMfDGXH0tibdCiA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e9459-1rprs3ans9ssl49hj9vfwaq.png</image:loc><image:title>1*rPRS3AnS9Ssl49hj9VfwaQ</image:title></image:image><lastmod>2020-10-13T18:51:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/xxe-web-app-security-basics/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0cccb-17eqyx2pehbksqnctubpl5q.png</image:loc><image:title>1*7eQyX2peHbksQnCTUbpl5Q</image:title></image:image><lastmod>2020-10-13T17:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/damnvulnerablecryptoapp-an-app-with-really-insecure-crypto/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8c946-damnvulnerablecryptoapp_12_4.png</image:loc><image:title>DamnVulnerableCryptoApp_12_4</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e2b40-damnvulnerablecryptoapp_10_2.png</image:loc><image:title>DamnVulnerableCryptoApp_10_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b2a59-damnvulnerablecryptoapp_11_3.png</image:loc><image:title>DamnVulnerableCryptoApp_11_3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e0941-damnvulnerablecryptoapp_9_1.png</image:loc><image:title>DamnVulnerableCryptoApp_9_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/19eee-damnvulnerablecryptoapp_1_logo.png</image:loc><image:title>DamnVulnerableCryptoApp_1_logo</image:title></image:image><lastmod>2020-10-13T12:13:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/google-removed-malicious-android-apps-showing-out-of-context-ads/</loc><lastmod>2020-10-13T11:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/amazon-prime-day-8-tips-for-safer-shopping/</loc><lastmod>2020-10-13T11:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/6-ways-to-get-free-netflix-accounts/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4e15a-free-netflix-accounts.jpg</image:loc><image:title>free-netflix-accounts</image:title></image:image><lastmod>2020-10-13T08:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/microsoft-and-other-tech-companies-take-down-trickbot-botnet/</loc><lastmod>2020-10-13T08:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/13/76-knaves-out/</loc><lastmod>2020-10-13T07:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/o365enum-enumerate-valid-usernames-from-office-365-using-activesync-autodiscover-v1-or-office-com-login-page/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d085e-office2b365.jpg</image:loc><image:title>Office365</image:title></image:image><lastmod>2020-10-12T21:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/video-editor-tools-to-make-killer-youtube-videos/</loc><lastmod>2020-10-12T20:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/3d-printing-offering-solutions-to-cyber-crime/</loc><lastmod>2020-10-12T20:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/9-most-important-tips-for-cleaning-your-mac/</loc><lastmod>2020-10-12T20:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/activists-need-to-take-digital-security-seriously/</loc><lastmod>2020-10-12T20:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/tricks-that-will-keep-your-tech-in-perfect-condition/</loc><lastmod>2020-10-12T20:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/why-you-need-a-waf-first-before-considering-rasp/</loc><lastmod>2020-10-12T20:47:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/7-reasons-to-get-certified-in-cybersecurity/</loc><lastmod>2020-10-12T20:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/lock-and-code-s1ep17-journalisms-role-in-cybersecurity-with-alfred-ng-and-seth-rosenblatt/</loc><lastmod>2020-10-12T15:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/recon-using-a-questionable-source-of-information%e2%80%8a-%e2%80%8apastebin-com/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/15ed5-1mh5axiuquehf651p1xbaaa.png</image:loc><image:title>1*MH5AXIUqUEHf651P1xbAaA</image:title></image:image><lastmod>2020-10-12T12:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/new-android-ransomware-mallocker-b-triggers-upon-pressing-home-key/</loc><lastmod>2020-10-12T12:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/fix-api-ms-win-crt-runtime-l1-1-0-dll-error-when-installing-eset-internet-security/</loc><lastmod>2020-10-12T12:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/4-benefits-of-using-email-encryption/</loc><lastmod>2020-10-12T12:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/wave-share-serverless-peer-to-peer-local-file-sharing-through-sound/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/90f7e-wave-share_2_wave-share-scheme2.png</image:loc><image:title>wave-share_2_wave-share-scheme2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/81402-wave-share_2_wave-share-scheme2.png</image:loc><image:title>wave-share_2_wave-share-scheme2</image:title></image:image><lastmod>2020-10-12T12:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/a-self-service-password-reset-project-can-be-quick-win-for-it/</loc><lastmod>2020-10-12T12:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/webgoat-csrf-7-8/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/80964-1vkmdoq_lu76tyhnnzuv_qq.png</image:loc><image:title>1*VkmdOq_Lu76tYhNnZuv_QQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/97c3f-1rkr8xdiryair5jgciwlt0w.png</image:loc><image:title>1*RKR8xDiRyaIr5JGCiwLT0w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cc145-1jvsgpebfjxtywjbvxfvhrq.png</image:loc><image:title>1*jVsgPeBFJxtYWJBVXFvhrQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ac6d5-1jquqvfc-78nmpqrs7gvaia.png</image:loc><image:title>1*jqUqvfc-78nMPqRS7gVAIA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4ea55-1afq6-rix1-cwdbkfqeyqrq.png</image:loc><image:title>1*aFQ6-RIx1-CWdBKfqEYqrQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d3473-1f9c-es43_t_v-c_ucnsnfq.png</image:loc><image:title>1*f9C-es43_t_v-C_ucNsNfQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9b336-1nr8lkhvoijf5byuvztk2sq.png</image:loc><image:title>1*NR8LKhvOIjf5ByUVzTK2sQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7fd8e-18i45wv3bgilnevrru0eyea.png</image:loc><image:title>1*8i45WV3BgIlNeVRRu0EYEA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d10f2-1ogd_nir9zvx7x6txpin-rw.png</image:loc><image:title>1*ogD_NIr9zVx7X6TxpIn-Rw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/47505-1stlt0labj7djahmgeuvztg.png</image:loc><image:title>1*STlT0LABj7djaHmGeUVZTg</image:title></image:image><lastmod>2020-10-12T10:51:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/watch-out-microsoft-warns-android-users-about-a-new-ransomware/</loc><lastmod>2020-10-12T08:09:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/12/best-websites-to-find-league-of-legends-counters/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8f715-best-websites-to-find-league-of-legends-counters.jpg</image:loc><image:title>Best-Websites-To-Find-League-of-Legends-Counters</image:title></image:image><lastmod>2020-10-12T05:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/tryhackme-wgel-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/56c67-1_snkdllqi-a5a4bp8opxvq.png</image:loc><image:title>1*_SnKDlLQI-a5A4bp8opxvQ</image:title></image:image><lastmod>2020-10-11T22:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/malware-analysis-101%e2%80%8a-%e2%80%8aemotet-maldoc-a-behavioral-approach/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b0271-1zcdrhuzeu1b09orjwojssg.png</image:loc><image:title>1*zcdRHUZeu1b09ORjwoJSsg</image:title></image:image><lastmod>2020-10-11T21:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/tryhackme-pickle-rick-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0a53a-1oeqi8y1wfvkhn7mkacrwga.png</image:loc><image:title>1*oEqI8Y1wfvKhN7mkACRwGA</image:title></image:image><lastmod>2020-10-11T20:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/htb-cache-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e8c18-12hfsxtktoepmp28ysatlpw.png</image:loc><image:title>1*2hfSxTkToePmp28Ysatlpw</image:title></image:image><lastmod>2020-10-11T20:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/gitjacker-leak-git-repositories-from-misconfigured-websites/</loc><lastmod>2020-10-11T20:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/malicious-npm-packages-published-users-data-on-github-page/</loc><lastmod>2020-10-11T17:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/how-to-handle-a-data-breach-in-your-company/</loc><lastmod>2020-10-11T17:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/gitlab-fixed-elasticsearch-api-flaw-that-could-expose-private-groups/</loc><lastmod>2020-10-11T15:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/11/tryhackme-bounty-hacker-ctf-writeup-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/91d82-1cr-m_qa11rdunno6ljc1ka.png</image:loc><image:title>1*Cr-M_qa11rDuNNo6LJC1KA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/81db6-11ouimvv9mrpx_ind1k_ubq.png</image:loc><image:title>1*1OuiMVV9mrpX_INd1k_uBQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b8d5c-1bannhdnxl27ub7y0yxzdeg.png</image:loc><image:title>1*BAnNHDNXL27Ub7Y0yxZDEg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/31f91-1iyundfpw5z7ploubbv4_ia.png</image:loc><image:title>1*iYundfpW5z7pLoUBBV4_IA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0d5dd-1qdnqnmiy2lbifn5zlr1tiw.png</image:loc><image:title>1*QDNqNMIY2LBIfn5ZLr1TIw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b6e8f-1d-67cmrcl3g4kkkhte4kra.png</image:loc><image:title>1*d-67cMrcl3G4KKKHTE4KRA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/01312-123yrahtcj8dpsiduuoikfw.png</image:loc><image:title>1*23YraHTcj8dpsIDUUOiKfw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f16ed-17_kz1nl6obfxfska-ylz7w.png</image:loc><image:title>1*7_Kz1nl6ObfXFSkA-ylz7w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/717e4-16-p1i1a_3qiaoysohujvba.png</image:loc><image:title>1*6-p1i1A_3qIAOYsoHujVBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3b32b-1oixdeimzgurn_uqagxx_jq.png</image:loc><image:title>1*OixDeIMZgURn_UqagXx_JQ</image:title></image:image><lastmod>2020-10-11T09:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/a-tale-of-voip-security-testing/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/dd729-1ujovj92q38x3q38-gdgpzg.png</image:loc><image:title>1*ujOvJ92Q38X3Q38-GdGpzg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/bafdf-1kzxjkozpqc3kpkn1q2fgzw.png</image:loc><image:title>1*KzXJkOZPQc3Kpkn1q2FGzw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4da2e-1joiqbgdro6i5d-rujhhptw.png</image:loc><image:title>1*JoIqbgdRO6I5D-rujhHPtw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/24308-1dqopevy5z5wok5kk6-ccxg.png</image:loc><image:title>1*dqOPevy5z5wOk5KK6-CCXg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/16bdd-1ecdk5j0huilof6ylr0qhzg.png</image:loc><image:title>1*ecdk5J0HUilof6yLR0qHzg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/58d29-10jfl8sbergg3inpqix0qpw.png</image:loc><image:title>1*0jfl8SbERgG3InPqIX0Qpw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5f2c9-1htp72j8af7jyabilhsmq7g.png</image:loc><image:title>1*HtP72J8Af7jyAbilhsmQ7g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a4e5c-1sgokbghitqodhu9nvm8tpw.png</image:loc><image:title>1*SgoKbGhItqoDhU9NvM8tPw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/27779-0k8mejtkheuiwyowp.jpg</image:loc><image:title>0*K8MEjtKhEUIwyoWP</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/620ca-0ioz4l6ips8yjctqz.jpg</image:loc><image:title>0*iOz4l6Ips8yjCtqZ</image:title></image:image><lastmod>2020-10-10T19:51:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/server-side-request-forgery%e2%80%8a-%e2%80%8assrf-exploitation-technique/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/643be-1t4adi4bxdj5j56eer8eyqw.gif</image:loc><image:title>1*t4AdI4bXDJ5J56EeR8EYQw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e9ea9-1esqdptiifmeojeffnkafia.jpeg</image:loc><image:title>1*eSQdPTIIFMeoJeFFNKaFiA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fa6ab-0nhgluuwuzyy2dbtm.png</image:loc><image:title>0*nHGLuuWuZYY2DBTM</image:title></image:image><lastmod>2020-10-10T19:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/memory-analysis-for-beginners-with-volatility-coreflood-trojan-part-1/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7aaa1-1rjznbir24cxenxgryzbwqa.png</image:loc><image:title>1*RJZnbir24cxEnxGryZBWQA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a92f6-1qv4d2gzkd3i9hwrzc7fyfa.png</image:loc><image:title>1*qV4D2gZkD3I9hwRzc7FyFA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3ef2d-1aggwzlommuocuwd8rgeaxa.png</image:loc><image:title>1*aGGwzlommUOCuWd8RGeAXA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a5f92-1lhiwcetaxr0vm6rszvxedw.png</image:loc><image:title>1*LhIwcEtaXR0vM6rSZVXedw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7ccff-1rm5udeq9co1m_soj7e82ow.png</image:loc><image:title>1*Rm5UDEq9CO1m_Soj7e82ow</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8b4da-1l7vrzzpejhfkw3var_ivaq.png</image:loc><image:title>1*L7vrZZPEjhfkw3VAr_IVAQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/12cca-153bacszbjfg38id4upppqg.png</image:loc><image:title>1*53bAcsZBJfg38id4UPppqg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a3ba1-1cph05olsj-8-wc-zqoczja.png</image:loc><image:title>1*Cph05olSj-8-wc-ZQOCZJA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/c755f-1xsfe7id8b_4q8ygnhrqing.png</image:loc><image:title>1*XsFE7id8B_4q8YGNhRQiNg</image:title></image:image><lastmod>2020-10-10T14:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/facebook-launches-hacker-plus-loyalty-program-for-dedicated-bug-hunters/</loc><lastmod>2020-10-10T14:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/10-best-programming-languages-for-hacking/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/844c7-best-programming-languages-for-hacking.jpg</image:loc><image:title>Best-programming-languages-for-hacking</image:title></image:image><lastmod>2020-10-10T06:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/how-to-fix-msvcp140-dll-file-missing-in-pubg-lite/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/919d7-fix-msvcp40-dll-file-missing-error-pubg-lite.jpg</image:loc><image:title>fix-msvcp40-dll-file-missing-error-pubg-lite</image:title></image:image><lastmod>2020-10-10T05:43:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/10/tryhackme-rootme-ctf-walkthrough-detailed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ecff5-1dlbr_p0ubsoa3wkvzoyndw.png</image:loc><image:title>1*dLbr_P0uBSOA3WKvzoYndw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/de6cd-1ixkp7cwskib8iikjhehjpw.png</image:loc><image:title>1*IxkP7cWskib8iiKJhEhJPw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/01ef8-1feyyslkmho1nddy06syria.png</image:loc><image:title>1*feYySLKmHo1NdDy06sYriA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/838e9-1r7h1rqihsllbzn_xneingw.png</image:loc><image:title>1*r7h1rQihSlLbzn_XnEinGw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/47113-1lwkj2orgtxhsgzk52ikluq.png</image:loc><image:title>1*LwKJ2ORgtxHSgzk52iKLuQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9ba5b-14vnii43lublnebc2jv7bla.png</image:loc><image:title>1*4vNii43LUblNeBC2JV7bLA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e163b-1by_wvum8wf57euamy74ebg.png</image:loc><image:title>1*bY_wvUM8wF57euaMy74eBg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/08b47-11w2_ln8nvmch2rhu9dtlcq.png</image:loc><image:title>1*1w2_LN8NvMcH2rHU9DTLcQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/859fe-1kms13908ky9g-8hpkar50w.png</image:loc><image:title>1*kms13908KY9g-8hPKAR50w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/835bf-1hzn21ujzthqe8evghiqxbq.png</image:loc><image:title>1*hzn21UJzTHQe8evgHiQXBQ</image:title></image:image><lastmod>2020-10-10T04:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/09/nashavm-a-virtual-machine-for-net-files-and-its-runtime-was-made-in-c-cli/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9a616-net.png</image:loc><image:title>net</image:title></image:image><lastmod>2020-10-09T21:12:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/09/swiftbelt-a-macos-enumeration-tool-inspired-by-harmjoys-windows-based-seatbelt-enumeration-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/07e6d-swiftbelt_1_swiftbelt2.png</image:loc><image:title>SwiftBelt_1_swiftbelt2</image:title></image:image><lastmod>2020-10-09T12:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/09/cyberark-discover-numerous-vulnerabilities-in-popular-antivirus-solutions/</loc><lastmod>2020-10-09T11:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/09/55-new-security-flaws-reported-in-apple-software-and-services/</loc><lastmod>2020-10-09T09:09:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/09/csrf-web-app-security-basics/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0a2df-13-gms3xolxsue6gsnxqiuq.png</image:loc><image:title>1*3-gMs3XOlxsUE6gsnXqIUQ</image:title></image:image><lastmod>2020-10-09T01:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/c41n-an-automated-rogue-access-point-setup-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/2d35f-c41n_1.png</image:loc><image:title>c41n_1</image:title></image:image><lastmod>2020-10-08T21:12:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/credit-card-skimmer-targets-virtual-conference-platform/</loc><lastmod>2020-10-08T20:26:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/how-to-brute-force-ftp-credentials-get-server-access/</loc><lastmod>2020-10-08T20:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/hack-the-box-walkthrough%e2%80%8a-%e2%80%8amagic/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3e8a5-1xq4hgypug4_mmrwbrhh9kg.png</image:loc><image:title>1*xq4hgYpUG4_mMRWBRhh9kg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/28ed1-1wkxop1p5oejc8y7sajdoaa.png</image:loc><image:title>1*wKXOp1P5oEjc8y7sajDoaA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/53249-1_n1zk7jqi8slolc09hkcrw.png</image:loc><image:title>1*_n1Zk7JQI8SLoLC09hkCRw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/af044-1fu4afd2urw0ieaoae4er0w.png</image:loc><image:title>1*fU4Afd2urw0IEAOAe4er0w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/da6b4-1uymp4rd8tbtfn-een2tvaa.png</image:loc><image:title>1*uYMp4rd8TbtFn-eEn2tvaA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5578e-1wnvidggllab0ve421kwpka.png</image:loc><image:title>1*wNvIDgGLLaB0VE421KWPKA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/47350-1a5bixokfdecfahndqvi5xa.png</image:loc><image:title>1*A5biXOKfdeCfAHNDQvI5XA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/86117-1rzktgihynci4xdwpie9b1q.png</image:loc><image:title>1*RZktgihYnCI4xdWpiE9b1Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/531bd-1mlhs0tm6gij6cemgt1prnw.png</image:loc><image:title>1*mLhs0tm6GiJ6CeMgt1prnw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/939ae-1yv6zyqbzpdjuut-m-os37w.png</image:loc><image:title>1*yV6ZyqBZpDJUUt-M-OS37w</image:title></image:image><lastmod>2020-10-08T18:52:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/healthcare-security-update-death-by-ransomware-whats-next/</loc><lastmod>2020-10-08T16:26:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/code-execution-vulnerability-found-in-facebook-for-android/</loc><lastmod>2020-10-08T14:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/researchers-find-vulnerabilities-in-microsoft-azure-cloud-service/</loc><lastmod>2020-10-08T14:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