<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.netscylla.com/blog/2018/01/02/Malware-samples-to-powershell-payload-additions.html</loc>
<lastmod>2018-01-02T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/11/Powershell-that-looks-smells-like-empire-payloads.html</loc>
<lastmod>2018-01-11T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/14/Defeating-the-masterlock-5401-5403.html</loc>
<lastmod>2018-01-14T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/20/Google-Storage-Mining.html</loc>
<lastmod>2018-01-20T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/22/Detecting-and-Tracking-the-Red-Team.html</loc>
<lastmod>2018-01-22T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/26/Dridex-Loader-Technique-Used-For-MSF-Shells.html</loc>
<lastmod>2018-01-26T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/29/Offensive-Implants-Part-1.html</loc>
<lastmod>2018-01-29T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/01/30/Offensive-Implants-Part-2.html</loc>
<lastmod>2018-01-30T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/05/Hacking-IPv6-a-Primer.html</loc>
<lastmod>2018-02-05T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/10/Hacking-IPv6-From-Windows.html</loc>
<lastmod>2018-02-10T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/15/s3-security-leaky-bucket-prevention-primer.html</loc>
<lastmod>2018-02-15T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/18/google-s3-secure-storage.html</loc>
<lastmod>2018-02-18T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/19/azure-blob-storage.html</loc>
<lastmod>2018-02-19T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/02/26/zigbee-killerbee.html</loc>
<lastmod>2018-02-26T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/03/05/what-are-caa-records-and-their-use-with-https-website.html</loc>
<lastmod>2018-03-05T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/03/11/http-public-key-pinning-hpkp.html</loc>
<lastmod>2018-03-11T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/03/13/aws-linking-ec2-logs-to-cloudwatch.html</loc>
<lastmod>2018-03-13T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/03/13/kubernetes-or-kuberpwn.html</loc>
<lastmod>2018-03-13T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/04/21/keysy-lf-rfid-hacking-made-easy.html</loc>
<lastmod>2018-04-21T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/04/29/json-web-token-pentesting.html</loc>
<lastmod>2018-04-29T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/05/01/aws-and-vpc-endpoints-privatelinks.html</loc>
<lastmod>2018-05-01T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/05/02/kali-linux-ami-awslogs.html</loc>
<lastmod>2018-05-02T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/05/12/hacking-digital-signs-for-fun-and-no-profit.html</loc>
<lastmod>2018-05-12T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/05/17/cracking-mifare-with-the-super-card.html</loc>
<lastmod>2018-05-17T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/05/18/adding-security-headers-to-s3-websites.html</loc>
<lastmod>2018-05-18T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/06/12/pentesters-guide-to-oracle-hacking.html</loc>
<lastmod>2018-06-12T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/06/15/oracle-hacks-part-2.html</loc>
<lastmod>2018-06-15T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/06/22/rise-of-the-crypto-miner-malware.html</loc>
<lastmod>2018-06-22T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/06/25/pentesters-guide-to-postgresql-hacking.html</loc>
<lastmod>2018-06-25T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/06/28/postgres-hacking-part-2-code-execution.html</loc>
<lastmod>2018-06-28T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/07/02/osint-social-engineering-the-dangers.html</loc>
<lastmod>2018-07-02T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/07/19/secret-holes-behind-the-common-load-balancer.html</loc>
<lastmod>2018-07-19T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/07/26/aws-scrap-those-bastion-hosts.html</loc>
<lastmod>2018-07-26T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/07/27/exploiting-local-file-includes.html</loc>
<lastmod>2018-07-27T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/07/29/red-teaming-and-the-importance-of-failing.html</loc>
<lastmod>2018-07-29T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/08/02/trello-vs-the-google-dork.html</loc>
<lastmod>2018-08-02T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/08/03/updating-guardduty-threatlists-with-serverless.html</loc>
<lastmod>2018-08-03T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/08/08/cracking-wpa1-2-enterprise-with-hcxtools.html</loc>
<lastmod>2018-08-08T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/08/09/defend-against-domain-fronting-with-ja3.html</loc>
<lastmod>2018-08-09T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/09/02/roll-your-own-aws-lambda-in-5-easy-steps.html</loc>
