<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://ooo.cra.sh/</loc></url><url><loc>https://ooo.cra.sh/github</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/instagram</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/keybase</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/linkedin</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/not-social</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/not-social-1</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/not-social-1/trakt</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/not-social/twitter</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/opensea</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/reddit</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf</loc><lastmod>2024-10-16T05:45:41.952Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2</loc><lastmod>2024-10-16T05:45:41.952Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/20-years-after</loc><lastmod>2024-10-16T05:45:44.245Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/20-years-after-the-joint</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/genomanft</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/hello-world</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/i-will-start</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/posting-here</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/snprintf2/sooner-or-later</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/0-day-rce-vulnerability-on-microsoft-exchange</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/6g-the-sixth-generation-mobile-network</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/80s</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/a-comprehensive-analysis-of-the-3cx-attack</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/a-formbook-matryoshka</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/a-race-to-report-a-toctou-analysis-of-a-bug-collision-in-intel-smm</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/abusing-tokens-to-compromise-ad-wo-touching-lsass</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/achieving-android-one-click-for-samsung-exploiting-a-simple-xss-in-the-galaxy-store</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/all-saints-here-real-time-tracking-of-openssl-306-critical-cve-2022-tbd</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/analysing-lastpass-chrome-extension</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/androidbianlian-payload</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/aoqin-dragon</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/apache-batik-ssrf-and-rce-through-remote-class-loading</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/appsec-ezine-453</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/appsec-ezine-455</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/apt-groups-carried-out-highly-targeted-attack-on-sophos</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/apt-techniques-access-token-manipulationtheft</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/apt41s-new-subgroup-earth-longzhi</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/arm-trustzone-pivoting-to-the-secure-world</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/atlassian-session-hijacking-using-stolen-jwts-with-2fa-bypass-on-jira-confluence-trello-bitbucket</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/attackers-can-use-electromagnetic-signals-to-control-touchscreens-remotely</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/attacking-android-kernel-abusing-qualcomm-trustzone</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/attacking-titan-m-with-only-one-byte</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/authentication-bypass-file-upload-arbitrary-file-overwrite</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/automated-malware-analysis-joe-sandbox</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/automating-c2-infrastructure-with-terraform-nebula-caddy-and-cobalt-strike</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/bad-vibes-investigating-novel-malware-persistence-in-esxi-hypervisors</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/beginners-guide-to-sliver-c2</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/bitbucket-pre-auth-remote-command-execution-cve-2022-36804</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/black-basta-and-the-unnoticed-delivery</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/black-box-security-evaluation-of-the-spacex-starlink-user-terminal</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/blacklotus-uefi-bootkit-myth-confirmed</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/blasting-event-driven-cornucopia-wmi-edition</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/blindside-edr-evasion-with-hardware-breakpoints</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/bluebleed-the-largest-b2b-leak</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/build-a-self-destructing-usb-drive</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/bumblebee-increasing-its-capacity-and-evolving-its-ttps</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/bypass-android-ssl-pinning-intercept-proxy-unaware-apps</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/centrodestra-in-crisi-ora-si-balla</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/checkmk-rce-chain</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/chip-to-cloud-eid-logic-vulnerabilities</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/chrome-browser-exploitation</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/client-side-de-sync-and-synch0le</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cloning-windows-binaries-and-code-signing-implants</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cobalt-strike-memory-analysis</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-208687-cisco-sma-jwt-eop-sqli-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-22954-mirai-rar1-and-guardminer-target-a-well-known-vmware-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-22980-spring-data-mongodb-spel-expinjection</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-25664-the-code-that-wasnt-there-reading-memory-on-android-device-by-accident</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-25765-command-injection-in-pdfkit</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-26730-colorsync</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-26809-reaching-vulnerable-point</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-27502-realvnc-server-680-privesc</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-28672-foxit-pdf-reader-uaf-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-29464-detailed-analysis-of-a-shadowpad-intrusion</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-31358-multiple-vulns-in-proxmox-ve-mail-gateway</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-32250-exploit-linux-kernel-exploit-with-mqueue</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-3236-sophos-firewall-code-injection</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-32895-cve-2019-8561-a-hard-to-banish-packagekit-vuln</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-32932-zincomputeprogramupdatemutables-oob-write-due-to-double-fetch</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-32946-sirispy-eavesdrop-conversations-with-siri</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-3328-snapd-race-condition-in-snap-confine</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-33679-rc4-is-still-considered-harmful</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-33942-bypassing-intel-dcms-auth-by-spoofing-kerberos-and-ldap</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-34689-exploiting-a-critical-spoofing-vuln-in-windows-cryptoapi</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