/vprioritizer-tool-to-understand-the-contextualized-risk-vprisk-on-asset-vulnerability-relationship-level-across-the-organization/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/53c71-vprioritizer_1_vprioritizer_logo.png</image:loc><image:title>vPrioritizer_1_vprioritizer_logo</image:title></image:image><lastmod>2020-10-08T12:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/un-maritime-agency-suffered-cyber-attack-disrupting-its-web-based-services/</loc><lastmod>2020-10-08T11:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/155-10-effective-ways-to-leverage-instagram-for-real-estate-marketing/</loc><lastmod>2020-10-08T11:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/3-types-of-threat-actors-an-email-validation-service-can-detect/</loc><lastmod>2020-10-08T11:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/best-things-your-kid-needs-for-comfortable-video-games-playing/</loc><lastmod>2020-10-08T11:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/cybersecurity-in-the-new-normal-how-businesses-will-have-to-realign/</loc><lastmod>2020-10-08T11:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/how-to-increase-your-pc-ram-using-pendrive/</loc><lastmod>2020-10-08T05:20:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/brute-forcing-ftp-credentials-for-server-access-tutorial/</loc><lastmod>2020-10-08T01:35:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/learn-to-code-for-work-or-play-with-this-informative-fun-bundle/</loc><lastmod>2020-10-08T01:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/how-to-use-gtfo-to-search-for-abusable-binaries-during-post-exploitation-2/</loc><lastmod>2020-10-08T01:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/08/how-to-use-gtfo-to-search-for-abusable-binaries-during-post-exploitation/</loc><lastmod>2020-10-08T00:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/vulnerabilities-found-in-post-grid-and-team-showcase-wordpress-plugins/</loc><lastmod>2020-10-07T21:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/csrfer-tool-to-generate-csrf-payloads-based-on-vulnerable-requests/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0f055-csrfer.png</image:loc><image:title>CSRFER</image:title></image:image><lastmod>2020-10-07T21:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/risky-business-survey-shows-majority-of-people-use-work-devices-for-personal-use/</loc><lastmod>2020-10-07T16:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/a-handy-guide-for-choosing-a-managed-detection-response-mdr-service/</loc><lastmod>2020-10-07T13:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/ghunt-investigate-google-accounts-with-emai/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/690d4-ghunt_3.png</image:loc><image:title>GHunt_3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/5f6db-ghunt_2.png</image:loc><image:title>GHunt_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fa9c7-ghunt_1.png</image:loc><image:title>GHunt_1</image:title></image:image><lastmod>2020-10-07T12:16:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/silentfade-malware-executed-ad-fraud-on-facebook-since-2016/</loc><lastmod>2020-10-07T11:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/alert-hackers-targeting-iot-devices-with-a-new-p2p-botnet-malware/</loc><lastmod>2020-10-07T10:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/tryhackme-the-impossible-challenge-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/62d21-1xmdbevnokkx_gfl2dezqia.png</image:loc><image:title>1*xMdbevNOKkx_gFL2DeZqiA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/f0ce5-183oztjjjamxde7momwotxw.png</image:loc><image:title>1*83ozTJJjAMXdE7MOmWotXw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0e373-1aapufzxwd8kdpxeoqxxzvw.png</image:loc><image:title>1*aApuFZXwd8KdpxEoqxxzvw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e12ac-1hxgvtsbkgkef2nk61m1w4q.png</image:loc><image:title>1*hXgvTSBkGKeF2nk61m1W4Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/dbdf5-1fhb48achioagctbrxjktlg.png</image:loc><image:title>1*fhB48aCHiOAGctbrXjkTLg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6198a-1xzm83bkq6jd3l1c0dalbrw.png</image:loc><image:title>1*XZm83BkQ6Jd3L1C0dALBrw</image:title></image:image><lastmod>2020-10-07T09:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/07/offering-users-more-for-their-activity-similar-items-upon-checkout/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3a2c2-ecommerce-related.jpg</image:loc><image:title>ecommerce-related</image:title></image:image><lastmod>2020-10-07T02:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/lockphish-the-first-tool-for-phishing-attacks-on-the-lock-screen-designed-to-grab-windows-credentials-android-pin-and-iphone-passcode/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ddfbb-lockphish.png</image:loc><image:title>Lockphish</image:title></image:image><lastmod>2020-10-06T21:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/pay-a-ransom-for-ransomware-pay-a-penalty-too-threatwire/</loc><lastmod>2020-10-06T18:09:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/release-the-kraken-fileless-apt-attack-abuses-windows-error-reporting-service/</loc><lastmod>2020-10-06T15:28:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/hp-printer-bug-bounty-expands-to-include-cartridge-security/</loc><lastmod>2020-10-06T14:49:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/iotmap-research-project-on-heterogeneous-iot-protocols-modelling/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/da891-iotmap_1_application-graph.png</image:loc><image:title>iotmap_1_application-graph</image:title></image:image><lastmod>2020-10-06T12:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/google-launched-android-partner-vulnerability-initiative-covering-third-party-oems/</loc><lastmod>2020-10-06T11:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/a-good-bitcoin-resource/</loc><lastmod>2020-10-06T11:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/the-beginning-of-the-bitcoin-revolution/</loc><lastmod>2020-10-06T11:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/06/new-mosaicregressor-uefi-bootkit-malware-found-active-in-the-wild/</loc><lastmod>2020-10-06T09:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/mobile-network-operator-falls-into-the-hands-of-fullz-house-criminal-group/</loc><lastmod>2020-10-05T21:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/kube-score-kubernetes-object-analysis-with-recommendations-for-improved-reliability-and-security/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/83374-kube-score_8.png</image:loc><image:title>kube-score_8</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/70c70-kube-score_1.png</image:loc><image:title>kube-score_1</image:title></image:image><lastmod>2020-10-05T21:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/cloudflare-rolls-out-privacy-focused-web-analytics-at-no-cost/</loc><lastmod>2020-10-05T17:48:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/netwalker-dumped-data-stolen-from-k-electric-online-upon-not-receiving-the-ransom/</loc><lastmod>2020-10-05T17:48:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/msoffice-365-phishing-campaign-uses-captchas-to-evade-security-checks/</loc><lastmod>2020-10-05T17:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/a-week-in-security-september-28-october-4/</loc><lastmod>2020-10-05T17:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/secure-your-saas-apps-with-security-posture-management-platform/</loc><lastmod>2020-10-05T15:09:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/cloudflare-launch-free-api-security-tool-api-shield/</loc><lastmod>2020-10-05T14:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/new-flaws-in-top-antivirus-software-could-make-computers-more-vulnerable/</loc><lastmod>2020-10-05T14:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/3-critical-weak-points-of-most-encrypted-email-services/</loc><lastmod>2020-10-05T12:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/screen_killer-tool-to-track-progress-for-reporting-capture-screenshot-commands-and-outputs-during-pentest-engagement-and-oscp/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e1975-screen_killer_2_sck.png</image:loc><image:title>SCREEN_KILLER_2_sck</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/748aa-screen_killer_1_scrk.png</image:loc><image:title>SCREEN_KILLER_1_scrk</image:title></image:image><lastmod>2020-10-05T12:13:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/6-surefire-tips-to-keep-your-smartphone-secure-from-hackers/</loc><lastmod>2020-10-05T09:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/05/open-redirects-bypassing-csrf-validations-simplified/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e103e-1bevkis-c33vdazvrhodoqg.jpeg</image:loc><image:title>1*BEvkiS-c33VDazvRhodOqg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0520c-1ynrgpdcu3ut_3abdjswslg.gif</image:loc><image:title>1*yNRGpdCU3ut_3AbDJSwSLg</image:title></image:image><lastmod>2020-10-05T03:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/04/offport_killer-this-tool-aims-at-automating-the-identification-of-potential-service-running-behind-ports-identified-manually-either-through-manual-scan-or-services-running-locally/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/ef3f5-offport_killer_2_screen-output.png</image:loc><image:title>OFFPORT_KILLER_2_screen-output</image:title></image:image><lastmod>2020-10-04T21:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/04/beware-of-this-windows-7-end-of-support-phishing-campaign/</loc><lastmod>2020-10-04T15:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/04/advphishing-this-is-advance-phishing-tool-otp-phishing/</loc><lastmod>2020-10-04T13:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/04/leveraging-lfi-to-rce-in-a-website-with-20000-users/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cf238-1hgdkcur9h90lbjfyqsdsmw.jpeg</image:loc><image:title>1*HGDKCUr9H90lBJFYqsdsmw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1a84d-1ngntzfos2frgau1fo9cfxa.jpeg</image:loc><image:title>1*NgNTZfoS2FRgau1fo9cfXA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/92361-1zmz-0wwie-lufsiuttv_oa.jpeg</image:loc><image:title>1*zmz-0wwIE-LUFsIuTTV_OA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d0e33-1fmd1oa_tnsy526j6wmmrig.jpeg</image:loc><image:title>1*fmd1oa_tnSy526j6WMmrig</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d6a4b-1qm5uq8e8jjxe3t7l2cetpq.jpeg</image:loc><image:title>1*qm5Uq8E8jJXe3T7L2CeTPQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d0fe6-13suekx6i9m8ozqvei7qcjg.jpeg</image:loc><image:title>1*3SuEkX6I9M8OzqVeI7qcjg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6ec2c-1zynj6j5e8jvpzxforzdugq.jpeg</image:loc><image:title>1*zynj6J5e8JVPZXFOrZDuGQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/cf704-1f_jjflwjejxi1yibn9hqiq.jpeg</image:loc><image:title>1*F_JJfLWjeJxi1yIBn9hQiQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3c007-1x5_eli1gtju5p7qnl5xlea.jpeg</image:loc><image:title>1*X5_elI1GtjU5P7QNl5xLeA</image:title></image:image><lastmod>2020-10-04T12:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/04/10-best-free-video-editing-software-for-linux/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8d3d9-best-free-video-editing-software-linux.jpg</image:loc><image:title>Best-free-video-editing-software-linux</image:title></image:image><lastmod>2020-10-04T11:43:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/03/timewarrior-commandline-time-reporting/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d8aaa-timewarrior.png</image:loc><image:title>timewarrior</image:title></image:image><lastmod>2020-10-03T21:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/03/hack-the-box%e2%80%8a-%e2%80%8ablackfield/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a2640-11l2sqpz7plwplqfkroogua.png</image:loc><image:title>1*1l2Sqpz7plwplqFKROOGuA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/2ebf7-17xilawp8ljso3wjfc-xvdq.png</image:loc><image:title>1*7xIlaWp8ljSo3wjfC-XvdQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/929ed-1hagydik16lhhyykkuayqgw.png</image:loc><image:title>1*hAGYdiK16LhhyyKKuAyQGw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/40c18-1rmhz8a-cllcsphnkukwria.png</image:loc><image:title>1*rMHZ8a-ClLCsPHnkukWRiA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/67556-1hid7zcmc_fyhmzueeoflmq.png</image:loc><image:title>1*HiD7Zcmc_FYHMZUEeoFlmQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/aee34-1pxpqwuryxfvse4osuhctjq.png</image:loc><image:title>1*pxPQwuRYXFvse4OSuHctJQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/20318-150ivbigqa3_i9kstx03xtg.png</image:loc><image:title>1*50ivBigqa3_I9Kstx03xTg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9aee6-1wkijtwtm9cuvvnvmv4wrra.png</image:loc><image:title>1*wKiJtwTm9cUVVnvMv4wRrA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/98ac6-1hr70zseexnzpspgxb6psqq.png</image:loc><image:title>1*HR70zSEExnzpspgXb6pSqQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/6eeae-14c1_m6qapi5rhylnfgfgjq.png</image:loc><image:title>1*4c1_M6QapI5rHYLnfGfgjQ</image:title></image:image><lastmod>2020-10-03T18:52:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/03/as-rep-roast-attack-for-disabled-kerberos-pre-authentication-accounts/</loc><lastmod>2020-10-03T18:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/03/asnap-tool-to-render-recon-phase-easier-by-providing-updated-data-about-which-companies-owns-which-ipv4-or-ipv6-addresses/</loc><lastmod>2020-10-03T12:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/pentester-lab-pro-subscription-giveaway/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9a4ca-1xshyjv_gpwyig4rpwq3utw.jpeg</image:loc><image:title>1*XSHyjv_gpwyIg4rpWQ3utw</image:title></image:image><lastmod>2020-10-02T21:51:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/urideep-unicode-encoding-attacks-with-machine-learning/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/464d9-urideep.png</image:loc><image:title>uriDeep</image:title></image:image><lastmod>2020-10-02T21:12:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/videobytes-ransomware-gets-wasted/</loc><lastmod>2020-10-02T17:26:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/increasing-xss-impact-using-xsscope/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/765e5-1yzazg0ko4vnpc3bot4qcow.png</image:loc><image:title>1*YZAzg0Ko4vnpC3bot4QCow</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/30b7d-1q4pmekbw5uwdjzssdxgshg.png</image:loc><image:title>1*Q4PMEkbw5UWDjzsSDXGshg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/9bbab-1nictuhqy0dgwdttffypi1a.png</image:loc><image:title>1*nICtUHQy0dgWdTTfFYpi1A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fa54e-1dtdppk0l2f4rtthuapopeg.png</image:loc><image:title>1*dtdpPK0l2f4RTThUaPopeg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e7afe-1msz9801qi97amxw-nbhghg.png</image:loc><image:title>1*MSZ9801Qi97aMxW-nBhGHg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/2c837-1gpdsac569oovhulukjkfla.png</image:loc><image:title>1*gpDsAC569OOvHulukjKfLA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7cc63-1e6caajy5l7qq6lqk8ivlfw.png</image:loc><image:title>1*E6caAJy5L7QQ6LQk8Ivlfw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/4aa11-1vtvtsngbjxuq3v6yt5v50g.jpeg</image:loc><image:title>1*VtVtsngBjXUQ3V6YT5v50g</image:title></image:image><lastmod>2020-10-02T13:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/hp-device-manager-backdoor-could-allow-privilege-escalation-to-remote-attackers/</loc><lastmod>2020-10-02T12:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/prototype-pollution-vulnerability-indirectly-affected-hackerone-platform/</loc><lastmod>2020-10-02T12:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/smbautorelay-provides-the-automation-of-smb-ntlm-relay-technique-for-pentesting-and-red-teaming-exercises-in-active-directory-environments/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/e3d75-smbautorelay_1_helppanel.png</image:loc><image:title>smbAutoRelay_1_helppanel</image:title></image:image><lastmod>2020-10-02T12:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/02/researchers-fingerprint-exploit-developers-who-help-several-malware-authors/</loc><lastmod>2020-10-02T10:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/explore-data-analysis-deep-learning-with-this-40-training-bundle/</loc><lastmod>2020-10-01T22:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/powerglot-encodes-offensive-powershell-scripts-using-polyglots/</loc><lastmod>2020-10-01T21:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/how-to-escape-restricted-shell-environments-on-linux/</loc><lastmod>2020-10-01T20:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/exploiting-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part-2-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/7f950-1ke8gqhg2frcdx47r8qqs-w.png</image:loc><image:title>1*Ke8gQHG2frCDX47R8QQs-w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/fdc7e-1l2nrsj5kdzr6bsbintqkba.png</image:loc><image:title>1*l2NrSj5kdZR6bsBintqKBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/846c0-1_qyli35inp71n1qxygafyq.png</image:loc><image:title>1*_QylI35inP71n1QxyGAFYQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/d315f-1jyjot0ocjz2iouvq5gnmrq.png</image:loc><image:title>1*JyJOt0oCjZ2iouvq5GNMRQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/1c261-1hzmxwkqvnewixvjkf7mcvg.png</image:loc><image:title>1*HZMxwKqvnEWiXVjKf7MCvg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/a4126-1yz2md-bb5duyq_dqsxvtya.png</image:loc><image:title>1*yz2MD-bB5DUYQ_DqSxVTyA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/3ba80-1pzsvvmj9wsel1skupoo10q.png</image:loc><image:title>1*PZsVvmJ9WSEl1sKupoo10Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/409a6-1s1fjlyp078p58lvg-fakjg.png</image:loc><image:title>1*s1fJLyp078P58LVg-FAKJg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/0466f-1sj9zslp-wit9c5ucv2x_qa.png</image:loc><image:title>1*sJ9zSlP-wIt9c5UCv2X_QA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/b76db-1ddwluwb3zpuft9n8kwsgba.png</image:loc><image:title>1*DDwlUWb3zpuft9n8kWSGbA</image:title></image:image><lastmod>2020-10-01T19:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/chaos-in-a-cup-when-ransomware-creeps-into-your-smart-coffee-maker/</loc><lastmod>2020-10-01T17:26:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/videobytes-twitter-gets-hacked/</loc><lastmod>2020-10-01T16:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/real-time-flight-tracking-services-suffered-cyber-attack/</loc><lastmod>2020-10-01T15:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/pastego-scrape-parse-pastebin-using-go-and-expression-grammar-peg/</loc><lastmod>2020-10-01T12:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/beware-new-android-spyware-found-posing-as-telegram-and-threema-apps/</loc><lastmod>2020-10-01T11:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/researcher-creates-ransomware-attack-that-can-target-smart-coffee-makers/</loc><lastmod>2020-10-01T10:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/top-3-hellospy-monitoring-features-2/</loc><lastmod>2020-10-01T10:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/russian-who-hacked-linkedin-dropbox-sentenced-to-7-years-in-prison/</loc><lastmod>2020-10-01T10:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