<lastmod>2018-09-02T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/09/03/hunt-for-aws-unrestricted-e-in-gress.html</loc>
<lastmod>2018-09-03T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/09/13/hacking-mongodb.html</loc>
<lastmod>2018-09-13T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/09/18/kibana-wazuh-bro.html</loc>
<lastmod>2018-09-18T20:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/09/26/MSF-Meterpreter-and-Railgun.html</loc>
<lastmod>2018-09-26T20:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/10/03/werkzeug-debugger.html</loc>
<lastmod>2018-10-03T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/10/18/When-resilience-fails-dont-panic.html</loc>
<lastmod>2018-10-18T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/11/15/The-Revolver.html</loc>
<lastmod>2018-11-15T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/11/19/PDF-Analysis.html</loc>
<lastmod>2018-11-19T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/11/21/Locking-Down-Public-S3.html</loc>
<lastmod>2018-11-21T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/12/17/Sparrows-BlackFlags.html</loc>
<lastmod>2018-12-17T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/12/29/Honest-Dong-DimplePicks.html</loc>
<lastmod>2018-12-29T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018/12/30/Polishing-Lockpicks.html</loc>
<lastmod>2018-12-30T08:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/01/01/The-complexities-of-GDPR.html</loc>
<lastmod>2019-01-01T01:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/01/06/Athena-and-Cloudfront-Logs.html</loc>
<lastmod>2019-01-06T10:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/01/17/TA505-Servhelper-Part-1.html</loc>
<lastmod>2019-01-17T10:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/01/19/TA505-Servhelper-Part-2.html</loc>
<lastmod>2019-01-19T10:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/02/04/Arris-CableModem-SNMP.html</loc>
<lastmod>2019-02-04T11:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/02/27/Disassemble-Script.html</loc>
<lastmod>2019-02-27T11:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/03/06/NSA-Ghidra.html</loc>
<lastmod>2019-03-06T11:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/03/13/Yet-Another-Emotet-Dropper.html</loc>
<lastmod>2019-03-13T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/03/28/Provisioning-Hacker-IR-Builds.html</loc>
<lastmod>2019-03-28T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/04/09/Chocolatey-choco-install-nmap.html</loc>
<lastmod>2019-04-09T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/04/10/DragonBlood.html</loc>
<lastmod>2019-04-10T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/04/28/Powershell-BDD-with-Pester.html</loc>
<lastmod>2019-04-28T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/05/07/Yet-Another-Emotet-in-May19.html</loc>
<lastmod>2019-05-07T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/05/23/Where-is-a-whois-miner.html</loc>
<lastmod>2019-05-23T13:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/07/17/Whois-api-phishing-detection.html</loc>
<lastmod>2019-07-17T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/09/03/Prevent-Phishing-with-DMARC.html</loc>
<lastmod>2019-09-03T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/09/21/Pentest-Reporting-and-Information-Leaks.html</loc>
<lastmod>2019-09-21T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/10/01/Putty-vs-TeraTerm.html</loc>
<lastmod>2019-10-01T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/10/15/Jupyter-Notebooks-for-Reporting.html</loc>
<lastmod>2019-10-15T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/10/28/Jupyter-Notebooks-for-Incident-Response.html</loc>
<lastmod>2019-10-28T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/11/24/Linux-to-Powershell-CMD-Cheatsheet.html</loc>
<lastmod>2019-11-24T14:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019/11/26/Sparrows-The-Vault.html</loc>
<lastmod>2019-11-26T14:39:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/01/01/New-Year.html</loc>
<lastmod>2020-01-01T00:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/01/13/SANS-Xmas-Challenge-2019-Writeup.html</loc>
<lastmod>2020-01-13T19:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/01/25/Installing-Sysmon.html</loc>
<lastmod>2020-01-25T13:01:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/02/01/Threat-hunting-with-Windows-Event-Logs.html</loc>
<lastmod>2020-02-01T11:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/02/03/Windows-Event-Logs-and-USB-Tracking.html</loc>
<lastmod>2020-02-03T11:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/02/06/Linux-Event-Logs-and-USB-Tracking.html</loc>
<lastmod>2020-02-06T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/02/16/Windows-File-Auditing.html</loc>
<lastmod>2020-02-16T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/03/24/Wireguard-VPN.html</loc>
<lastmod>2020-03-24T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/03/27/Exploiting-Remote-Workers-with-RDP.html</loc>