-34918-a-crack-in-the-linux-firewall</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-35737-stranger-strings-an-exploitable-flaw-in-sqlite</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-35914-glpi-htmlawed</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-3602-openssl-punycode-detection-exploitation-and-remediation</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-36067-sandbreak-vm2-unauthed-rce-in-backstage</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-37042-zimbra-email-vulnerability</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-37969-windows-clfs-zero-day</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-37981-the-logging-dead</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-38181-yet-another-arm-mali-gpu-android-exploit</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-39197-cobalt-strike-471-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-403034-on-macos-1301-iosipados-1611</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-405942-supply-chain-vulns-put-server-ecosystem-at-risk</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-40684-fortiosproxyswitchmanager-authebypass</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41034-visual-studio-code-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41057-windows-11-httpsys-kerberos-pac-verification-bypass-eop</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41082-rce-in-exchange-powershell-backend</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-4108280-owassrf-bypassing-proxynotshell-mitigations</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41120-sysmoneop-privesc-abusing-arbitrary-file-deletes</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-4116-zero-day-flaw-in-quarkus-java-framework</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41352-zimbra-0-day</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-4162241800-f5-big-ip-and-icontrol-rest-vuln</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41852-rcexecution-in-jxpath-library</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-41924-rce-in-tailscale-dns-rebinding-and-you</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-42703-bringing-back-the-stack-attack-to-linux-kernel</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-42864-diabolical-cookies-on-iosmacos</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-428956-linux-kernel-infoleak-uaf-in-bluetooth-l2cap</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-442687-imagemagick-the-hidden-vulnerability-behind-your-online-images</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-44721-crowdstrike-falcon-uninstaller</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-45163-nxp-imx-sdpreaddisable-fuse-bypass</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-4543entrybleed-breaking-kaslr-under-kpti-with-prefetch</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-46169-cacti-unauthenticated-command-injection</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2022-47522-macstealer-wi-fi-client-isolation-bypass</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-202234718-windows-tcpip-rce-poc-analysis</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-202242889-text4shell-vuln-technical-analysis</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-0179-linux-kernel-stack-buffer-overflow-in-nftables</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-101718-vulns-in-tpm-20-reference-implementation-code</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-21608-adobe-acrobat-reader-rce</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-21608-adobe-acrobat-reader-resetform-rce</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-21768-pwning-windows-ancillary-function-driver-for-winsock-afdsys</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-23397-microsoft-outlook-eop</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-23504-xnu-heap-underwrite-in-dlilc</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-2406869-abusing-signal-desktop-for-fun-espionage</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-25136-openssh-pre-auth-double-free</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/cve-2023-27326-parallels-toolgate-vm-escape</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/darkfi</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/defining-the-cobalt-strike-reflective-loader</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/deimosc2-cc-framework</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/design-and-setup-of-c2-traffic-redirectors</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/devsecops-playbook-step-by-step-implementation-guide</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/discover-redigo-new-redis-backdoor-malware</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/discovering-cve-202222980-real-exploitable-path</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/disposable-root-servers</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/does-opensea-shared-storefront-have-a-backdoor</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/dumping-and-extracting-the-spacex-starlink-user-terminal-firmware</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/eat-what-you-kill-pre-authed-rce-in-vmware-nsx-manager</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/emulating-phineas-phisher-attacks-in-modern-edr-environments</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exciting-approaches-to-memory-safety</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exploit-deserialization-vulnerabilities-in-php</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exploited-windows-mark-of-the-web-zero-day</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exploiting-an-n-day-vbulletin-php-object-injection-vulnerability</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exploiting-flipper-zeros-nfc-file-loader</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/exploring-the-ref2731-intrusion-set</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/fantastic-rootkits-and-where-to-find-them</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/firebase-is-insecure-by-default</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/fodcha-is-coming-back-raising-a-wave-of-ransom-ddos</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/foisted-remote-exploit-for-mikrotiks-routeros-6</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/francesca-bria-on-decentralisation-sovereignty-and-web3</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/from-shared-dash-to-root-bash-pre-authed-rce-in-vmware-vrops</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/fuzzing-ping8-and-finding-a-24-year-old-bug</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/game-of-active-directory-pwning-is-coming</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/guerre-di-rete-ucraina-cronache-dai-cyber-fronti</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hacking-ham-radio-for-texting</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hacking-smartwatches-for-spear-phishing</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hardware-trojans-under-a-microscope</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hells-keychain-supply-chain-vuln-in-ibm-cloud-postgresql</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hitching-a-ride-with-mustang-panda</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hop-token-airdrop</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/hosting-malware-on-ipfs-for-fun-profit</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/how-to-completely-own-an-airline-in-3-easy-steps</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/how-to-make-800m-in-crypto-soros-style-breaking-ust</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/http-desync-attack-request-smuggling</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/huawei-secure-monitor-vulnerabilities</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/huawei-security-hypervisor-vulnerability</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/iis-modules-the-evolution-of-web-shells</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/in-the-box-mobile-malware-webinjects-marketplace</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/in-the-potato-family-i-want-em-all</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/inside-the-v1-raccoon-stealer</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/insights-from-the-ftx-implosion</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/intel-boot-guard-keys-leak-analysis</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/ios-native-code-obfuscation-and-syscall-hooking</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/iosmacos-exploit-chain-cve-2022-32845-32948-42805-32899-weightbufs</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/js-on-security-off-abusing-json-based-sql-to-bypass-waf</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/kax17-de-anonymization-against-tor</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/kmemguardt-in-ios-16-macos-13</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/linux-windows-password-mining</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/lnk-file-based-attacks-are-on-the-rise</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/making-malware-with-vx-api</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/meet-logseq-an-open-source-knowledge-management-system-that-stores-data-like-a-brain-venturebeat</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/memory-corruption-vulnerabilities-in-edge</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/meshyjson-a-tp-link-tdpserver-json-stack-overflow</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/mobile</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/more-evil-markets-to-buy-initial-access</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/multiple-internet-to-baseband-remote-code-execution-vulnerabilities-in-exynos-modems</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/multiple-zero-day-vulnerabilities-in-leading-edrs-and-avs</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/netcomm-unauthenticated-rce-vuln</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/netgear-r7800-afpd-preauth</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/nuclei-community-powered-vulnerability-scanner</loc></url><url><loc>https://ooo.cra.sh/strlcpy3/overview-of-bears-cyberespionage-1h-2022</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/perch-il-momento-di-fare-e-informare-guerre-di-rete</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/pixel-6-bootloader-exploitation</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/png-steganography-hides-backdoor</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/practical-fault-attacks-against-sm4</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/precious-gemstones-the-new-generation-of-kerberos-attacks</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/project-zero-a-deep-dive-into-an-nso-zero-click-imessage-exploit-remote-code-execution</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/prototype-pollution-in-python</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/recollapse-fuzzing-the-web-for-mysterious-bugs</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/relaying-yubikeys</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/remote-command-execution-in-a-bank-server</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/rengine-more-than-just-a-recon</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/replicant-fault-injection-attack-on-trezor-one</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/reverse-engineering-the-apple-multipeer-connectivity-framework</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/rizin</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/russias-certificate-authority-for-sanctioned-organizations</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/self-hosted-roundup-7</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/sharepoint-post-authentication-server-side-request-forgery</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/silentmoonwalk-implementing-a-dynamic-call-stack-spoofer</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/singpass-rasp-analysis</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/spice-up-your-persistence-loading-php-extensions-from-memory</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/stablecoins-are-products</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/steganography-creating-a-digital-microdot</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/symbiote-a-new-nearly-impossible-to-detect-linux-threat</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/thats-no-honey-badger-its-a-brute-ratel-a-look-at-brc4</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-crypto-revolution</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-defenders-guide-to-the-windows-registry</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-dirty-pipe-vulnerability-the-dirty-pipe-vulnerability-documentation</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-drone-cyberattack-that-breached-a-corporate-network</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-intel-ppam-attack-story</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-magic-of-y</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-owassrf-tabshell-exploit-chain</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-pacman-attack</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-sound-of-malware</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-state-of-exploit-development</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-state-of-musicweb3-tools-for-artists-water-music</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/the-surreal-case-of-a-cia-hackers-revenge-the-new-yorker</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/thousands-of-unsecured-kubernetes-clusters-exposed-on-the-internet</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/threat-thursday-boratrat</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/tp-link-wr940n-n-day-turns-into-a-0day</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/tracking-androidjoker-payloads-with-medusa-static-analysis-and-patience</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/unlocking-lockbit-a-ransomware-story</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/urlscanios-soar-spot-chatty-security-tools-leaking-private-data</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/userland-exploit-chain-to-dump-memory-of-any-windows-ppl-process</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/userspace-exploitation-under-android</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/using-systemfunction032-for-shellcode-decryption</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/vlan-hopping-techniques</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/vmsa-2023-0001-vmware-vrealize-log-insight-multiple-vulns</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/vulkan-files-leak-a-rare-look-into-russian-cyberwarfare-ttps</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/web3-decoder-burp-suite-extension</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/web3-email</loc></url><url><loc>https://ooo.cra.sh/strlcpy3/wireless-pentest-methodologies</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/xdr33-a-variant-of-cias-hive-attack-kit</loc><lastmod>2024-10-16T05:42:22.303Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/xenomorph-hatched-banking-trojan</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/xiongmai-iot-exploitation</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url><url><loc>https://ooo.cra.sh/strlcpy3/zero-to-hero-dom-clobbering</loc><lastmod>2024-10-16T05:42:22.304Z</lastmod></url></urlset>