/critical-flaws-discovered-in-popular-industrial-remote-access-systems/</loc><lastmod>2020-10-01T10:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/top-3-hellospy-monitoring-features/</loc><lastmod>2020-10-01T09:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/10/01/best-social-media-apps-of-all-time/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/10/8a922-best-social-media-apps.jpg</image:loc><image:title>Best-social-media-apps</image:title></image:image><lastmod>2020-10-01T04:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/h2csmuggler-http-request-smuggling-over-http-2-cleartext-h2c/</loc><lastmod>2020-09-30T21:12:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/cisco-issues-patches-for-2-high-severity-ios-xr-flaws-under-active-attacks/</loc><lastmod>2020-09-30T17:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/introducing-videobytes-by-malwarebytes-labs/</loc><lastmod>2020-09-30T16:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/vulnerability-in-medium-partner-program-could-allow-siphoning-writers-earnings/</loc><lastmod>2020-09-30T15:48:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/french-logistics-giant-cma-cgm-group-went-offline-following-malware-attack/</loc><lastmod>2020-09-30T15:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/uhs-hospital-network-suffered-ransomware-attack/</loc><lastmod>2020-09-30T15:48:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/fortinet-vpn-flaw-exposes-200k-businesses-to-mitm-attacks/</loc><lastmod>2020-09-30T15:48:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/google-removed-17-android-apps-with-joker-malware-from-play-store/</loc><lastmod>2020-09-30T15:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/kucoin-cryptocurrency-exchange-hacked-losing-150m-worth-of-crypto/</loc><lastmod>2020-09-30T15:47:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/pastebin-introduce-new-security-features-burn-after-read-and-password-protected-pastes/</loc><lastmod>2020-09-30T15:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/airbnb-exposed-private-inboxes-to-unrelated-accounts-due-to-technical-glitch/</loc><lastmod>2020-09-30T15:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/cisco-addressed-numerous-bugs-in-ios-and-ios-xe-with-september-update-bundle/</loc><lastmod>2020-09-30T15:47:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/cisa-disclosed-malware-attack-on-a-federal-agency-network/</loc><lastmod>2020-09-30T15:47:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/mapcidr-small-utility-program-to-perform-multiple-operations-for-a-given-subnet-cidr-ranges/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ed859-mapcidr_7_mapcidr-run.png</image:loc><image:title>mapcidr_7_mapCIDR-run</image:title></image:image><lastmod>2020-09-30T12:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/more-apps-running-hiddenads-campaign-found-on-app-store-and-play-store/</loc><lastmod>2020-09-30T11:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/chinese-apt-group-targets-media-finance-and-electronics-sectors/</loc><lastmod>2020-09-30T10:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/how-to-analyze-web-browser-extensions-for-possible-malware-other-malicious-activity/</loc><lastmod>2020-09-30T02:12:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/30/use-extanalysis-for-browser-extension-analysis-tutorial/</loc><lastmod>2020-09-30T00:35:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/lil-pwny-auditing-active-directory-passwords-using-multiprocessing-in-python/</loc><lastmod>2020-09-29T21:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/exploiting-fine-grained-aws-iam-permissions-for-total-cloud-compromise-a-real-world-example-part/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a0b6b-1rbj4oeusyfymranftj3k2g.png</image:loc><image:title>1*RBj4OEuSYFyMranfTJ3K2g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/36118-1weo5ahar9ctgejzabsijha.png</image:loc><image:title>1*wEo5aHAr9CTgEJZabSiJHA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a0a12-1sxhpuxz9t46zvkfg_uxhrq.png</image:loc><image:title>1*sXhpuxz9T46zvkfg_UXhrQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5f80b-1dblbsi6dk5vhus4e0hvgoa.png</image:loc><image:title>1*DblBSi6dK5VHUS4E0HvgoA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c12dd-1mxvdhjaisuyavcrqbsnawg.png</image:loc><image:title>1*MxvDHjaIsuYAvCRQbsnawg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/65956-1dqrfkdezvjtac4bxjcihlw.png</image:loc><image:title>1*DQrFKDEzVjTAC4BxjCihlw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4008a-1j0lkf79cq8l98ix_yer4ea.png</image:loc><image:title>1*J0LKF79Cq8L98IX_YER4EA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ec1fd-1-s3ku6lvlqgg6odcrtxq8w.png</image:loc><image:title>1*-s3KU6LvLqGg6oDCrTxq8w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/48957-1lrupjf3ce08bz3fgszng1a.png</image:loc><image:title>1*LRupJF3CE08Bz3FGszNg1A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/daff9-1_prdp62qegv0d8wlg-s23a.png</image:loc><image:title>1*_Prdp62QEGv0D8wLg-S23A</image:title></image:image><lastmod>2020-09-29T19:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/jailbreaking-ios-without-a-mac-1-4-the-plan/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/56b2f-1pmu3mxog0ka5o9zwrumxjq.png</image:loc><image:title>1*pmu3Mxog0ka5o9zwRumxJQ</image:title></image:image><lastmod>2020-09-29T19:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/how-attackers-hacked-the-feds-with-vpn-vulnerabilities-threatwire/</loc><lastmod>2020-09-29T19:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/live-webinar-on-zerologon-vulnerability-technical-analysis-and-detection/</loc><lastmod>2020-09-29T18:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/caught-in-the-payment-fraud-net-when-not-if/</loc><lastmod>2020-09-29T17:26:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/government-software-provider-tyler-technologies-suffered-ransomware-attack/</loc><lastmod>2020-09-29T14:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/polypyus-learns-to-locate-functions-in-raw-binaries-by-extracting-known-functions-from-similar-binaries/</loc><lastmod>2020-09-29T13:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/critical-instagram-app-rce-flaw-could-threaten-android-and-ios-devices/</loc><lastmod>2020-09-29T11:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/exploiting-ssrf-for-admin-access/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c39ae-1oksdn4nvzki54yi10leqeg.png</image:loc><image:title>1*oksdn4nvZKI54YI10lEqeg</image:title></image:image><lastmod>2020-09-29T10:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/teenager-awarded-25k-bounty-for-finding-stored-xss-in-instagram-spark-ar/</loc><lastmod>2020-09-29T08:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/75-compromised-comms/</loc><lastmod>2020-09-29T07:27:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/29/taking-down-the-sso-account-takeover-in-3-websites-of-kolesa-due-to-insecure-jsonp-call/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2a43e-1z-ra2t3ipapbkjhyntqvkq.png</image:loc><image:title>1*z-ra2t3iPapbkjHYNtqVkQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b2747-1cy3q97xvz1vghrupkmekkq.png</image:loc><image:title>1*CY3q97xvz1VGhrupKmeKKQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ae35e-16yybvmixhizwlxavj-ytig.png</image:loc><image:title>1*6YYBvMixHizWLXavj-YTIg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/75ef9-1aoniqes5vfieq6xqw5sw6a.png</image:loc><image:title>1*AOnIQeS5vfIeq6Xqw5sW6A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cfd10-1ql-t9bbstjhsy0k6rc98yq.png</image:loc><image:title>1*Ql-t9BBStjHSY0k6rc98yQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3ff79-1nqcznvilvcaemo0fcwuxsq.png</image:loc><image:title>1*NQCZnViLVcaeMO0FCWuxsQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8582a-0ymzdpezgc1agw8d8.png</image:loc><image:title>0*YMZdPeZgC1agW8D8</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5707d-1y66hjfihe29_fmsqjiqqqa.png</image:loc><image:title>1*y66HjfihE29_fMSQjIQqQA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/37fc1-1eybzlorqlkjha9wfwbogmw.png</image:loc><image:title>1*eyBzLorQLkJha9WFwBoGMw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c1798-0r46xubuecwg82nak.png</image:loc><image:title>0*R46XUbUECwg82nAk</image:title></image:image><lastmod>2020-09-29T00:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/htb-admirer-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c882c-1wh-r4b8iandugwjpuczupq.png</image:loc><image:title>1*wH-r4b8ianduGWjPucZUpQ</image:title></image:image><lastmod>2020-09-28T23:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/nerve-network-exploitation-reconnaissance-vulnerability-engine/</loc><lastmod>2020-09-28T21:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/how-businesses-can-maximize-the-value-of-data-analytics/</loc><lastmod>2020-09-28T17:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/data-security-trends-for-2020/</loc><lastmod>2020-09-28T17:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/how-to-get-more-sales-leads-on-linkedin-for-your-business/</loc><lastmod>2020-09-28T17:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/how-can-parents-monitor-snapchat-conversations/</loc><lastmod>2020-09-28T17:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/why-accuracy-and-facial-recognition-go-hand-in-hand/</loc><lastmod>2020-09-28T17:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/lock-and-code-s1ep15-investigating-digital-vulnerabilities-in-our-physical-world-with-samy-kamkar/</loc><lastmod>2020-09-28T16:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/cerberus-out-alien-malware-in-new-android-banking-trojan-has-arrived/</loc><lastmod>2020-09-28T14:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/researchers-uncover-cyber-espionage-operation-aimed-at-indian-army/</loc><lastmod>2020-09-28T14:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/cooolis-ms-a-server-that-supports-the-metasploit-framework-rpc/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/23535-cooolis-ms_5_2020-08-05-11-57-03.png</image:loc><image:title>Cooolis-ms_5_2020-08-05-11-57-03</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5cf3c-cooolis-ms_6_2020-08-05-12-08-07.png</image:loc><image:title>Cooolis-ms_6_2020-08-05-12-08-07</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ad1c8-cooolis-ms_3_2020-08-05-11-53-35.png</image:loc><image:title>Cooolis-ms_3_2020-08-05-11-53-35</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/49eec-cooolis-ms_4_2020-08-05-11-54-24.png</image:loc><image:title>Cooolis-ms_4_2020-08-05-11-54-24</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/7b53c-cooolis-ms_1_view-1.png</image:loc><image:title>Cooolis-ms_1_view-1</image:title></image:image><lastmod>2020-09-28T12:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/red-team-automation-or-simulation/</loc><lastmod>2020-09-28T12:09:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/twitter-warns-developers-of-a-potential-api-key-leak-due-to-glitch/</loc><lastmod>2020-09-28T11:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/28/tiktok-glitch-allows-multi-factor-authentication-bypass-no-patch-available-yet/</loc><lastmod>2020-09-28T11:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/27/pwnedpasswordschecker-search-offline-if-your-password-ntlm-or-sha1-format-has-been-leaked-hibp-passwords-list-v5/</loc><lastmod>2020-09-27T22:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/27/privilege-escalation-via-account-takeover-on-nodebb-forum-software-512/</loc><lastmod>2020-09-27T13:51:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/27/wacker-a-wpa3-dictionary-cracker/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/85d61-wpa3_hack.jpg</image:loc><image:title>wpa3_hack</image:title></image:image><lastmod>2020-09-27T12:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/27/indian-covid-19-surveillance-app-left-data-of-millions-of-people-exposed-online/</loc><lastmod>2020-09-27T10:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/hacking-the-medium-partner-program/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/50367-11ksdgzdqi4cirlj1f76nnq.png</image:loc><image:title>1*1ksDgzDQI4CIrLj1F76nnQ</image:title></image:image><lastmod>2020-09-26T23:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/sharpsecdump-net-port-of-the-remote-sam-lsa-secrets-dumping-functionality-of-impackets-secretsdump-py/</loc><lastmod>2020-09-26T21:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/google-sunsets-chrome-web-store-payments-system-affecting-paid-chrome-extensions/</loc><lastmod>2020-09-26T16:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/national-australia-bank-nab-launches-bug-bounty-program/</loc><lastmod>2020-09-26T16:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/velociraptor-endpoint-visibility-and-collection-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/753bf-velociraptor.png</image:loc><image:title>Velociraptor</image:title></image:image><lastmod>2020-09-26T12:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/26/11-best-third-party-app-stores-for-android/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cfd9c-third-party-app-stores-android.jpg</image:loc><image:title>Third-party-app-stores-Android</image:title></image:image><lastmod>2020-09-26T09:43:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/how-a-hacker-could-attack-web-apps-with-burp-suite-sql-injection/</loc><lastmod>2020-09-25T22:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/how-to-attack-web-applications-with-burp-suite-sql-injection/</loc><lastmod>2020-09-25T22:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/go-dork-the-fastest-dork-scanner-written-in-go/</loc><lastmod>2020-09-25T21:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/pii-leakage-via-idor-weak-passwordreset-full-account-takeover/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ff09c-140rdm57vxa3qm_75psy0qq.png</image:loc><image:title>1*40rDm57vXA3QM_75pSY0qQ</image:title></image:image><lastmod>2020-09-25T20:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/how-i-earned-500-from-google-flaw-in-authentication/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/670c9-1d5kzbv3ghygxkk2awsa91g.png</image:loc><image:title>1*d5KzBv3GhYgxKK2AWSa91g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4b8e9-1lgn1dybcvl483tzcs8s0dg.png</image:loc><image:title>1*lgn1DyBCvl483TzCs8S0Dg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4b76e-1jxyzo6wbpf9boywesahp-w.png</image:loc><image:title>1*jxyZo6WBpF9bOYwesAhP-w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fb37e-1sfisrczkgkdxlsuke7jkhg.png</image:loc><image:title>1*SfIsrcZKGkDXLSuKe7JkHg</image:title></image:image><lastmod>2020-09-25T19:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/finspy-spyware-for-mac-and-linux-os-targets-egyptian-organisations/</loc><lastmod>2020-09-25T15:09:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/microsoft-windows-xp-source-code-reportedly-leaked-online/</loc><lastmod>2020-09-25T15:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/pwnxss-vulnerability-xss-scanner-exploit/</loc><lastmod>2020-09-25T12:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/fortinet-vpn-with-default-settings-leave-200000-businesses-open-to-hackers/</loc><lastmod>2020-09-25T11:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/shopify-disclose-security-breach-by-two-of-its-employees/</loc><lastmod>2020-09-25T10:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/business-logic-flaw-in-google-acquisition-hall-of-fame/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/79790-133j6c6eyrshzihpqg70-ia.jpeg</image:loc><image:title>1*33j6C6EyrshzIhpqG70-IA</image:title></image:image><lastmod>2020-09-25T04:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/25/become-an-in-demand-ethical-hacker-with-this-15-comptia-course/</loc><lastmod>2020-09-25T00:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/taurus-project-stealer-now-spreading-via-malvertising-campaign/</loc><lastmod>2020-09-24T22:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/psmdatp-powershell-module-for-managing-microsoft-defender-advanced-threat-protection/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d5cce-psmdatp_5_small_psmdatp.png</image:loc><image:title>PSMDATP_5_small_psmdatp</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/89e66-psmdatp_6_apppermissions.png</image:loc><image:title>PSMDATP_6_apppermissions</image:title></image:image><lastmod>2020-09-24T21:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/tryhackmeowasp-top-10day-1/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e96bc-14incksfzgez71608hbntfa.png</image:loc><image:title>1*4InCksfzGeZ71608hBntfA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/168eb-1cvkavv3kkxsrpqxvpg-cgg.png</image:loc><image:title>1*cvKaVv3kKXsrpqXVpg-Cgg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d9fd1-1le8u1yggze2yt9vobthrna.png</image:loc><image:title>1*Le8U1yGgzE2yT9VObTHRNA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9cd67-1klusf9rtw8v1foas6pum4a.png</image:loc><image:title>1*klUsf9RTw8V1foAs6pUm4A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/22f3f-1jdtad9nwdalczgpx_prz6w.png</image:loc><image:title>1*jDTAd9nwdaLCZGpx_PRZ6w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ac617-1udzivbfk93deyplft-rsww.png</image:loc><image:title>1*udZIVBfK93DeYplFT-RSWw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a2dfd-1xce9aruqlha5jtdiyv0mvg.png</image:loc><image:title>1*XCE9ArUQlHA5JTdIyv0Mvg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ff153-1rc7l_g37izeqoy9msoc-xw.png</image:loc><image:title>1*RC7L_G37iZEqoY9mSOC-xw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1ddc4-1ylfj8n__6-4wjdfyzot63a.png</image:loc><image:title>1*ylfJ8N__6-4WjDFYzot63A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b0ee3-1acjnydax8ntbghqpuho2jq.png</image:loc><image:title>1*aCJnYDaX8nTbGhqPUHO2JQ</image:title></image:image><lastmod>2020-09-24T20:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1d644-1madnwyvljgkpm0rhhbdirw.png</image:loc><image:title>1*maDnwyVLjGKpm0RHHBDiRw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/13490-1o5j13zwa1fqjqldjyaqi5q.png</image:loc><image:title>1*O5J13ZwA1FQjqlDJYaqI5Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/92201-1lavgqrzp3lsejceikuda8g.png</image:loc><image:title>1*lAvGqRZp3LSejCeiKUda8g</image:title></image:image><lastmod>2020-09-24T20:51:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/aws-iam-explained-for-red-and-blue-teams/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cbc4d-19ejgsy_h8aqb9ijwtfl4da.png</image:loc><image:title>1*9eJGsY_h8AqB9iJwTfL4DA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/45f2f-1lvbxeaeyq7bzffs3og3yeq.png</image:loc><image:title>1*lVBxEaEYq7BZFfs3OG3YeQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/88599-1vgcprhmaxxdglcm3olrrda.png</image:loc><image:title>1*vGCPRhMAxxdgLCM3oLrRdA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/de309-1n6oy8mfs2uvcidx2fxzepg.png</image:loc><image:title>1*N6oy8MFs2uVcidX2fxzEPg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3b57c-1ehh3escm9lhcudrv7gzoba.png</image:loc><image:title>1*EhH3Escm9LhCudrV7gzObA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/33416-1jcsw8yw-52xrkzdfb8euw.png</image:loc><image:title>1*jCSw8yW--52xrKzdfB8eUw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0dfc2-1t3at0qjogx9pkgkapkcvjq.png</image:loc><image:title>1*t3AT0qjoGx9pkGkAPkCvjQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/baf4d-1gp95fpp-mzcnzmhn3gdqxg.png</image:loc><image:title>1*gp95FPP-mZCnZMHn3GDQxg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b6d27-1nce1-qrmx65pjmjt56dqua.png</image:loc><image:title>1*nCe1-qRmX65pJMJt56DQUA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4506e-1x9ozr34wekev7fae15qooq.png</image:loc><image:title>1*X9ozR34wEKev7fae15QOOQ</image:title></image:image><lastmod>2020-09-24T18:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/sandbox-in-security-what-is-it-and-how-it-relates-to-malware/</loc><lastmod>2020-09-24T17:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/microsoft-leaked-bing-data-online-through-an-unsecured-server/</loc><lastmod>2020-09-24T16:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/firefox-81-rolls-out-with-high-severity-bug-fixes/</loc><lastmod>2020-09-24T13:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/sitrep-extensible-configurable-host-triage/</loc><lastmod>2020-09-24T13:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/get-any-subscription-in-lowest-price/</loc><lastmod>2020-09-24T11:20:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/24/major-instagram-app-bug-couldve-given-hackers-remote-access-to-your-phone/</loc><lastmod>2020-09-24T11:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/enum4linux-a-linux-alternative-to-enum-exe-for-enumerating-data-from-windows-and-samba-hosts/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2b0b0-enum4linux.png</image:loc><image:title>enum4linux</image:title></image:image><lastmod>2020-09-23T21:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/detecting-and-preventing-critical-zerologon-windows-server-vulnerability/</loc><lastmod>2020-09-23T19:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/phishers-spoof-reliable-cybersecurity-training-company-to-garner-clicks/</loc><lastmod>2020-09-23T17:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/activision-data-breach-leaves-500000-call-of-duty-players-accounts-at-risk/</loc><lastmod>2020-09-23T15:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/new-phishing-campaign-evades-security-checks-with-hexadecimal-ip-addresses/</loc><lastmod>2020-09-23T15:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/how-mmorpgs-work/</loc><lastmod>2020-09-23T15:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/more-bugs-discovered-in-discount-rules-for-woocommerce-plugin/</loc><lastmod>2020-09-23T12:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/11-essential-tips-for-loan-app-development-in-2021/</loc><lastmod>2020-09-23T12:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/dnxfirewall-a-pure-python-next-generation-firewall-built-on-top-of-linux-kernel-netfilter/</loc><lastmod>2020-09-23T12:12:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/10-ways-to-make-your-smartphone-an-impregnable-gadget/</loc><lastmod>2020-09-23T11:47:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/most-popular-crowdfunding-platforms/</loc><lastmod>2020-09-23T11:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/firefox-for-android-bug-allows-hijacking-other-phones-browsers-over-wifi/</loc><lastmod>2020-09-23T11:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/us-department-of-commerce-bans-tiktok-and-wechat-transactions/</loc><lastmod>2020-09-23T11:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/mozilla-sunsets-firefox-send-firefox-notes-to-follow/</loc><lastmod>2020-09-23T11:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/23/a-new-hacking-group-hitting-russian-companies-with-ransomware/</loc><lastmod>2020-09-23T10:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/fluffi-fully-localized-utility-for-fuzzing-instantaneously-a-distributed-evolutionary-binary-fuzzer-for-pentesters/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4f26d-fluffi_1_friendly_fluffi_md.jpeg</image:loc><image:title>fluffi_1_friendly_fluffi_md</image:title></image:image><lastmod>2020-09-22T21:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/ransomware-causes-a-death-mozilla-sends-off-firefox-send-threatwire/</loc><lastmod>2020-09-22T21:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/combining-hadoop-and-mcollective-for-total-network-compromise/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1d7c1-1pwgrjsycag6jc-1jglep4w.png</image:loc><image:title>1*PwgrJSYCaG6jc-1jGlEp4w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5d554-1ywxqb-mvwqfscvty_-0xuq.png</image:loc><image:title>1*yWxqB-mvwqfscVty_-0xUQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5ec97-1crcfv82obikhhfm_yod8pg.png</image:loc><image:title>1*CRcfv82ObIkhhFM_Yod8pg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cf0d6-18vy7cowltpff6fq4emxgew.png</image:loc><image:title>1*8vY7COWltPfF6fQ4eMXgEw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3d98a-1uh6l2k7i10zrfgjhfu1wpq.png</image:loc><image:title>1*UH6L2K7I10zRfgJHfu1wpQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/482cb-1axtgjdvibtvfim4b2fu_0w.png</image:loc><image:title>1*AxTgjDvIBtvFIM4B2fu_0w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/01607-1mfvfwhr64y74rdfe_baina.png</image:loc><image:title>1*mfvFWhr64Y74RDFe_bAINA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/305dc-135hwxictyzn53dgw4a5xtw.png</image:loc><image:title>1*35hwXIcTyZn53dGW4a5xTw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f3e0a-1go2pyghxtuvfo42c7tcqgq.png</image:loc><image:title>1*Go2PyGhXTuvfo42c7TcqgQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/dc1f7-10dtm3u-tlsughqcz-sqbhg.png</image:loc><image:title>1*0dTM3U-TlsUGhqcZ-sqBhg</image:title></image:image><lastmod>2020-09-22T18:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/unsecured-microsoft-bing-search-server-exposed-user-queries-and-location-data/</loc><lastmod>2020-09-22T13:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/grat2-command-and-control-c2-project-for-learning-purpose/</loc><lastmod>2020-09-22T12:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/british-hacker-sentenced-to-5-years-for-blackmailing-u-s-companies/</loc><lastmod>2020-09-22T12:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/fun-with-header-and-forget-password%e2%80%8a-%e2%80%8awithout-that-nasty-twist/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0a649-1hony5dmruiou5h7fljguaw.png</image:loc><image:title>1*honY5DMRuioU5H7FljGuAw</image:title></image:image><lastmod>2020-09-22T10:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/22/10-best-gps-tracking-apps-for-android/</loc><lastmod>2020-09-22T09:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/21/vmpdump-a-dynamic-vmp-dumper-and-import-fixer/</loc><lastmod>2020-09-21T21:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/21/a-week-in-security-september-14-20/</loc><lastmod>2020-09-21T17:31:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/21/moriarty-project-this-tool-gives-information-about-the-phone-number-that-you-entered/</loc><lastmod>2020-09-21T12:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/21/a-patient-dies-after-ransomware-attack-paralyzes-german-hospital-systems/</loc><lastmod>2020-09-21T11:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/21/how-i-accidentally-got-my-first-bounty-from-facebook-facebook-bug-bounty-2020/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/16860-1wq86hnhlfwdpxd_3l_kkkq.jpeg</image:loc><image:title>1*wQ86hNhlFwDPXd_3l_KkkQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d9aa1-1_ug0cxkknqaufq49hotodg.png</image:loc><image:title>1*_ug0cxkkNQaUFQ49HOTODg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/76239-16iqwcf1hr_-jbqdfk8fu2q.png</image:loc><image:title>1*6iqwCf1hr_-jbQdfk8Fu2Q</image:title></image:image><lastmod>2020-09-21T08:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/frp-a-fast-reverse-proxy-to-help-you-expose-a-local-server-behind-a-nat-or-firewall-to-the-internet/</loc><lastmod>2020-09-20T21:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/writeup-vulnhub-kioptrix-5/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4339a-1azblbhwyno5vaq-ngqvypq.png</image:loc><image:title>1*AzBlBHwyno5VaQ-ngqVyPQ</image:title></image:image><lastmod>2020-09-20T20:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/cve-2020-24115-use-of-hardcoded-credentials-in-source-code-leads-to-admin-panel-access/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cf68c-0z9f2vx35vtbphpgm.png</image:loc><image:title>0*Z9f2vx35vTbphPGM</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5a091-0dt35k4e2wyrd4qew.png</image:loc><image:title>0*DT35k4E2WyrD4QEW</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/169f6-0h51uhnz1fxyvos-p.png</image:loc><image:title>0*h51UhnZ1FxyVOS-p</image:title></image:image><lastmod>2020-09-20T12:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/winja-ctf-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1e151-1zd7dfcbmsky-q7xtyyfyqa.png</image:loc><image:title>1*zd7dFCbmSKy-q7XtyyfyQA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/846d1-1c1n5nkkpd135xfmmkuer6g.png</image:loc><image:title>1*C1N5nKkpd135XFMMkUeR6g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f2464-1g09lbpqhqycjkibsjphi8g.png</image:loc><image:title>1*G09lbPQHQycJkIbsJphi8g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ec2ad-1buqhc0egoigue3uaavdr_a.png</image:loc><image:title>1*BuQhc0eGoiguE3UAAVDR_A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5fa43-1d8t-mf5hrjzggycokqpeda.png</image:loc><image:title>1*d8t-Mf5hRjZgGycoKqpedA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5ba1e-1wswjlqt3wis6px3gjug7mw.png</image:loc><image:title>1*wswJlQt3wis6PX3GjUg7mw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8b082-1n_y75j_zbdswbviclgtg8w.png</image:loc><image:title>1*N_y75J_zBDswbVIClgTG8w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4861a-1nwnhai68qimituxvjfn9aa.png</image:loc><image:title>1*nwnhai68QImItUXvjFN9AA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/7b335-16cmfeqjvirtd48j6ekjchq.png</image:loc><image:title>1*6CmfeqjVirtD48j6EKjCHQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d49e7-1zmrxzeuzdpd_58dgn2u7kq.png</image:loc><image:title>1*ZmrxZeUZDpd_58dGN2U7kQ</image:title></image:image><lastmod>2020-09-20T12:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/is-this-password-manager-safe/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a848a-1uzj0ancu68o7wc1go5v5kq.jpeg</image:loc><image:title>1*UZj0aNcu68o7WC1gO5V5KQ</image:title></image:image><lastmod>2020-09-20T12:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/crlfuzz-a-fast-tool-to-scan-crlf-vulnerability-written-in-go/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/32470-crlfuzz_6.png</image:loc><image:title>crlfuzz_6</image:title></image:image><lastmod>2020-09-20T12:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/what-is-parameter-tampering/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/04ae9-1b2goghazbzuj0nxrtlsz3w.png</image:loc><image:title>1*b2GoghaZBZUJ0nxRtlsz3w</image:title></image:image><lastmod>2020-09-20T11:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/20/cracking-hashes-with-hashcat/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1ceac-1n27hwzhhql73mqeccllfkg.png</image:loc><image:title>1*n27hWZHHqL73mQeccLlFkg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5ce65-1lbkgumntzdvhjtqcji49da.png</image:loc><image:title>1*lBKgUMNtZdVHjtqCJI49dA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9e7d5-1qsyya6bj8o_7llkuiizykw.png</image:loc><image:title>1*QSyyA6bJ8o_7llKUIiZYkw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/56303-1ss3bpqhefzyxwjmotqevbg.png</image:loc><image:title>1*SS3bpqHeFzYXwjmOTQEVBg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ee3d2-18rqpwcjmtl3tbz2shk_gaw.png</image:loc><image:title>1*8RQpWCJMtL3TBz2shK_gAw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9374e-1ghzlglmewlc-x4opv0u4na.png</image:loc><image:title>1*ghzLglMEWlc-x4OPV0U4NA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c8e41-1oa3xpbx4lekm7cscens7ow.png</image:loc><image:title>1*OA3xPbX4lEKM7cSCens7ow</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/024cb-19b0jnylpyvpdji9otattfg.png</image:loc><image:title>1*9b0JNYLPYvPdjI9otATTFg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b9c92-15vfrvzcmdzw4gg9b_xifaq.png</image:loc><image:title>1*5vFrVZcmdZw4Gg9b_XIfaQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/39f62-1q2dornmv32dopt7oobemqw.png</image:loc><image:title>1*q2dOrnMV32DoPt7OObemQw</image:title></image:image><lastmod>2020-09-20T10:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/19/winshark-a-wireshark-plugin-to-instrument-etw/</loc><lastmod>2020-09-19T21:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/19/a-bug-could-let-attackers-hijack-firefox-for-android-via-wi-fi-network/</loc><lastmod>2020-09-19T19:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/19/unimap-scan-only-once-by-ip-address-and-reduce-scan-times-with-nmap-for-large-amounts-of-data/</loc><lastmod>2020-09-19T12:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/19/researchers-uncover-6-year-cyber-espionage-campaign-targeting-iranian-dissidents/</loc><lastmod>2020-09-19T12:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/bxss-a-blind-xss-injector-tool/</loc><lastmod>2020-09-18T21:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/is-domain-name-abuse-something-companies-should-worry-about/</loc><lastmod>2020-09-18T17:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/crlfmap-a-tool-to-find-http-splitting-vulnerabilities/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e2964-crlfmap.png</image:loc><image:title>crlfmap</image:title></image:image><lastmod>2020-09-18T12:12:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/u-s-treasury-sanctions-hacking-group-backed-by-iranian-intelligence/</loc><lastmod>2020-09-18T09:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/android-11-5-new-security-and-privacy-features-you-need-to-know/</loc><lastmod>2020-09-18T08:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/18/7-site-audit-issues-we-always-see-and-tips-to-tackle-them/</loc><lastmod>2020-09-18T01:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/why-a-vpn-on-holiday-can-be-quite-useful/</loc><lastmod>2020-09-17T22:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/media-database-ultimate-growth-and-management-of-pr-relationship/</loc><lastmod>2020-09-17T22:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/zin-a-payload-injector-for-bugbounties-written-in-go/</loc><lastmod>2020-09-17T21:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/charities-and-the-advertising-industry-data-ecosystems-and-privacy-risks/</loc><lastmod>2020-09-17T17:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/zenscrape-a-simple-web-scraping-solution-for-penetration-testers/</loc><lastmod>2020-09-17T15:09:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/dorkx-pipe-different-tools-with-google-dork-scanner/</loc><lastmod>2020-09-17T12:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/u-s-announces-charges-against-2-russian-and-2-iranian-hackers/</loc><lastmod>2020-09-17T12:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/17/how-to-argue-your-bounty-in-a-professional-way-meaning-avoiding-a-ban/</loc><lastmod>2020-09-17T08:51:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/aes-finder-utility-to-find-aes-keys-in-running-processes/</loc><lastmod>2020-09-16T21:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/largest-hacking-campaign-since-2015-targeted-magento-stores-via-unpatched-bug/</loc><lastmod>2020-09-16T17:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/ransomware-attack-targets-equinix-data-center-provider/</loc><lastmod>2020-09-16T17:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/how-to-fix-fatal-int18-boot-failure/</loc><lastmod>2020-09-16T17:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/fbi-adds-5-chinese-apt41-hackers-to-its-cybers-most-wanted-list/</loc><lastmod>2020-09-16T17:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/croc-easily-and-securely-send-things-from-one-computer-to-another/</loc><lastmod>2020-09-16T12:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/raccoon-attack-aims-at-breaking-tls-encryption-though-attack-is-rare/</loc><lastmod>2020-09-16T11:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/eterbase-crypto-exchange-suffered-5-4-million-hack/</loc><lastmod>2020-09-16T11:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/2-hackers-charged-for-defacing-sites-after-u-s-airstrike-killed-iranian-general/</loc><lastmod>2020-09-16T10:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/best-clone-apps-for-android/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/11f98-best-clone-apps-android.jpg</image:loc><image:title>Best-Clone-Apps-Android</image:title></image:image><lastmod>2020-09-16T09:43:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/16/new-report-explains-covid-19s-impact-on-cyber-security/</loc><lastmod>2020-09-16T09:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/activedirectoryenumeration-enumerate-ad-through-ldap-with-a-collection-of-helpfull-scripts-being-bundled/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/26866-activedirectoryenumeration.png</image:loc><image:title>ActiveDirectoryEnumeration</image:title></image:image><lastmod>2020-09-15T21:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/vulnerabilities-in-tiktok-android-app-could-allow-stealing-files/</loc><lastmod>2020-09-15T20:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/essential-advantages-of-using-vue-js-for-building-applications/</loc><lastmod>2020-09-15T20:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/how-to-do-your-reconnaissance-properly-before-chasing-a-bug-bounty/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/366ff-1hfbhv72jj7w4zkzei4gura.png</image:loc><image:title>1*HfbhV72Jj7w4zkZeI4GurA</image:title></image:image><lastmod>2020-09-15T18:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/usps-used-vulnerable-systems-voatz-vs-ethical-hackers-threatwire/</loc><lastmod>2020-09-15T17:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/a-guide-into-securing-your-wordpress/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2bb06-1n6qm-xfum_zejy6tmaaera.jpeg</image:loc><image:title>1*N6QM-XfUM_zeJy6TMaaerA</image:title></image:image><lastmod>2020-09-15T16:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/fintech-industry-developments-differences-between-europe-and-the-us/</loc><lastmod>2020-09-15T15:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/buy-any-amazon-or-flipkart-etc-products-in-cheapest-price/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/abe60-shutterstock_101649409.jpg</image:loc><image:title>shutterstock_101649409</image:title></image:image><lastmod>2020-09-15T12:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/rbcd-attack-kerberos-resource-based-constrained-delegation-attack-from-outside-using-impacket/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/62fd7-rbcd-attack_1_rbcd-attack.png</image:loc><image:title>rbcd-attack_1_rbcd-attack</image:title></image:image><lastmod>2020-09-15T12:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/report-97-of-cybersecurity-companies-have-leaked-data-on-the-dark-web/</loc><lastmod>2020-09-15T12:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/recovering-a-lost-phone-number-using-hacker-mindset/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fd8cf