<lastmod>2020-03-27T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/04/16/Remote-Working-and-ChatOps.html</loc>
<lastmod>2020-04-16T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/04/22/Remote-Working-and-ChatOpsBots.html</loc>
<lastmod>2020-04-22T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/04/28/Remote-Working-and-ChatOps-with-Videocalls.html</loc>
<lastmod>2020-04-28T13:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/05/10/Adding-Security-Headers-to-Azure-Websites.html</loc>
<lastmod>2020-05-10T08:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/05/15/Gitlab-CI-for-Web-DevOps.html</loc>
<lastmod>2020-05-15T08:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/06/08/Buspirate-UART-debug-hardware.html</loc>
<lastmod>2020-06-08T08:49:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/06/26/FIRST-Seclounge-CTF-2020.html</loc>
<lastmod>2020-06-26T13:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/06/28/FIRST-Seclounge-CTF-Musee.html</loc>
<lastmod>2020-06-28T13:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/08/25/Ansible-Quickly-Build-CTF-Boxs.html</loc>
<lastmod>2020-08-25T11:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/09/08/Pineapple-VII-MK7.html</loc>
<lastmod>2020-09-08T11:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/09/09/Rapid-Radio-Device-Reversing.html</loc>
<lastmod>2020-09-09T11:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/09/23/CVE-2020-1472-Zerologon.html</loc>
<lastmod>2020-09-23T12:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/10/10/Sparrows-Disc-Pick.html</loc>
<lastmod>2020-10-10T12:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/10/24/Secretlabs-Chair-Review.html</loc>
<lastmod>2020-10-24T12:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/12/08/RTSP-CCTV-Hacking.html</loc>
<lastmod>2020-12-08T12:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020/12/09/Fireeye-RedTeam-Tools.html</loc>
<lastmod>2020-12-09T12:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/01/04/Kringlecon-2020.html</loc>
<lastmod>2021-01-04T08:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/01/19/Domain-Categorisation.html</loc>
<lastmod>2021-01-19T10:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/02/09/V3_Vagrant_Virtualbox-Vulnhub.html</loc>
<lastmod>2021-02-09T11:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/03/04/Microsoft-Exchange-Zerodays-and-Hafnium.html</loc>
<lastmod>2021-03-04T09:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/03/17/Graphs-Everywhere.html</loc>
<lastmod>2021-03-17T09:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/05/19/WhatsApp-Phishing.html</loc>
<lastmod>2021-05-19T16:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/05/24/USB-Forensics-on-Windows-10.html</loc>
<lastmod>2021-05-24T07:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/05/25/CANBus-Hacking-for-Beginners.html</loc>
<lastmod>2021-05-25T07:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/06/11/FreeBSD-and-Bhyve.html</loc>
<lastmod>2021-06-11T10:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/06/14/FreeBSD-and-WiFi-Hacking.html</loc>
<lastmod>2021-06-14T06:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/07/13/Windows-Alternative-Data-Streams.html</loc>
<lastmod>2021-07-13T11:40:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/08/18/Windows-Defender-Silent-Rules.html</loc>
<lastmod>2021-08-18T10:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/08/25/CobaltStrike-Beacon-Reversing.html</loc>
<lastmod>2021-08-25T07:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/09/13/Cyber_Polygon_Part_1.html</loc>
<lastmod>2021-09-13T07:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/09/15/OSINT_CTF-Esoteric_Languages.html</loc>
<lastmod>2021-09-15T13:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/09/23/Obfuscated-CTF.html</loc>
<lastmod>2021-09-23T12:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/09/30/Cyber_Polygon_Part_2.html</loc>
<lastmod>2021-09-30T23:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/19/CyberDefenders-LTE-Fallen-Wall.html</loc>
<lastmod>2021-10-19T10:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/20/CyberDefenders-NuketheBrowser.html</loc>
<lastmod>2021-10-20T10:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/21/CyberDefenders-RE101-CTF.html</loc>
<lastmod>2021-10-21T08:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/22/CyberDefenders-EscapeRoom-CTF.html</loc>
<lastmod>2021-10-22T14:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/27/CyberDefenders-Bsides-Jeddah-CTF.html</loc>
<lastmod>2021-10-27T19:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/10/29/CyberDefenders-DeepDive-CTF.html</loc>
<lastmod>2021-10-29T06:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/11/02/Exploiting_Local_File_Includes-in_PHP.html</loc>
<lastmod>2021-11-02T08:33:31+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/11/03/BsidesLondon_2020_CTF-Denominate.html</loc>
<lastmod>2021-11-03T08:33:31+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/11/21/CyberDefenders-Stealer-CTF.html</loc>
