<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ihack4falafel.github.io/C0m80-Challenge/</loc>
<lastmod>2017-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Creating-Custom-TCP-Bind-Shell-~-Linux-x86/</loc>
<lastmod>2018-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Creating-Custom-TCP-Reverse-Shell-~-Linux-x86/</loc>
<lastmod>2018-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Egg-Hunter-for-The-Win-~-Linux-x86/</loc>
<lastmod>2018-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/ROT~N-+-Shift~N-+-XOR~N-Shellcode-Encoder-~-Linux-x86/</loc>
<lastmod>2018-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Disecting-Msfvenom-Shellcode-~-Linux-x86/</loc>
<lastmod>2018-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Polymorphic-Shellcode-~-Linux-x86/</loc>
<lastmod>2018-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/RC2-Shellcode-Crypter-in-Python-~-Linux-x86/</loc>
<lastmod>2018-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/ROPing-the-Stack/</loc>
<lastmod>2018-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Bad-Characters-Sortilege/</loc>
<lastmod>2018-07-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Password-Protected-TCP-Bind-Shell-~-Linux-x86_64/</loc>
<lastmod>2018-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Password-Protected-TCP-Reverse-Shell-(IPv6)-~-Linux-x86_64/</loc>
<lastmod>2018-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Egg-Hunter-~-Linux-x86_64/</loc>
<lastmod>2018-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/ROT~N-+-Shift~N-+-XOR~N-Shellcode-Encoder-~-Linux-x86_64/</loc>
<lastmod>2018-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Analyzing-MSFVenom-Payloads-with-Binary-Ninja-~-Linux-x86_64/</loc>
<lastmod>2018-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Polymorphic-Shellcode-Linux-x86_64/</loc>
<lastmod>2018-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/AES-Shellcode-Crypter-~-linux-x86_64/</loc>
<lastmod>2018-07-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Offensive-Security-AWEOSEE-Review/</loc>
<lastmod>2020-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Hooking-CreateProcessWithLogonW-with-Frida/</loc>
<lastmod>2020-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/Patch-Diffing-with-Ghidra/</loc>
<lastmod>2020-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://ihack4falafel.github.io/</loc>
</url>
<url>
<loc>https://ihack4falafel.github.io/assets/images/AWE/test/</loc>
</url>
<url>
<loc>https://ihack4falafel.github.io/page2/</loc>
</url>
<url>
<loc>https://ihack4falafel.github.io/page3/</loc>
</url>
<url>
<loc>https://ihack4falafel.github.io/page4/</loc>
</url>
</urlset>