-1kly8rn2tjjjooowwxpq01a.png</image:loc><image:title>1*kLy8rN2tJjJoOOWwXPQ01A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6b5aa-13-hd2cpe5e9izbqqevsq7q.png</image:loc><image:title>1*3-Hd2CPE5e9IzbqqEvsq7Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/00a37-1ltk0pusbpidlz9oqdowuog.png</image:loc><image:title>1*lTK0pUSbPidLz9oQDOWuOg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/70ebd-1tfabl_oa-pgdejaziwbwba.png</image:loc><image:title>1*TfAbL_Oa-pgDEjazIwbWBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/06782-1pnl2za1cgtucdfphaptneq.png</image:loc><image:title>1*PNl2zA1CGTUCdfphAPtNEQ</image:title></image:image><lastmod>2020-09-15T11:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/how-to-stop-internet-explorer-from-opening-on-startup-in-windows-10/</loc><lastmod>2020-09-15T11:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/cisa-chinese-hackers-exploiting-unpatched-devices-to-target-u-s-agencies/</loc><lastmod>2020-09-15T10:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/email-subscribers-newsletters-wp-plugin-flaw-could-allow-email-spoofing/</loc><lastmod>2020-09-15T09:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/15/74-mikko/</loc><lastmod>2020-09-15T07:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/how-to-use-sudo_killer-to-identify-abuse-sudo-misconfigurations/</loc><lastmod>2020-09-14T22:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/exploit-sudo-become-a-superuser-with-sudo_killer-tutorial/</loc><lastmod>2020-09-14T21:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/wmihacker-a-bypass-anti-virus-software-lateral-movement-command-execution-tool/</loc><lastmod>2020-09-14T21:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/zoom-launch-two-factor-authentication-for-all-accounts/</loc><lastmod>2020-09-14T15:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/lock-and-code-s1ep15-safely-using-google-chrome-extensions-with-pieter-arntz/</loc><lastmod>2020-09-14T15:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/your-neighbours-music-sucks-aircrack-ng-for-the-rescue/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/24c8a-1pe2k0ktteqga2a6h4mzd7g.jpeg</image:loc><image:title>1*pE2k0KTTEqGA2A6H4Mzd7g</image:title></image:image><lastmod>2020-09-14T14:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/sensitive-data-exposure-with-nuclei-the-new-big-gun-with-exploit-bullets/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9f083-1b4-xd9uhy77lwhxi3tmodq.png</image:loc><image:title>1*b4-xd9uhY77lWhXi3TmodQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d3b68-1d6soc6j7jtyay2dqroixeq.jpeg</image:loc><image:title>1*d6SOC6j7jTyaY2dqroIxEQ</image:title></image:image><lastmod>2020-09-14T12:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/how-i-hacked-redbus-an-online-bus-ticketing-application/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8d531-1-oduejg2yq9rwcmf7v2wjg.png</image:loc><image:title>1*-odUejG2yq9RWCMf7v2wjg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3c83c-1pqvkzjxuf-tt9yucjrhrhq.png</image:loc><image:title>1*PQvkzjXuF-TT9YUCJRHRHQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ff84f-1jfirxsflmlivovfehju2vg.png</image:loc><image:title>1*JFiRXsflMlIvOVfehJU2vg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/45feb-10xe0n_b3_5e7jpyxye4veq.png</image:loc><image:title>1*0xe0n_b3_5E7JPYXYE4VEQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a5883-13bngvoo-dn4quytqcesrsw.png</image:loc><image:title>1*3BnGvOO-dn4QUyTQcESRsw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/794d7-1vxryjmhn9e9tkc_lichmha.png</image:loc><image:title>1*VXryjMhN9E9tKC_LIcHmhA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b9d5d-1jw5bes1esry9qr1ihrcvtw.png</image:loc><image:title>1*jW5bEs1EsRy9qr1ihrcVTw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d2ef1-1th4usq0wjjo4t7xmz4amma.png</image:loc><image:title>1*Th4USQ0WjJo4t7xMZ4amMA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/169c7-1w6wnygi7xj3nrklucrvgnq.png</image:loc><image:title>1*W6wNYgi7xj3nRKlUCRVGnQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fb968-1z8fdcfxirc8xaz3e9uev5a.png</image:loc><image:title>1*z8fDCFXIrC8XAz3e9uEV5A</image:title></image:image><lastmod>2020-09-14T12:51:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/blurtooth-vulnerability-threatens-secure-bluetooth-device-connections/</loc><lastmod>2020-09-14T12:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/pakistans-power-utility-k-electric-suffered-ransomware-attack/</loc><lastmod>2020-09-14T12:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/chimera-powershell-obfuscation-script-designed-to-bypass-amsi-and-commercial-antivirus-solutions/</loc><lastmod>2020-09-14T12:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/google-award-10k-bounty-for-google-maps-bug-and-patch-bypass/</loc><lastmod>2020-09-14T09:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/microsoft-patch-tuesday-september-addressed-129-security-bugs/</loc><lastmod>2020-09-14T09:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/14/best-scripts-for-termux/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0a372-best-scripts-for-termux.jpg</image:loc><image:title>Best-Scripts-For-Termux</image:title></image:image><lastmod>2020-09-14T09:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/13/dockerent-the-only-open-source-tool-to-analyze-vulnerabilities-and-configuration-issues-with-running-docker-containers-and-docker-networks/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/01237-zmtk8kjlbpr1vha3efzicids2.png</image:loc><image:title>Zmtk8KjlbPr1vHa3efZiCIDs2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/50353-dockerent_1_logo.png</image:loc><image:title>DockerENT_1_logo</image:title></image:image><lastmod>2020-09-13T21:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/13/http-revshell-powershell-reverse-shell-using-http-s-protocol-with-amsi-bypass-and-proxy-aware/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b3743-http-revshell_6_generator.gif</image:loc><image:title>HTTP-revshell_6_generator</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cdc0b-http-revshell_5_logo.png</image:loc><image:title>HTTP-revshell_5_logo</image:title></image:image><lastmod>2020-09-13T12:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/13/unmask-auto-fill-password-in-chrome-and-how-to-protect-your-pc/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/26b02-the-best-password-managers-for-2020_37a2.jpg</image:loc><image:title>the-best-password-managers-for-2020_37a2</image:title></image:image><lastmod>2020-09-13T05:20:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/12/some-tools-install-and-keep-up-to-date-some-pentesting-tools/</loc><lastmod>2020-09-12T21:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/12/become-an-in-demand-cybersecurity-pro-with-this-30-training/</loc><lastmod>2020-09-12T18:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/12/mzap-multiple-target-zap-scanning/</loc><lastmod>2020-09-12T12:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/monsoon-fast-http-enumerator/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/968d3-monsoon_3_demo1.gif</image:loc><image:title>monsoon_3_demo1</image:title></image:image><lastmod>2020-09-11T21:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/cyber-security-threats-top-ransomware-attacks-to-watch-out-for-in-2021/</loc><lastmod>2020-09-11T18:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/the-informed-voters-guide-to-election-cyberthreats/</loc><lastmod>2020-09-11T15:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/avcleaner-c-c-source-obfuscator-for-antivirus-bypass/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/27b80-avcleaner_1.png</image:loc><image:title>avcleaner_1</image:title></image:image><lastmod>2020-09-11T12:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/new-linux-malware-steals-call-details-from-voip-softswitch-systems/</loc><lastmod>2020-09-11T12:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/weak-permissions-on-windows-service-privilege-escalation/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/eeff5-1tlpp1lilhlkr2gecbmz9ya.png</image:loc><image:title>1*tlpp1LILhlkR2gEcBMz9yA</image:title></image:image><lastmod>2020-09-11T10:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/11/the-10-best-chromebooks-for-linux/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/972cd-lenovo-chromebook-c330.jpg</image:loc><image:title>Lenovo-Chromebook-C330</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/37a19-acer-chromebook-15.jpg</image:loc><image:title>Acer-Chromebook-15</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a695a-acer-chromebook-spin-713.jpg</image:loc><image:title>Acer-Chromebook-Spin-713</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/7eda1-asus-chromebook-flip-c434.jpg</image:loc><image:title>asus-chromebook-flip-c434</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ebee5-samsung-chromebook-pro.jpg</image:loc><image:title>Samsung-Chromebook-Pro</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/721b2-dell-inspiron-11-chromebook.jpg</image:loc><image:title>Dell-inspiron-11-chromebook</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ada7d-google-pixelbook.jpg</image:loc><image:title>Google-Pixelbook</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c2ba8-samsung-chromebook-4.jpg</image:loc><image:title>Samsung-Chromebook-4</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/bd9c8-google-pixelbook-go.jpg</image:loc><image:title>Google-Pixelbook-Go</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f34e3-hp-chromebook-x360.jpg</image:loc><image:title>HP-Chromebook-X360</image:title></image:image><lastmod>2020-09-11T08:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/new-unpatched-bluetooth-flaw-lets-hackers-easily-target-nearby-devices/</loc><lastmod>2020-09-10T22:09:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/report-pandemic-caused-significant-shift-in-buyer-appetite-in-the-dark-web/</loc><lastmod>2020-09-10T21:26:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/spyre-simple-yara-based-ioc-scanner/</loc><lastmod>2020-09-10T21:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/hackers-stole-5-4-million-from-eterbase-cryptocurrency-exchange/</loc><lastmod>2020-09-10T19:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/safety-check-your-installed-dependencies-for-known-security-vulnerabilities/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c2048-safety_1_safety.jpeg</image:loc><image:title>safety_1_safety</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/77df4-safety_5_safety_ci.png</image:loc><image:title>safety_5_safety_ci</image:title></image:image><lastmod>2020-09-10T12:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/a-successful-self-service-password-reset-sspr-project-requires-user-adoption/</loc><lastmod>2020-09-10T12:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/new-raccoon-attack-could-let-attackers-break-ssl-tls-encryption/</loc><lastmod>2020-09-10T12:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/htb-remote-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/61a7c-10xjxkn0ooxdxmum2rgkafg.png</image:loc><image:title>1*0xjxkn0oOxDxMum2rGkAfg</image:title></image:image><lastmod>2020-09-10T11:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/become-a-data-driven-leader-with-this-certification-bundle/</loc><lastmod>2020-09-10T11:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/10/kick-start-in-bug-bounties/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/866ac-1pndlvc1ehetgu8p-tljeaw.gif</image:loc><image:title>1*pNdLVC1eHeTGu8P-TLjEaw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b1284-1wrat9_5jq7-emhlszmo1xg.png</image:loc><image:title>1*wRAt9_5jq7-EMHlsZMO1xg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/85754-1omgpvarep_dspjarvwolzg.gif</image:loc><image:title>1*omGpvAreP_dsPjarvWoLzg</image:title></image:image><lastmod>2020-09-10T04:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/anchore-engine-a-service-that-analyzes-docker-images-and-applies-user-defined-acceptance-policies-to-allow-automated-container-image-validation-and-certification/</loc><lastmod>2020-09-09T21:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/malvertising-campaigns-come-back-in-full-swing/</loc><lastmod>2020-09-09T18:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/how-to-configure-port-forwarding-to-create-internet-connected-services/</loc><lastmod>2020-09-09T18:12:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/configure-port-forwarding-to-create-internet-connected-services-tutorial/</loc><lastmod>2020-09-09T16:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/cynet-takes-cyber-threat-protection-automation-to-the-next-level-with-incident-engine/</loc><lastmod>2020-09-09T16:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/rakkess-kubectl-plugin-to-show-an-access-matrix-for-k8s-server-resources/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e8ec7-rakkess_8_demo-named-resource-smaller.png</image:loc><image:title>rakkess_8_demo-named-resource-smaller</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/7ea11-rakkess_7_demo-resource-smaller.png</image:loc><image:title>rakkess_7_demo-resource-smaller</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d3e9f-rakkess_6_demo-user-smaller.png</image:loc><image:title>rakkess_6_demo-user-smaller</image:title></image:image><lastmod>2020-09-09T12:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/exploiting-sudo-rights-htb-traceback-user/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9914c-1tpfbvkxiirpxfb7aaalvvg.png</image:loc><image:title>1*TPFbvkxiiRPxFb7aAaLvVg</image:title></image:image><lastmod>2020-09-09T09:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/cybercriminals-are-using-legit-cloud-monitoring-tools-as-backdoor/</loc><lastmod>2020-09-09T09:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/09/introducing-the-wifi-pineapple-mark-vii/</loc><lastmod>2020-09-09T01:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/browsertunnel-surreptitiously-exfiltrate-data-from-the-browser-over-dns/</loc><lastmod>2020-09-08T21:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/microsoft-releases-september-2020-security-patches-for-129-flaws/</loc><lastmod>2020-09-08T20:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/tryhackme-mr-robot-machine/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ce903-1xpiuo1t3fbzzyba873elxa.png</image:loc><image:title>1*xpiUO1t3fBZzybA873elXA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d6b50-1cuiv0j1ifgoytbki1vnhhq.png</image:loc><image:title>1*cuIv0J1IFgOytBkI1vnHHQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/25293-1hy5w20ku9bbm6g4ksny1cq.png</image:loc><image:title>1*hy5W20kU9BBM6G4KSny1cQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6b2c4-1vmae7narty2dbfszh415oq.png</image:loc><image:title>1*VmAe7nArTY2DbFSZh415OQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1a64b-1cbtgit1g8jafortjnnqvga.png</image:loc><image:title>1*cBTGiT1g8jafORTJNNQvGA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6465b-1ka2me0npcoy7_us-fkzlzq.png</image:loc><image:title>1*ka2Me0nPCOy7_Us-FkZlzQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/11b46-1qevsygsxpwbnatcddo-y-a.png</image:loc><image:title>1*qevsyGSXpwBNAtCDDO-Y-A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3a7e1-1bcp9pdkr-8v-taejvmyrwg.png</image:loc><image:title>1*Bcp9PDkr-8V-tAEjVMyrWg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f9668-1oeqsm52kdu730forxjiroa.png</image:loc><image:title>1*oeqSM52KDU730fORXJiRoA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c8733-16m_jqdfuerfslv9u4icrfg.png</image:loc><image:title>1*6M_jqDFuERfsLv9U4iCrfg</image:title></image:image><lastmod>2020-09-08T16:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/account-takeover-via-csrf/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b3fed-19k29bwakvis2xwote_b97q.png</image:loc><image:title>1*9K29BWAkVis2xwoTe_b97Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/83e2f-1jq_uczf1n80nto0tvzvsiw.png</image:loc><image:title>1*Jq_UCzF1n80nto0TvzVSiw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/abf47-1jwlyaxgr1uq9cwu3dxrtgq.png</image:loc><image:title>1*jwlYaXGr1Uq9cwU3dxrtGQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/47c28-1rylsr2onqlznsg9z0w0zlg.png</image:loc><image:title>1*rylSr2OnQLZnSg9Z0W0zlg</image:title></image:image><lastmod>2020-09-08T16:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/google-removed-six-apps-containing-joker-malware-from-play-store/</loc><lastmod>2020-09-08T16:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/critical-vulnerability-found-in-cisco-jabber-for-windows/</loc><lastmod>2020-09-08T16:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/serious-vulnerabilities-found-in-magmi-magento-plugin/</loc><lastmod>2020-09-08T16:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/facebook-ups-security-new-vulnerability-disclosure-policy-whatsapp-advisory-page/</loc><lastmod>2020-09-08T13:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/japan-france-new-zealand-warn-of-sudden-uptick-in-emotet-trojan-attacks/</loc><lastmod>2020-09-08T13:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/08/bpytop-linux-osx-freebsd-resource-monitor/</loc><lastmod>2020-09-08T12:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/purplecloud-an-infrastructure-as-code-iac-deployment-of-a-small-active-directory-pentest-lab-in-the-cloud/</loc><lastmod>2020-09-07T21:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/tryhackme-breaking-into-the-kenobi-machine/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c8d1e-1h3rzfgv9qpnpyxaxmzbayq.png</image:loc><image:title>1*H3RZfgV9qPNPYxAxMZbAYQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/26b21-1fbqfrugzvnat4ypsc0bicw.png</image:loc><image:title>1*fBQFrUgzvNAt4ypsC0bIcw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d719d-1g2tfrlopjbyndfadqrjibw.png</image:loc><image:title>1*g2TfrlopJBYndfaDqrjiBw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6bf6d-1zon48-copv-e94eaqjfbbw.png</image:loc><image:title>1*zON48-coPV-E94eAQJFBBw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e33a9-1dbfqio-3t_kwyx1zmy7cea.png</image:loc><image:title>1*dBfqIo-3t_KWyx1zmY7ceA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5bb89-11akdss0-0hcy7o0wippvkw.png</image:loc><image:title>1*1AKdSs0-0HCy7o0wiPpvkw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/200d9-1v0afljfk_-q-mvw5eue_mw.png</image:loc><image:title>1*v0AFLjfK_-Q-MvW5EUE_Mw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b5172-17d7a8oicm8hi6ef2_4tpcg.png</image:loc><image:title>1*7d7A8OICm8Hi6Ef2_4tpCg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/99b92-18fmwekerex_ntr4zrprhea.png</image:loc><image:title>1*8fMWekErEX_nTr4zRprHeA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5c884-1sasm_6xzphpkoy0irvpf2a.png</image:loc><image:title>1*SAsM_6xZPhpkOy0IrvPf2A</image:title></image:image><lastmod>2020-09-07T18:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/how-response-manipulation-got-me-a-little-but-sweet-bounty/</loc><lastmod>2020-09-07T18:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/how-to-secure-your-login-credentials/</loc><lastmod>2020-09-07T16:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/quick-tips-to-increase-the-efficiency-of-your-mac/</loc><lastmod>2020-09-07T16:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/a-week-in-security-august