<lastmod>2021-11-21T08:56:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/12/08/CyberDefenders-AWS-CTF.html</loc>
<lastmod>2021-12-08T12:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021/12/20/Merry-Christmas.html</loc>
<lastmod>2021-12-20T00:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/01/01/CyberDefenders-DetectLog4j-CTF.html</loc>
<lastmod>2022-01-01T21:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/01/05/Meterpreter-CobaltStrike-Reversing-Made-Easy.html</loc>
<lastmod>2022-01-05T13:34:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/01/07/Sans-xmas-chall-kringlecon2021.html</loc>
<lastmod>2022-01-07T00:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/01/29/CyberDefenders-Ransomed-CTF.html</loc>
<lastmod>2022-01-29T22:49:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/02/13/CyberDefenders-GetPDF-CTF.html</loc>
<lastmod>2022-02-13T13:31:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/02/20/CyberDefenders-AD-101-CTF.html</loc>
<lastmod>2022-02-20T21:31:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/03/04/CyberDefenders-Hawkeye-CTF.html</loc>
<lastmod>2022-03-04T12:31:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/03/15/What_are_canaries.html</loc>
<lastmod>2022-03-15T12:56:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/05/09/Cyberdefenders-Elastic-CTF.html</loc>
<lastmod>2022-05-09T10:31:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/06/08/Cyberdefenders-Honeybot-CTF.html</loc>
<lastmod>2022-06-08T22:56:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/06/09/Cyberdefenders-Jailbreak-CTF.html</loc>
<lastmod>2022-06-09T08:56:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/07/13/Elastic-CTF.html</loc>
<lastmod>2022-07-13T14:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022/07/14/Cyberdefenders-GrabThePhisher-CTF.html</loc>
<lastmod>2022-07-14T14:43:31+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/02/15/SOAR-Using-Tesseract-to-parse-SMS-images.html</loc>
<lastmod>2023-02-15T14:43:31+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/04/16/SOAR-Phishing-Threat-Intelligence.html</loc>
<lastmod>2023-04-16T16:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/05/03/Automation-Ansible-and-Cisco-CSR1000v.html</loc>
<lastmod>2023-05-03T16:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/06/30/CyberDefenders-Acoustic_Walkthrough.html</loc>
<lastmod>2023-06-30T21:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/07/01/CyberDefenders-Hireme_Walkthrough.html</loc>
<lastmod>2023-07-01T21:30:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/07/18/Qemu-RISC-V-Emulation.html</loc>
<lastmod>2023-07-18T18:01:33+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023/11/03/EKSCluster-CTF.html</loc>
<lastmod>2023-11-03T11:24:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/01/05/Kringlecon-2023.html</loc>
<lastmod>2024-01-05T00:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/01/08/Attacking-Windows-Certificate-Services.html</loc>
<lastmod>2024-01-08T00:00:01+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/02/25/Decoding-Meshtastic-URLs.html</loc>
<lastmod>2024-02-25T21:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/03/08/Meshtastic-Privacy.html</loc>
<lastmod>2024-03-08T13:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/03/21/CN-Domain-name-scam.html</loc>
<lastmod>2024-03-21T09:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/03/22/Dealing-with-a-fraudulent-domain.html</loc>
<lastmod>2024-03-22T09:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024/09/19/Neo4J-Exploits.html</loc>
<lastmod>2024-09-19T09:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2025/04/16/Reversing-Python-Exes.html</loc>
<lastmod>2025-04-16T09:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2025/05/16/Matrix-ChatOps.html</loc>
<lastmod>2025-05-16T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/kubernetes/security/devsecops/2025/06/16/Trivy.html</loc>
<lastmod>2025-06-16T09:03:00+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/2018.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2019.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2020.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2021.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2022.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2023.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2024.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/2025.html</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/</loc>
</url>
<url>
<loc>https://www.netscylla.com/blog/assets/FIRST_CTF_2020.pdf</loc>
<lastmod>2020-06-26T12:50:06+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/assets/SANS%20XMAS%20Challenge%202019%20Netscylla%20Solution.pdf</loc>
<lastmod>2020-05-11T20:35:24+00:00</lastmod>
</url>
<url>
<loc>https://www.netscylla.com/blog/assets/SANS_XMAS_Challenge_2019_Netscylla_Solution.pdf</loc>
<lastmod>2020-07-16T12:35:25+00:00</lastmod>
</url>
</urlset>