-31-september-6/</loc><lastmod>2020-09-07T15:26:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/new-pin-verification-bypass-flaw-affects-visa-contactless-payments/</loc><lastmod>2020-09-07T15:09:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/smb-cybersecurity-catching-up-to-enterprise-but-the-human-element-still-a-major-concern/</loc><lastmod>2020-09-07T15:09:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/stop-scratching-the-surface-and-hack-the-dependencies/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/04cbf-09erarzs5fq86p49q.gif</image:loc><image:title>0*9erArzs5fQ86P49q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/aca58-0og3eebcbtwgt6ynl.gif</image:loc><image:title>0*oG3eebcBtwGT6YNL</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8401d-1fwwqtguk9apuw5ktqnpykq.png</image:loc><image:title>1*fWwqtgUk9ApuW5KtQNPyKQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2e043-1nk5x5irsadhj92g01vi1eg.png</image:loc><image:title>1*NK5x5IrSAdhj92G01vi1Eg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d78de-1xvz8y_zubuhurvimczf5tq.gif</image:loc><image:title>1*XVZ8Y_ZuBUHUrvIMcZf5TQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/43b44-0p6f_g4lcike67aji.gif</image:loc><image:title>0*p6f_g4LCiKE67aJI</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e3751-12ojhm1miyvt5-uhfwvkpeg.png</image:loc><image:title>1*2OJHm1MIyvt5-UhfWVkpEg</image:title></image:image><lastmod>2020-09-07T12:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/openredirex-asynchronous-open-redirect-fuzzer-for-humans/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d196f-openredirex_2_example.png</image:loc><image:title>OpenRedireX_2_example</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/eb846-openredirex_1_banner.png</image:loc><image:title>OpenRedireX_1_banner</image:title></image:image><lastmod>2020-09-07T12:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/best-linux-games-free-paid/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/34f96-best-linux-games.jpg</image:loc><image:title>Best-Linux-Games</image:title></image:image><lastmod>2020-09-07T11:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/microsoft-defender-update-now-allows-malware-download/</loc><lastmod>2020-09-07T10:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/writing-my-medium-blog-to-complete-account-takeover/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/722f7-1zfqyuvgumgprbeeypi89zq.png</image:loc><image:title>1*ZfQyUvGUmGpRbEEYPi89ZQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/16dd0-1gp5eq5hqgtzyaevolknszg.png</image:loc><image:title>1*Gp5eq5HQgTzYaEVoLKnSZg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fb0fc-16kmlmjwt-cllvvbgqjvpjq.gif</image:loc><image:title>1*6KmlmJwt-cLLVVbGqJvPjQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/057d0-1h_qtr_zw0qqpq39b8vi8xw.gif</image:loc><image:title>1*h_qTR_ZW0QQPq39b8Vi8xw</image:title></image:image><lastmod>2020-09-07T07:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/tryhackme-basic-pentesting-walkthrough/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b4099-1i3mzlwlwaioslfwhkpm2ca.png</image:loc><image:title>1*i3mzlWLWaiOsLfWHkpM2CA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/48598-1vhhspc78_d8q-ot2bpks6g.png</image:loc><image:title>1*vHHSpc78_D8q-oT2bpkS6g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4a7e6-17fp8hi-cxgrcmycfg5ndjg.png</image:loc><image:title>1*7Fp8Hi-cXGrCMYCFG5NDJg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f5847-1hbic_jbekypjro9e3dbs9q.png</image:loc><image:title>1*hBIC_jbEKYpjro9e3dBS9Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6805e-1bvdrkstsgqj7qid3bq62kq.png</image:loc><image:title>1*bVDrKstsgQj7Qid3bQ62kQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3f78e-1mshi9-qf5zgjhue7okazaw.png</image:loc><image:title>1*MSHI9-Qf5ZgjhUE7OKAzAw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/23efb-1mdwsut0gbnmytvwofeqo_a.png</image:loc><image:title>1*mdWSUT0gBNMytVwOFeQo_A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/22ead-1saksvlrp7makzeq8fwrcjw.png</image:loc><image:title>1*SakSVlRp7MAkZeq8fWRCJw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c1611-1ow1eluezrq6cki63oghwxa.png</image:loc><image:title>1*oW1eLUEzRQ6CkI63OghwXA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/71134-1ngyzfpma4yaqxbm38pv4vg.png</image:loc><image:title>1*NGyzfpMA4YaqxbM38Pv4vg</image:title></image:image><lastmod>2020-09-07T05:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/07/sqlmap-v1-4-9-automatic-sql-injection-and-database-takeover-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d3ecc-sqlmap.png</image:loc><image:title>sqlmap</image:title></image:image><lastmod>2020-09-07T03:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/autovpn-create-on-demand-disposable-openvpn-endpoints-on-aws/</loc><lastmod>2020-09-06T21:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/tryhackme-hacking-a-vulnversity-machine/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/304f6-1db-unf7tmi0rjv_mi-gcaw.png</image:loc><image:title>1*DB-UnF7TMi0rJv_mI-GcAw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1af8e-1znsto3r-wkaagap8oe8pxg.png</image:loc><image:title>1*ZnSTo3r-WkAaGAp8oe8PXg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3d2ab-1nanmvv58zhowys5ouf75nw.png</image:loc><image:title>1*NaNMVV58zHOwYs5OUF75Nw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/933bc-1c_7h3wyg8ignanxzsmjtra.png</image:loc><image:title>1*c_7h3WYG8iGNanXZsmjtrA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/99200-1e1jpbxrjddtkanu_l-9zbg.png</image:loc><image:title>1*E1jpBxrJDdTkANu_L-9ZBg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3c1b7-1rwpcvqqsl9rclqwypwkkyw.png</image:loc><image:title>1*rwpcvQQSL9RclQwypWkKYw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9f99b-1pxp0chgaf-m0-apu4eyopq.png</image:loc><image:title>1*Pxp0cHgaf-m0-apU4EYoPQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c458f-1nvg5bvv53knr_wxw6xjrlw.png</image:loc><image:title>1*nvg5Bvv53KNr_wxW6xJrlw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d3d28-1gofb19zvuucrr-ukekarbw.png</image:loc><image:title>1*GOfb19zVUUCRR-UKEkarBw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b28e1-1mdhjg-z7mrythe74c6rxua.png</image:loc><image:title>1*MDHJg-z7mrYtHe74c6rXuA</image:title></image:image><lastmod>2020-09-06T18:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/file-manager-wordpress-plugin-zero-day-vulnerability-risked-thousands-of-websites/</loc><lastmod>2020-09-06T13:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/threema-chat-app-decides-to-go-open-source-in-coming-months/</loc><lastmod>2020-09-06T13:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/hi-george-do-you-want-your-shell-back/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/117d8-1xvy-9rgq8pavxiiq5cvj6g.jpeg</image:loc><image:title>1*xVY-9rGQ8pavxIIq5cVJ6g</image:title></image:image><lastmod>2020-09-06T12:51:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/vps-docker-for-pentest-create-a-vps-on-google-cloud-platform-or-digital-ocean-easily-with-the-docker-for-pentest/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/58d4a-vps-docker-for-pentest_4.png</image:loc><image:title>vps-docker-for-pentest_4</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/db493-vps-docker-for-pentest_3.png</image:loc><image:title>vps-docker-for-pentest_3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cf455-vps-docker-for-pentest_2.png</image:loc><image:title>vps-docker-for-pentest_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b9aae-vps-docker-for-pentest_1.png</image:loc><image:title>vps-docker-for-pentest_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a9577-vps-docker-for-pentest_1.png</image:loc><image:title>vps-docker-for-pentest_1</image:title></image:image><lastmod>2020-09-06T12:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/this-extensive-adobe-design-training-is-on-sale-for-just-50/</loc><lastmod>2020-09-06T12:13:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/06/wifi-pineapple-mark-vii-teaser/</loc><lastmod>2020-09-06T03:09:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/hardcodes-find-hardcoded-strings-from-source-code/</loc><lastmod>2020-09-05T22:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/remote%e2%80%8a-%e2%80%8ahackthebox-writeup-oscp-style/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/78e4c-1cx7v_olhxqitpqn0od68vg.png</image:loc><image:title>1*cx7V_OLhXQItPqn0od68vg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d2225-1a27mqkom8f1xkanc4czvuw.png</image:loc><image:title>1*a27mqkOM8f1xkanC4CZvUw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/cfbe6-1fug8a1gcsgeu1nlxal25cw.png</image:loc><image:title>1*Fug8A1GcsGeu1NLxal25Cw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/93d2f-1ezql4vi2ghdvvaaarbhumw.png</image:loc><image:title>1*eZQl4VI2gHdvVAAARbHUmw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5be3a-11dwa4b9ng_e4fki4f9l15a.png</image:loc><image:title>1*1dwa4b9Ng_E4fKI4F9l15A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/67c67-1bm9hufojvohbzt7rlrkfhg.png</image:loc><image:title>1*BM9HuFOJVohBZT7rLRkfHg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d7aab-1r46p4mkuc1fin-gera02xq.png</image:loc><image:title>1*r46P4mkuC1Fin-geRA02xQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b2bdd-1ezpke7wuab1kklva1w9mpa.png</image:loc><image:title>1*eZpKE7WUAB1KkLva1w9mPA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/75ec7-1fnkdxlcwj5pwhomsdmu7ig.png</image:loc><image:title>1*fnKdXLCwj5PWhOmSDMu7Ig</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a8fa9-1vljnknqx9gkbrwfueegztg.png</image:loc><image:title>1*vljnKnqx9gKbrWFUEeGzTg</image:title></image:image><lastmod>2020-09-05T21:51:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/windows-privesc-or-how-to-crack-the-tryhackme-steel-mountain-machine/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/18ed6-1-mzlydlbjpc7yylavqcfsw.jpeg</image:loc><image:title>1*-MzLYdlBJpC7YYlAvQCfSw</image:title></image:image><lastmod>2020-09-05T21:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/tryhackme-exploiting-eternalblue-vulnerability/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/73193-11sgd0y3j0b6n0rlxqw4iyw.png</image:loc><image:title>1*1SGD0y3j0b6n0RlXqw4Iyw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/97589-1fm3tjk5jzulcpg6jdzcgcw.png</image:loc><image:title>1*fm3tjk5JzuLcpg6JDZCgCw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fc95b-19oysrvj-xhctyvws0usyva.png</image:loc><image:title>1*9OYSrvJ-XHCTyvwS0uSYVA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d7008-1jnisxromgr8zhmm9b3qeqg.png</image:loc><image:title>1*jniSxROMGR8ZhmM9b3QeQg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/be8ce-1vw3uvsrzmijqrd6cgiobtg.png</image:loc><image:title>1*vW3UVsrzMijqRd6cGIobtg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2e710-1c5koyaxpfyb8zgbl_epd8w.png</image:loc><image:title>1*C5KoyAxpfYB8ZGBl_EpD8w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5bbf8-1xcntaef30jpr-moxvvc0xa.png</image:loc><image:title>1*xCntAEf30JpR-MOxvvC0xA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/da440-1exj6afai2atwcfye8ueyha.png</image:loc><image:title>1*ExJ6AfAi2ATWCfye8UEYhA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/98a0e-1mbqdukefacsgmzttsc1zow.png</image:loc><image:title>1*MBqdUKeFaCSgmZtTsc1zow</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/71c41-1obi5g3uoapqpl6o3iulngq.png</image:loc><image:title>1*OBi5g3uoAPQpL6O3IuLNGQ</image:title></image:image><lastmod>2020-09-05T20:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/source-code-analysis-and-api-keys-exploitations/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2c288-1uplbysattmr7wkf9pbccna.jpeg</image:loc><image:title>1*UplBysatTMr7wkf9PBCcNA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/28c1c-1lgs7u1ryebovio9t6oo0lg.jpeg</image:loc><image:title>1*Lgs7u1rYEboVIo9T6OO0lg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f1312-1ayvj_dmmzzaombk7nl0n9w.jpeg</image:loc><image:title>1*ayVJ_dmmzZAomBK7nL0N9w</image:title></image:image><lastmod>2020-09-05T19:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/how-to-spot-and-exploit-postmessage-vulnerablities/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3af75-1z3fqo1ht6sywcrhlbpp_tg.png</image:loc><image:title>1*Z3FqO1ht6sywcRHlBPP_tg</image:title></image:image><lastmod>2020-09-05T19:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/slack-patched-a-critical-rce-flaw-in-desktop-apps/</loc><lastmod>2020-09-05T16:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/terracotta-ad-fraud-botnet-targeted-android-play-store/</loc><lastmod>2020-09-05T13:47:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/malicious-npm-package-emerged-to-steal-browser-and-discord-data/</loc><lastmod>2020-09-05T13:47:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/qbot-trojan-comes-back-with-new-nasty-tricks-active-campaigns-detected/</loc><lastmod>2020-09-05T13:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/wordlist_generator-unique-wordlist-generator-of-unique-wordlists/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/86475-wordlist_generator.png</image:loc><image:title>wordlist_generator</image:title></image:image><lastmod>2020-09-05T13:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/new-instagram-phishing-scheme-aims-at-hacking-profiles/</loc><lastmod>2020-09-05T10:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/limesdr-setup-with-gnuradio-gr-limesdr-and-gqrx-on-ubuntu-20-04-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5ee94-1wkqcwfxqa5jweilcpwv-nw.png</image:loc><image:title>1*wKqcWfxQa5JWeiLcpWV-Nw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c9db1-1turksttc3mng2ukgwzrsra.png</image:loc><image:title>1*TUrKSttc3MNG2UKgWzRSrA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/23f80-1nlxt_kcjgjpbnl2kdjxpaq.png</image:loc><image:title>1*NLxT_kcJGjpBnL2KdjXPaQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8b88d-1fulnydkumt9k9azzq_hr5q.png</image:loc><image:title>1*FulNYdkuMt9K9Azzq_HR5Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/10f39-1vknrz8thvy9kv1ne-wgp2q.png</image:loc><image:title>1*VKnrZ8tHvy9kV1NE-WGp2Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/37ddd-1tlsmis1lzthabw_igbbwqq.png</image:loc><image:title>1*tlSmis1lzthAbw_iGBBWqQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5eb6e-1y3crkph7eoo7eug7lkl6-w.png</image:loc><image:title>1*Y3CrkPh7EoO7EUg7lKL6-w</image:title></image:image><lastmod>2020-09-05T08:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/limesdr-setup-with-gnuradio-gr-limesdr-and-gqrx-on-ubuntu-20-04/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/41817-1gcwck_qusya-lx8y5w1fpg.png</image:loc><image:title>1*GcWcK_QuSyA-lX8y5W1FPg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6b73d-1efpipb4gv3v3cuukgqh8hw.png</image:loc><image:title>1*efPIPb4Gv3V3CUUkgQH8Hw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8972b-1szt2jltlmxcp6cwgh7scka.png</image:loc><image:title>1*sZt2jlTlMXCP6cwGh7ScKA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/57775-1h9zulsbi649sogsbwanx7g.png</image:loc><image:title>1*H9zuLsbI649soGSBWAnx7g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c9d14-1g413iodracolvhw7ytteyg.png</image:loc><image:title>1*G413iODrAColvhw7YttEYg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f11b3-1gqhuqq6zhjx93i9g3rrnqw.png</image:loc><image:title>1*GQHUQq6ZhJX93I9G3rrNqw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2cce8-1hendrghoyqrpa-ubxzmejg.jpeg</image:loc><image:title>1*heNdrGHoYqRpA-UBXzmejg</image:title></image:image><lastmod>2020-09-05T08:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/05/faraday-v3-12-collaborative-penetration-test-and-vulnerability-management-platform/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2c1d6-faraday_1.gif</image:loc><image:title>faraday_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9bd3d-faraday_2.gif</image:loc><image:title>faraday_2</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c3827-faraday_3.gif</image:loc><image:title>faraday_3</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a822b-faraday_4.gif</image:loc><image:title>faraday_4</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3e14e-faraday.png</image:loc><image:title>FARADAY</image:title></image:image><lastmod>2020-09-05T04:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/h4rpy-automated-wpa-wpa2-psk-attack-tool/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/dd42a-h4rpy_1.png</image:loc><image:title>h4rpy_1</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fd2d7-h4rpy_2.png</image:loc><image:title>h4rpy_2</image:title></image:image><lastmod>2020-09-04T22:12:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/smb-cybersecurity-posture-weakened-by-covid-19-labs-report-finds/</loc><lastmod>2020-09-04T15:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/important-steps-to-take-after-a-data-breach/</loc><lastmod>2020-09-04T13:47:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/10-most-important-website-security-tips-to-protect-your-business/</loc><lastmod>2020-09-04T13:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/snicat-server-name-indication-concatenator/</loc><lastmod>2020-09-04T13:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/evilnum-hackers-targeting-financial-firms-with-a-new-python-based-rat/</loc><lastmod>2020-09-04T13:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/become-an-in-demand-salesforce-pro-with-this-25-bundle/</loc><lastmod>2020-09-04T12:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/perform-browser-osint-with-the-mitaka-extension-tutorial/</loc><lastmod>2020-09-04T01:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/04/use-mitaka-to-perform-in-browser-osint-to-identify-malware-sketchy-sites-shady-emails-more/</loc><lastmod>2020-09-04T00:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/geo-recon-an-osint-cli-tool-desgined-to-fast-track-ip-reputation-and-geo-locaton-look-up-for-security-analysts/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/84eab-geo-recon.png</image:loc><image:title>geo-recon</image:title></image:image><lastmod>2020-09-03T22:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/pci-dss-compliance-why-its-important-and-how-to-adhere/</loc><lastmod>2020-09-03T21:26:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/how-a-badly-configured-db-allowed-us-to-own-an-entire-cloud-of-over-25k-hosts-part-2-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/546ee-1yaawndyge2dsdikpv3ovsw.png</image:loc><image:title>1*yaawnDYGe2DsdikPV3oVSw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9abce-1wfhjxqf9a1byvfmapbmcka.png</image:loc><image:title>1*WFHJXQF9a1ByvfmapbmcKA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ddb74-1abfvdihu-0kpte5fcfgkyw.png</image:loc><image:title>1*aBfVDIHU-0kptE5FcFgkYw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/da407-1gmnt3xnb4yjpgujveq9fzw.png</image:loc><image:title>1*GmnT3XnB4YjPgujveq9fZw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c56b2-1sb0tn1ozppurttm6zvkmba.png</image:loc><image:title>1*SB0tN1oZPPurTtM6zVKMBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/08ae1-1nf7w7vc6b5nxb8ehjvfaug.png</image:loc><image:title>1*nF7w7VC6B5NxB8EHJVFaug</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/7d011-1mao9bjjr1ykkoqxdxhsipq.png</image:loc><image:title>1*mAO9BJjR1YkKoqxdxhsiPQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/8886e-1u4cvw1u-rpgids91ojwoag.jpeg</image:loc><image:title>1*u4cvW1U-rpgIDs91ojWoag</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1144c-1zbcu6guam6n1ccq9yznnuq.jpeg</image:loc><image:title>1*zbCu6GUam6N1CCQ9YznNuQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/40ace-1kgmimohv-xz2txjhskdiwg.png</image:loc><image:title>1*kgMiMohV-Xz2tXJHSkDiWg</image:title></image:image><lastmod>2020-09-03T18:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/bbrecon-python-library-and-cli-for-the-bug-bounty-recon-api/</loc><lastmod>2020-09-03T13:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/a-juicy-endpoint-on-the-taboola-leads-to-reveal-internal-ips-and-xss/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/47910-1bsziizy2wqncd58yhjrnoq.png</image:loc><image:title>1*bsZiIzY2WqnCD58yhJrnoQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9d71c-1tteslv9ofussnkk0ruajww.png</image:loc><image:title>1*tteSLV9OfuSsNkk0RuajWw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/bc6cf-1sbpavckbowvnwq4lljph-g.png</image:loc><image:title>1*sbPavcKbOwvnWq4LlJpH-g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/590b1-1cymrm0k5hh3_3oyzqdijva.png</image:loc><image:title>1*cymRm0K5hh3_3oYzqDIjvA</image:title></image:image><lastmod>2020-09-03T12:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/researchers-hijacked-unsecured-printers-to-demonstrate-how-to-secure-them/</loc><lastmod>2020-09-03T10:47:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/the-best-video-editor-apps-for-android/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3dc15-best-video-editor-apps-android.jpg</image:loc><image:title>Best-Video-Editor-Apps-Android</image:title></image:image><lastmod>2020-09-03T10:43:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/live-webinar-xdr-and-beyond-with-autonomous-breach-protection/</loc><lastmod>2020-09-03T09:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/cisco-jabber-bug-could-let-hackers-target-windows-systems-remotely/</loc><lastmod>2020-09-03T09:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/how-i-hacked-your-vending-machine/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/078e6-168npd2ahgjxfz89emf7mgq.png</image:loc><image:title>1*68nPd2ahGjXFZ89Emf7MGQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/86dfd-1iyyjmfuojfji8dw7h7-_gg.jpeg</image:loc><image:title>1*IyyjMFUoJFjI8DW7h7-_Gg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/282c1-15rgugyoabhaormne28jngw.jpeg</image:loc><image:title>1*5rGuGYOABHaORMnE28JnGw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/03ac3-1nfnn2xdzxppxiycmtx1aqw.png</image:loc><image:title>1*NfNn2xdZXPpXIYcmtX1aqw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1d9d6-1uy16nlgviro30unq8ickta.png</image:loc><image:title>1*uY16nlGVIro30unQ8ICKtA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f34ac-1pgi3v3hq5ov2oq_nlolihg.jpeg</image:loc><image:title>1*Pgi3V3HQ5Ov2OQ_nlOlIhg</image:title></image:image><lastmod>2020-09-03T08:53:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/how-to-hack-jerry-from-hackthebox/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6d51c-08jso4br268uv3cbq.png</image:loc><image:title>0*8JsO4BR268UV3cBq</image:title></image:image><lastmod>2020-09-03T08:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/03/how-to-use-linux-smart-enumeration-to-discover-paths-to-privesc/</loc><lastmod>2020-09-03T00:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/master-aws-with-this-extensive-30-training-bundle/</loc><lastmod>2020-09-02T23:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/spacesiren-a-honey-token-manager-and-alert-system-for-aws/</loc><lastmod>2020-09-02T22:12:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/how-to-keep-k-12-distance-learners-cybersecure-this-school-year/</loc><lastmod>2020-09-02T18:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/lolbits-v2-0-0-c2-framework-that-uses-background-intelligent-transfer-service-bits-as-communication-protocol-and-direct-syscalls-dinvoke-for-edr-user-mode-hooking-evasion/</loc><lastmod>2020-09-02T13:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/cisco-alerts-about-ios-xr-zero-day-under-active-exploitation/</loc><lastmod>2020-09-02T12:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/microsoft-warns-of-another-anubis-malware-targeting-windows/</loc><lastmod>2020-09-02T12:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/ss7-attack-panel-yet-another-rising-scam-on-social-media/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e9be5-1enbvljbgvoyylygopdy3sg.png</image:loc><image:title>1*enBVLjbgvOyYLYgOpDY3sg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c8a0b-1ezvfq_zz50zx04euwox1sa.png</image:loc><image:title>1*EzVfQ_ZZ50Zx04EuwoX1sA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/38a8f-1uu-wajj8a9u4oidqdytkww.png</image:loc><image:title>1*UU-WAjj8A9U4oIdQdYTKww</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/492a9-1rvzahoo2mlixf_7un5q04q.png</image:loc><image:title>1*rvZAHOo2MliXF_7un5q04Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ded7d-1uyljk97tzl8yobuhoilqpa.png</image:loc><image:title>1*uylJk97tzl8yOBuHOilQpA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4aec8-1hkbsyusfq6micjhvaes8mq.png</image:loc><image:title>1*HkbsyUsfq6mIcJhVaes8mQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/302e1-1gxrp_jhsxvovrl3_d6sp5q.png</image:loc><image:title>1*gXrp_jHsxvOVRl3_D6Sp5Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/32d85-1mgkrscmrm13ndojkay-xfa.png</image:loc><image:title>1*mgkrscmrM13NDoJkay-xFA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a97e5-1qivrlugi7rrfhcmx3okuba.jpeg</image:loc><image:title>1*qiVrLuGI7RRfHCmx3okUBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/57026-1m38_vw8l_pcrcmphztp_sa.jpeg</image:loc><image:title>1*M38_vW8l_PcrcMphZTP_SA</image:title></image:image><lastmod>2020-09-02T11:51:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/new-web-based-credit-card-stealer-uses-telegram-messenger-to-exfiltrate-data/</loc><lastmod>2020-09-02T09:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/how-a-badly-configured-db-allowed-us-to-own-an-entire-cloud-of-over-25k-hosts-part-1-2/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c322c-1_jynihdfix5rctyu5zff0g.png</image:loc><image:title>1*_jynIhdFIX5RctyU5zfF0g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/02bf4-1jyqwk1gei73m65b9_s1tzq.png</image:loc><image:title>1*JyQWK1GEI73M65b9_s1TZQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a02e6-1iamqubbmpfbesclekhyfaw.jpeg</image:loc><image:title>1*IamQuBbmPFBesCleKhYFaw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/fce0c-1aenwz6eblfq7wc5iyqjc-w.png</image:loc><image:title>1*AEnWz6EbLfQ7Wc5IyQjC-w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/bb6cd-1mqnlqlthhd38ip53jarfdw.png</image:loc><image:title>1*MQnLqlThhd38ip53jaRfDw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/81e68-1t52wvgarryjuudrzp8xraa.png</image:loc><image:title>1*T52WVgaRRYJUUdrZP8xRAA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5227c-1xgvpd2xwcanuhogixuknnw.png</image:loc><image:title>1*xgVPd2xwcAnUhOGiXUKNNw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9b58b-1pqklynf3jpo6tdlzvfw4aw.png</image:loc><image:title>1*pqkLyNf3JPO6tdlZvfW4aw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/22b42-1imuu8jibbjyepyrfhwpwvq.png</image:loc><image:title>1*IMuU8JibbjyEPYRfhwPWvQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9fad2-1rnztgahtkm53_el_bim08a.png</image:loc><image:title>1*rnzTGAhtkM53_EL_bIm08A</image:title></image:image><lastmod>2020-09-02T07:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/02/a-short-story-of-idor-to-account-takeover/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5e15e-1rtqtm5ecf6rv4oekbhpvdw.png</image:loc><image:title>1*RtQTM5ecf6Rv4OeKbHpvdw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d2762-10j07kg4gzpurlo9hwunvmw.png</image:loc><image:title>1*0J07Kg4gzpURlo9HwuNvmw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c94b0-1l3rxesrsggx1-7km-ml4zw.png</image:loc><image:title>1*L3rxEsRsGgx1-7kM-Ml4Zw</image:title></image:image><lastmod>2020-09-02T06:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/73-wannacry/</loc><lastmod>2020-09-02T05:57:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/how-to-hack-wi-fi-automating-wi-fi-hacking-with-besside-ng/</loc><lastmod>2020-09-01T22:12:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/killchain-a-unified-console-to-perform-the-kill-chain-stages-of-attacks/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d0ce5-killchain2.png</image:loc><image:title>killchain2</image:title></image:image><lastmod>2020-09-01T22:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/how-hackers-hack-wi-fi-automatically-using-besside-ng/</loc><lastmod>2020-09-01T19:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/bypassing-pins-on-contactless-visa-cards-tesla-targeted-cyberattack-fail-threatwire/</loc><lastmod>2020-09-01T19:09:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/what-problem-solving-actually-looks-like/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/94d80-1zz5-zmcwvfwxaneugsvxyg.png</image:loc><image:title>1*Zz5-ZmcWvfWxaNeUGSvXyg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/aa8e9-1rjkg-cblilvpszjzxchuyg.png</image:loc><image:title>1*rJkG-cblIlvPSzjzXChUYg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e8628-18rpdbsidkqcsw-saqctlpq.png</image:loc><image:title>1*8rPDbsiDkqCSW-SAQCtlpQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0bd72-1nrgju7ggajjjzntkmj-ynq.png</image:loc><image:title>1*nRGjU7ggaJjjZnTkmj-ynQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/420e0-1px-71pe7zvl-syli8vsciq.png</image:loc><image:title>1*Px-71pe7ZVl-SyLi8VsCiQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/dfaa0-1urfzvqfj8qwqnjtzjohsnq.png</image:loc><image:title>1*UrfzvQFJ8qWqnJtZJOhsNQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a62ff-1b1nvt99zblsuqytsbwrjyq.png</image:loc><image:title>1*B1nvt99ZbLsuqytSbWRjyQ</image:title></image:image><lastmod>2020-09-01T18:51:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/hacking-windows-10-how-to-bypass-virustotal-amsi-detection-signatures-with-chimera/</loc><lastmod>2020-09-01T16:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/oswe-like-boxes-series-0x01%e2%80%8a-%e2%80%8ahtb-blocky-write-up/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3da12-1le5abbi4c0kudpuxzizhna.png</image:loc><image:title>1*Le5ABBi4c0KUDpuXZizhNA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/6acc0-1js5k8twwtukcxpo_buzbiq.png</image:loc><image:title>1*JS5k8TWWtUkCxPo_BuzBIQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/92c00-1w840xg82kp2nzk8hmbsljq.png</image:loc><image:title>1*W840xG82kP2NzK8hmBslJQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3cac0-1kjnkoqkivzt-rxvryu5t3w.png</image:loc><image:title>1*kJNKoqKiVzT-rxVRYU5T3w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/45230-1vasx_l8oe5ekm-wzi76bia.png</image:loc><image:title>1*vAsx_L8OE5Ekm-WZi76biA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/531d4-1jqd5drh-qmq58r_uj5xtfw.png</image:loc><image:title>1*jQd5DRh-qmQ58R_UJ5xtFw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/36245-1t0110rbe4xveszmbr1daog.png</image:loc><image:title>1*T0110RBe4xVEsZmBr1dAOg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/1e25b-1wx5xxoes3xzmcsqobzc9dg.png</image:loc><image:title>1*Wx5XxoeS3XZMcSQObzC9dg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0018e-1svuvmb52cacyx0o1b2d7wa.png</image:loc><image:title>1*SVuvmb52CAcyx0o1B2d7WA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/98756-1oxdj8tuzfkjwhahrrfu2xw.png</image:loc><image:title>1*oXDj8tuZfKjWHahrRfU2Xw</image:title></image:image><lastmod>2020-09-01T15:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/new-web-skimmer-steals-credit-card-data-sends-to-crooks-via-telegram/</loc><lastmod>2020-09-01T15:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/hackthebox-popcorn/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/c34ce-1fcrnkqqkidhuffcla3toiq.png</image:loc><image:title>1*fcRNKQQKidhUfFcLA3toIQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/5be0b-1pxyifsfekeknhbiejx7skw.png</image:loc><image:title>1*pxyIFSfEKEKNhbiEJx7SKw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9edb6-1_g1ewoacftxjuhh8mgbxpw.png</image:loc><image:title>1*_G1EWOAcFtxjUHh8mGbXpw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/acc22-1ezq1tlkgilrcmqltdpgrfq.png</image:loc><image:title>1*Ezq1TlKGIlRCMQLTDPGRFQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/a8975-15pmgpzpajaexw4d9exwa-a.png</image:loc><image:title>1*5pMGpZPajaExw4d9exwA-A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/15981-1crvjcngawybixwb00ock_q.png</image:loc><image:title>1*cRvJCNGaWYBiXWb00Ock_Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/bad3e-1xhtjxzhhd4-xxqcrhulrpa.png</image:loc><image:title>1*xHTjxZHhD4-xxqCRHulRPA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/f7dc7-1pcrfzcga1djdwzlpahootg.png</image:loc><image:title>1*PcRFZCGA1djdwZLPAHOOTg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/d0041-18zhvqsrzzs83cc6idq9qfw.png</image:loc><image:title>1*8ZHVQsRzZS83Cc6IDq9QFw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/ec1d7-1rdusdzpbhilvykoeim9zlg.png</image:loc><image:title>1*rDUSDZpBHIlvyKOeiM9Zlg</image:title></image:image><lastmod>2020-09-01T14:51:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/tryhackme-reversing-elf-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/4fc3e-1p7cgoxta1drtmy3qocak8q.png</image:loc><image:title>1*P7cgoxTA1DRTMy3qoCaK8Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/e3ca6-19l4_m4xkea6dppt6zkanvq.png</image:loc><image:title>1*9L4_M4XKeA6DpPt6ZkanvQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/2a7f6-168bhsucrfp__f0s1xfpzra.png</image:loc><image:title>1*68bhSUCrFP__f0S1xFPzrA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/690c4-1tz1cmoygf3ap0phuhtl4ta.png</image:loc><image:title>1*tZ1cmoygf3aP0pHUHtL4TA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/21800-1xpib_mj_ascvi-g3g7idzw.png</image:loc><image:title>1*XPiB_mj_AsCvI-g3G7IDZw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/0958c-1ttuovfd7v6z_sxp6wq_jpq.png</image:loc><image:title>1*TtUOvfD7v6z_Sxp6Wq_jPQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/aa840-1i2h_kvphpjuhrnmcjbhc_g.png</image:loc><image:title>1*i2H_kvPhPJUHRnmcjBHC_g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b5ac5-1v2oagct0svzjpp-9txej3g.png</image:loc><image:title>1*V2OaGCt0sVZjPp-9TxEJ3g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/98060-1fvhhzwgokdic8dj4e2fcrg.png</image:loc><image:title>1*FvHhzwgoKDIC8dJ4E2fcrg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/69f10-1zzpdn3rw2zvjecwf3sfxnw.png</image:loc><image:title>1*zZPDn3RW2zVjECWF3sFXnw</image:title></image:image><lastmod>2020-09-01T14:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/crossc2-generate-cobaltstrikes-cross-platform-payload/</loc><lastmod>2020-09-01T13:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/unhiding-the-hidden/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/b4a39-1l2mvebmqeqy3dlppzsynsq.png</image:loc><image:title>1*L2mvebMqEQy3dlpPzsYnsQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/9ee3c-1jomnwlge7-b4eh_6v_ipia.png</image:loc><image:title>1*joMnwLGE7-b4eH_6V_ipIA</image:title></image:image><lastmod>2020-09-01T11:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/vulnerability-in-wolfssl-could-allow-mitm-attacks-patch-available/</loc><lastmod>2020-09-01T10:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/android-bug-could-allow-malicious-apps-to-steal-user-data-from-other-apps/</loc><lastmod>2020-09-01T10:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/maximum-lifespan-of-ssl-tls-certificates-is-398-days-starting-today/</loc><lastmod>2020-09-01T10:09:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/vps-cheatsheet-for-bug-hunting/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/09/3e9ee-1d_vdt6jtz97tjzrkvobz5g.png</image:loc><image:title>1*D_vdT6jTz97TJzRkvObz5g</image:title></image:image><lastmod>2020-09-01T08:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/cisco-issues-warning-over-ios-xr-zero-day-flaw-being-targeted-in-the-wild/</loc><lastmod>2020-09-01T08:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/numerous-vulnerabilities-found-in-pulse-secure-vpn-update-now/</loc><lastmod>2020-09-01T07:47:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/lucifer-malware-comes-back-targeting-linux-systems/</loc><lastmod>2020-09-01T07:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/09/01/canadian-firm-canpar-express-becomes-ransomware-attack-victim/</loc><lastmod>2020-09-01T07:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/31/dvs-dcom-vulnerability-scanner-aka-devious-swiss-army-knife/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/13010-dvs_1_devious.png</image:loc><image:title>DVS_1_DEVIOUS</image:title></image:image><lastmod>2020-08-31T22:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/31/apples-notarization-process-fails-to-protect/</loc><lastmod>2020-08-31T17:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/31/lock-and-code-s1ep14-uncovering-security-hubris-with-adam-kujawa/</loc><lastmod>2020-08-31T16:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/31/mihari-a-helper-to-run-osint-queries-manage-results-continuously/</loc><lastmod>2020-08-31T13:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/sourcewolf-amazingly-fast-response-crawler-to-find-juicy-stuff-in-the-source-code/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/1c750-sourcewolf_1_logo.png</image:loc><image:title>SourceWolf_1_logo</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/e553f-sourcewolf_6_crawl.jpeg</image:loc><image:title>SourceWolf_6_crawl</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/d9c29-sourcewolf_7_brute.jpeg</image:loc><image:title>SourceWolf_7_brute</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/107e4-sourcewolf_8_update.jpeg</image:loc><image:title>SourceWolf_8_update</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9e87d-sourcewolf_9_update-info.jpeg</image:loc><image:title>SourceWolf_9_update-info</image:title></image:image><lastmod>2020-08-30T22:12:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/iblessing-an-ios-security-exploiting-toolkit-it-mainly-includes-application-information-collection-static-analysis-and-dynamic-analysis/</loc><lastmod>2020-08-30T13:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/top-free-sports-streaming-sites-for-sport-lovers/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/494d0-free-sports-streaming-sites.jpg</image:loc><image:title>Free-Sports-Streaming-Sites</image:title></image:image><lastmod>2020-08-30T12:43:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/get-50-educational-apps-for-your-kids-for-just-20/</loc><lastmod>2020-08-30T12:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/cryptobay-cz-analysis-a-bunch-of-other-fraudulent-services-hosted-on-a-single-ip-address-revealed/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/4d39d-1mtdlo0lmc0_pjlfp8dadla.jpeg</image:loc><image:title>1*MTdLo0lMc0_PjLFP8DadlA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/15e8a-1qjnptjtf_fo5e8wuldqgyw.jpeg</image:loc><image:title>1*qJNptJtF_fO5e8WuLDqGYw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/6703d-1gtpmskh4vjmlebzct9e6oa.jpeg</image:loc><image:title>1*gTPMSkH4VJMlEBZCt9e6oA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/439fe-10v9f9ey_ippjxqd0e0h_ea.jpeg</image:loc><image:title>1*0v9f9Ey_IppJXQd0E0H_eA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/4486e-1swkwdkgziqpwyptjldxj5w.jpeg</image:loc><image:title>1*swkwDKGziQpWyPtJlDxJ5w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/da6b2-1ohcjvxjhdhz7kxpbowze9q.jpeg</image:loc><image:title>1*ohCjvxJhDHz7KXPbowze9Q</image:title></image:image><lastmod>2020-08-30T07:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/30/lets-secure-wfh-in-kerberos-way/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/4c050-13mlntgudln97pass8rwtgg.png</image:loc><image:title>1*3MLNtGudLN97pAsS8RWTGg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/84c12-1kqar09gus6qebnfxdq8yag.png</image:loc><image:title>1*kqAR09GuS6qebnFxDQ8YAg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/b058c-16vowjx2nr10r7dy_tzx1gw.png</image:loc><image:title>1*6vowJx2NR10R7Dy_tZx1Gw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/d8f3d-1fef7wyyeccudm8_nf33ozq.png</image:loc><image:title>1*FeF7wYyeccuDm8_nF33OzQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/86836-1wmbbtf5cy-_l54mseh7caw.png</image:loc><image:title>1*WmbBTf5cy-_l54MsEH7cAw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/32ca8-1o3hlpctjh0wabyk5t-sqmq.png</image:loc><image:title>1*O3hlPCTjH0waByK5T-SQMQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9fc2b-10yxxlg9i3lx4sxef-v1u9q.jpeg</image:loc><image:title>1*0YxxLG9I3lX4Sxef-V1U9Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/e6251-1f6uzhxamj2r4a-nf3xmifq.gif</image:loc><image:title>1*f6uZHXamJ2R4a-nf3xmiFQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/798a9-1pmzb1bnwfzka1qxdiymlfa.png</image:loc><image:title>1*Pmzb1BNWFZkA1QxdiymlFA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/97e4f-1tj007hzkbijdqeynyus95a.jpeg</image:loc><image:title>1*Tj007HZKbIjdQEYnyUS95A</image:title></image:image><lastmod>2020-08-30T07:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/urlgrab-a-golang-utility-to-spider-through-a-website-searching-for-additional-links/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/b2b4f-urlgrab.png</image:loc><image:title>urlgrab</image:title></image:image><lastmod>2020-08-29T22:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/osintgram-a-osint-tool-on-instagram/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/fa681-osintgram_4_cmd.png</image:loc><image:title>Osintgram_4_cmd</image:title></image:image><lastmod>2020-08-29T13:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/telegram-data-leak-exposes-millions-of-records-on-darknet/</loc><lastmod>2020-08-29T12:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/a-quick-guide-to-digital-tourism-and-destination-marketing/</loc><lastmod>2020-08-29T08:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/the-importance-of-keeping-up-to-date-or-how-i-found-an-interesting-bug-thanks-to-a-tweet/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/a7c6f-1kljz8cm0fokuimw05gniuw.png</image:loc><image:title>1*kljZ8cM0fOkUimw05Gniuw</image:title></image:image><lastmod>2020-08-29T05:51:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/exploit-webdav-on-a-server-get-a-reverse-shell-tutorial/</loc><lastmod>2020-08-29T01:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/how-to-exploit-webdav-on-a-server-get-a-shell-2/</loc><lastmod>2020-08-29T01:12:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/29/how-to-exploit-webdav-on-a-server-get-a-shell/</loc><lastmod>2020-08-29T00:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/vulnerable-ad-create-a-vulnerable-active-directory-thats-allowing-you-to-test-most-of-active-directory-attacks-in-local-lab/</loc><lastmod>2020-08-28T22:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/how-to-hack-bastion-from-hackthebox/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/effc6-1fmdygqvhynufm2ktdrplca.png</image:loc><image:title>1*FmDyGQVhYNUfm2KtdrPLcA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/e54c3-1avyfrdnzlx0t8fr3hwysea.png</image:loc><image:title>1*AvYFRDNzLX0t8fr3hWySEA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/72faa-1yzxq8matdb99wpibk2qx1g.png</image:loc><image:title>1*YZXQ8MATDB99wPIbK2qx1g</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/97838-1u5ujl169atjseygpr-glcg.png</image:loc><image:title>1*U5UJL169atJSeyGpr-GLcg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9dd02-1vjvvnvwqrcxdcvjzoowrtg.png</image:loc><image:title>1*vjvVNvwQRcxdcVjzoowRtg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/a8ee6-1bufizl82-ggztv_kghybmq.png</image:loc><image:title>1*buFiZl82-GgzTv_kghybmQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9980e-1g8wp6-abj81hofb00xlr4w.png</image:loc><image:title>1*g8WP6-aBJ81HofB00XlR4w</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/4922e-155gkkxbscs-fqz1alftlgg.png</image:loc><image:title>1*55gKKxbScs-FQZ1aLFTlgg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/81d76-1ropmckk7iewh6dn8l2wwca.png</image:loc><image:title>1*rOPmCKK7iEwh6Dn8l2wWCA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/53c27-1z8iihd1gfperdypszlfotq.png</image:loc><image:title>1*z8IIHD1gfPeRDYPSzlfOTQ</image:title></image:image><lastmod>2020-08-28T17:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/bluescan-a-powerful-bluetooth-scanner-for-scanning-br-le-devices-lmp-sdp-gatt-and-vulnerabilities/</loc><lastmod>2020-08-28T13:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/learn-java-with-this-best-selling-bundle-for-just-36/</loc><lastmod>2020-08-28T11:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/iranian-hackers-pose-as-journalists-to-trick-victims-into-installing-malware/</loc><lastmod>2020-08-28T11:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/tryhackme-internal-writeup/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/6923e-1se-zqwtx5xkfjpa5yoectg.png</image:loc><image:title>1*Se-zqwtx5XkfjPA5yoECtg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9f7b0-1pxznoi25e1pcmetu4ditaa.png</image:loc><image:title>1*PXZnoI25E1pcmetU4dITaA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/733cf-1_uvt-m5aildxxynbxr44vw.png</image:loc><image:title>1*_Uvt-m5AIlDXxYnbXr44Vw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/464af-1ku3uizhowdquepastdcuza.png</image:loc><image:title>1*Ku3uIZhowDqUEPAstDCuZA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/836fc-1xqggraa7n3sucqw3-qsgla.png</image:loc><image:title>1*xqGgraa7n3suCQW3-qSglA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9f69e-1euim-q4dvos8bu5-vvihka.png</image:loc><image:title>1*eUiM-Q4dVOs8bU5-VVihKA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/d03bb-1khlibih5ckxnhpkwjta9cg.png</image:loc><image:title>1*KHLibih5cKxnHpKwjtA9cg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/498c4-1puc1qgbk_oh_kid-rwzqaa.png</image:loc><image:title>1*Puc1Qgbk_oh_KId-RWZqaA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/0b0f9-1qo_xcep88gt6vumvkpwbba.png</image:loc><image:title>1*QO_XceP88Gt6vuMVkpWbBA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/9ca98-1cd_xc14bsp-yc2jpqkuprw.png</image:loc><image:title>1*Cd_Xc14BsP-Yc2JpqKUpRw</image:title></image:image><lastmod>2020-08-28T10:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/28/top-10-google-hidden-games/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/6833c-google-hidden-games.jpg</image:loc><image:title>Google-Hidden-Games</image:title></image:image><lastmod>2020-08-28T09:43:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/how-to-fuzz-parameters-directories-more-with-ffuf/</loc><lastmod>2020-08-27T23:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/sharphose-asynchronous-password-spraying-tool-in-c-for-windows-environments/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/36e5c-h135.png</image:loc><image:title>h135</image:title></image:image><lastmod>2020-08-27T22:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/missing-person-scams-what-to-watch-out-for/</loc><lastmod>2020-08-27T15:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/bashtop-linux-osx-freebsd-resource-monitor/</loc><lastmod>2020-08-27T13:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/how-to-keep-your-vps-based-project-secured/</loc><lastmod>2020-08-27T11:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/google-patched-serious-code-execution-bug-with-chrome-85/</loc><lastmod>2020-08-27T11:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/qakbot-banking-trojan-returned-with-new-sneaky-tricks-to-steal-your-money/</loc><lastmod>2020-08-27T10:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/accessing-the-website-directly-through-its-ip-address-a-case-of-a-poorly-hidden-sql-injection/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/fc733-1oh_ulc8t1ftgbgsbbxdzsq.png</image:loc><image:title>1*OH_ULC8T1fTgBGsBBxdZSQ</image:title></image:image><lastmod>2020-08-27T08:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/27/hacking-windows-10-how-to-evade-detection-of-netstat-tasklist/</loc><lastmod>2020-08-27T00:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/hack-tools-the-all-in-one-red-team-extension-for-web-pentester/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/30ca1-hack-tools_12.png</image:loc><image:title>Hack-Tools_12</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/41145-hack-tools_11.png</image:loc><image:title>Hack-Tools_11</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/8b180-hack-tools_10.png</image:loc><image:title>Hack-Tools_10</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/1f78f-hack-tools_9.png</image:loc><image:title>Hack-Tools_9</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/72ff6-hack-tools_8.png</image:loc><image:title>Hack-Tools_8</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/93b68-hack-tools_7.png</image:loc><image:title>Hack-Tools_7</image:title></image:image><lastmod>2020-08-26T22:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/russian-arrested-after-offering-1-million-to-u-s-company-employee-for-planting-malware/</loc><lastmod>2020-08-26T19:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/10-most-effective-e-commerce-fraud-detection-tools-in-2020/</loc><lastmod>2020-08-26T18:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/the-ins-and-outs-of-rpa-technology/</loc><lastmod>2020-08-26T18:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/good-news-stalkerware-survey-results-show-majority-of-people-arent-creepy/</loc><lastmod>2020-08-26T15:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/ezemu-simple-execution-of-commands-for-defensive-tuning-research/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/f19cb-ezemu_1_ezemu.gif</image:loc><image:title>ezEmu_1_ezEmu</image:title></image:image><lastmod>2020-08-26T13:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/all-about-blind-xss-for-beginners/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/beca2-1ywmgz7tvfmxewcduw2zabq.jpeg</image:loc><image:title>1*YWmgz7tVfmxEwcduw2ZabQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/f0845-12vvc2q_xrkl4zfqhjw0w3w.jpeg</image:loc><image:title>1*2VvC2q_XrKL4ZFqHjw0W3w</image:title></image:image><lastmod>2020-08-26T11:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/managing-the-insider-threat-of-remote-workers/</loc><lastmod>2020-08-26T11:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/best-bitcoin-practice-for-new-users/</loc><lastmod>2020-08-26T11:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/bitcoin-vs-other-cryptocurrencies/</loc><lastmod>2020-08-26T11:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/safari-bug-that-allows-stealing-data-disclosed-after-apple-delays-a-patch/</loc><lastmod>2020-08-26T11:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/carnival-corporation-cruise-operator-suffered-ransomware-attack/</loc><lastmod>2020-08-26T11:47:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/break-into-game-development-with-this-40-bundle/</loc><lastmod>2020-08-26T10:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/26/apt-hackers-exploit-autodesk-3d-max-software-for-industrial-espionage/</loc><lastmod>2020-08-26T10:09:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/volexp-volatility-explorer/</loc><lastmod>2020-08-25T22:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/new-botnet-hits-ssh-servers-bernie-calls-for-nationwide-biometric-privacy-threatwire/</loc><lastmod>2020-08-25T19:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/building-a-siem-combining-elk-wazuh-hids-and-elastalert-for-optimal-performance/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/285bc-1tzx8wvnv42alxezmfslixw.png</image:loc><image:title>1*Tzx8WVNv42aLxEzMFsliXw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/16e70-1vgtteoqn5qmz2oucayvvpa.png</image:loc><image:title>1*VgtteOQN5qmz2oUcaYVvpA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/5963c-1xpsj8isuwcgjf_m28zly6a.png</image:loc><image:title>1*xpsJ8isuwcGjf_M28ZLy6A</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/2adb2-1mes0oy-i2gazg-pettu-za.png</image:loc><image:title>1*MES0oy-i2gazG-Pettu-ZA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/2c0e4-1sts2oaxhnpfaoi8usg1-qw.png</image:loc><image:title>1*Sts2OaXHnPfAOi8uSg1-Qw</image:title></image:image><lastmod>2020-08-25T18:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/the-cybersecurity-skills-gap-is-misunderstood/</loc><lastmod>2020-08-25T15:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/numerous-vulnerabilities-found-in-discount-rules-for-woocommerce-plugin/</loc><lastmod>2020-08-25T14:47:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/university-of-utah-suffered-ransomware-attack-paid-ransom-to-recover/</loc><lastmod>2020-08-25T14:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/wildcards-understanding-and-using-for-hacking/</loc><lastmod>2020-08-25T14:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/aws-recon-multi-threaded-aws-inventory-collection-tool-with-a-focus-on-security-relevant-resources-and-metadata/</loc><lastmod>2020-08-25T13:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/google-researcher-reported-3-flaws-in-apache-web-server-software/</loc><lastmod>2020-08-25T11:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/google-drive-vulnerability-allows-spearphishing-attacks/</loc><lastmod>2020-08-25T11:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/25/popular-ios-sdk-caught-spying-on-billions-of-users-and-committing-ad-fraud/</loc><lastmod>2020-08-25T11:02:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/how-to-conduct-a-pentest-like-a-pro-in-6-phases/</loc><lastmod>2020-08-24T22:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/yeti-your-everyday-threat-intelligence/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/4124c-h115.png</image:loc><image:title>h115</image:title></image:image><lastmod>2020-08-24T21:42:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/write-up-12-thm-bolt/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/0e018-0lgzbsyyiak9bn8k2.png</image:loc><image:title>0*lgzbSYYIAk9bN8k2</image:title></image:image><lastmod>2020-08-24T20:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/latest-posts/</loc><lastmod>2020-08-24T20:01:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/expdev-vulnserver%e2%80%8a-%e2%80%8apart-7/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/456d2-0tmk1akokxpyqn9pk.png</image:loc><image:title>0*TMK1akokXpyqn9PK</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/c0afd-18gdmugmincdcjfruc0kawq.png</image:loc><image:title>1*8GDMUGMInCdCjfRUC0kAwQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/2d63f-1eikhkfrubc9_odft_uwmlq.png</image:loc><image:title>1*EikhKFrubc9_ODFT_UwMLQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/a2579-1e168oqfaehquiytasixvxq.png</image:loc><image:title>1*e168OQfAehQuiytASIXVxQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/7c636-10sn5qrxveblcpeepf9knpg.png</image:loc><image:title>1*0SN5qRXVebLCPeePF9Knpg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/ba4c6-1mcferja0k39mli68cpemba.png</image:loc><image:title>1*mCfErJa0k39mLI68cpembA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/442f9-1rfseq-tge8qr2ebpaqmmyg.png</image:loc><image:title>1*rFSEQ-tGE8qR2eBpAQMMyg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/be068-1giobfl7mo0uphh0ktxd2qa.png</image:loc><image:title>1*gIoBFl7mO0UPhh0ktXd2qA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/52277-1c0k5xp2hruyy8uwdo8-5pw.png</image:loc><image:title>1*C0K5Xp2Hruyy8uWdO8-5pw</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/c2277-11pv4qlt1j34a67d4il9-2q.png</image:loc><image:title>1*1pv4QLt1j34a67d4Il9-2Q</image:title></image:image><lastmod>2020-08-24T19:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/tryhackme-overpass-2%e2%80%8a-%e2%80%8ahacked-walkthrough/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/73e7e-1sbmqinghmlb2wv5sxplmaq.png</image:loc><image:title>1*sbmQINGHMlB2wv5sXpLmaQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/cae90-1ladmmecc-shvvlspinf87q.png</image:loc><image:title>1*LaDmmEcC-sHvvlspinf87Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/32a8b-1mwiv36ct0wh-gfzjwn2o9q.png</image:loc><image:title>1*MWiv36ct0Wh-gfzJwN2O9Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/bc139-1ptxuflvzo5r5ppxtrkzwiq.png</image:loc><image:title>1*ptXufLvZo5r5pPXtrKzWIQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/5f98e-1evw_dfdzraserrf2orgehq.png</image:loc><image:title>1*EVw_DfDZRAserRf2orgEhQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/71393-1_0sjrtvi2jcj-uswqq2w3q.png</image:loc><image:title>1*_0SJrTVi2jcJ-USwqq2W3Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/ce66c-1gfs00hmsnjbqqnt86ids9q.png</image:loc><image:title>1*GFS00hmSNjBQqnT86iDs9Q</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/3c8bb-1evsnrwszobnsxeihwzn4gg.png</image:loc><image:title>1*EVsnrWszObNsXEIhwzn4gg</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/f6602-1ukjqmqrwkxsofyolb5zbwa.png</image:loc><image:title>1*UKjqMqrWKXSofYOLB5zbwA</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/ef4cc-1lvupqmynlvev2pwsslhqew.png</image:loc><image:title>1*LVUpQMyNlvEV2PwSSLhqEw</image:title></image:image><lastmod>2020-08-24T17:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/how-i-failed-in-gcb-exam-yet-won-a-brand-new-expensive-sony-tv/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/d2020-1ljaqamuylqetsxrbdkz0vq.png</image:loc><image:title>1*lJAqamuylQetSXrbdkz0vQ</image:title></image:image><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/3675f-1in2rv0fsjuksmdbbjhvhkq.png</image:loc><image:title>1*IN2RV0fsJuksMdBBJhvhkQ</image:title></image:image><lastmod>2020-08-24T17:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/a-week-in-security-august-17-23/</loc><lastmod>2020-08-24T17:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/parth-heuristic-vulnerable-parameter-scanner/</loc><lastmod>2020-08-24T14:48:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/2020/08/24/hexdump-and-hexfiend-in-3-minutes/</loc><lastmod>2020-08-24T14:14:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://h4ck3r5.code.blog/contact/</loc><image:image><image:loc>https://h4ck3r5.code.blog/wp-content/uploads/2020/08/calm.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2020-08-24T02:52:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://h4ck3r5.code.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-11-13T21:12:28+00:00</lastmod></url></urlset>
