<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://unclesp1d3r.github.io/posts/2023-04-03-firewall-bypass/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-07-12-mobile-security/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-07-11-python-c/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-07-10-history-cryptography/</loc><lastmod>2025-12-22T20:01:05-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-07-09-memory-forensics-code-injection/</loc><lastmod>2025-12-22T20:20:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-06-22-tty/</loc><lastmod>2025-12-22T20:20:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-06-05-distros/</loc><lastmod>2025-12-22T20:20:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-23-rust-concurrency/</loc><lastmod>2025-12-19T17:49:57-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-21-heap/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-20-physical-bypasses/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-17-segmentation/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-15-history-object-oriented/</loc><lastmod>2025-12-19T17:49:57-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-13-threat-hunt-with-yara/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-09-javascript-socketio/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2024-05-08-apple/</loc><lastmod>2025-12-19T17:49:57-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-08-18-indcident-response/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-08-16-history-1990s-programming-languages/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-08-15-memory-threat-hunt/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-08-14-osint-social/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-07-07-serverless/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-07-06-python-debugging/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-07-05-history-1980s-atari/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-07-04-dynamic-malware/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-07-03-darkweb/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-30-iot-security-smart-cities/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-29-rails-routing/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-28-history-1980s-nes/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-27-threat-hunting-fileless/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-26-purple-team/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-23-social-vishing-smishing/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-22-python-data-science/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-21-history-1990s-guis/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-20-advanced-memory-forensics/</loc><lastmod>2025-12-19T17:49:57-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-19-cyber-threat-intel/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-16-ssrf/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-15-advanced-rust/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-14-history-cdrom/</loc><lastmod>2025-12-21T22:18:43-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-13-exploit-rop/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-12-cyber-threat-hunting/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-09-net-protocol-analysis/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-08-javascript-advanced-dom/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-07-history-commadore/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-06-advanced-malware-static-analysis/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-05-physical-security-bypass/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-02-advanced-cloud/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-06-01-python-oo-advanced/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-31-history-apple_macintosh/</loc><lastmod>2025-08-14T23:55:15-04:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-30-malware-obfuscation/</loc><lastmod>2025-12-19T17:49:57-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-29-cybersecurity-frameworks-nist-iso-and-cis/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-26-wireless-security-best-practices-and-common-attacks/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-25-metaprogramming-in-ruby-techniques-for-writing-code-that-writes-code/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-24-history-computing-in-the-1990s-the-emergence-of-linux-and-open-source-software/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-23-advanced-threat-hunting-techniques-ttp-analysis/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-22-red-teaming-scenario-based-testing/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-19-advanced-malware-analysis---disassembly-techniques/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-18-lua-programming-language---basic-concepts-and-syntax/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-17-history---the-birth-of-the-intel-x86-architecture/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-16-industrial-control-system-ics-security---best-practices-and-common-vulnerabilities/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-15-advanced-network-security---application-layer-firewalls/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-12-red-team-operations---covert-channels-and-exfiltration-techniques/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-11-powershell-scripting---basic-concepts-and-syntax/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-10-history-apple-computers/</loc><lastmod>2025-12-22T20:20:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-09-cyber-threat-intelligence---best-practices-and-techniques/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-08-advanced-exploit-development---heap-spraying-techniques/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-05-blue-team-exercises-threat-hunting-and-incident-response/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-04-c-programming-language-basic-concepts-and-syntax/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-03-history-the-history-of-ibm-and-the-clone-wars/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-02-advanced-memory-forensics-analysis-techniques/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-05-01-web-application-security-csrf-and-xss-prevention/</loc><lastmod>2025-12-21T22:18:43-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-29-bloodhound/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-28-advanced-red-team-exercises-supply-chain-attacks/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-27-kotlin-programming-language-basic-concepts-and-syntax/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-26-history-the-dot-com-bubble/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-25-iot-security-best-practices-and-common-vulnerabilities/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-24-advanced-network-security-intrusion-prevention-systems-ips/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-22-mythic/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-21-cloud-security-best-practices-and-common-vulnerabilities/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-20-c-programming-language-basic-concepts-and-syntax/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-19-history-the-complete-history-of-email/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-18-exploit-development-introduction-and-techniques/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-17-advanced-social-engineering-techniques-spear-phishing-and-whaling/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-15-sharpsocks/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-14-red-team-exercises/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-13-swift/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/computer-history-evolution-video-games/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-11-advanced-malware-analysis/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-10-physical-security-techniques/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/covenant-mastering-red-teaming-tactics/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/iot-device-hacking-techniques-practical-examples/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/java-programming-key-concepts-syntax-explained/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/computer-history-internet/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/ransomware-effective-analysis-prevention-strategies/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-04-01-nishang/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-31-advanced-web-csrf-xxe/</loc><lastmod>2025-12-20T04:56:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/golang-offensive-security-red-team/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/history-computer-graphics-gpu-compute/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/memory-forensics-red-team-volatility/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/social-engineering-pretexting-guide/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/empire-powershell-c2-framework-guide/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/advanced-network-attacks-layer-2-3-mitm6-nac/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/python-for-offensive-security-red-team/</loc><lastmod>2025-12-23T01:18:34-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-22-history-y2k-bug/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/malware-analysis-for-red-teams-intro/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/password-cracking-techniques-tools-best-practices/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-18-powersploit/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-17-phishing-detection-defeat/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-16-web-development-with-rails/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-15-history-netscape-navigator/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-14-buffer-overflow-introduction/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-13-red-teaming-basics/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/swiss-army-knife-exploitation-mastering-metasploit-framework/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/hacking-human-red-teamer-guide-social-engineering/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/stealthy-serpent-red-teamer-guide-nim/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/computer-history-origins-evolution-unix/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/cracking-code-advanced-introduction-reverse-engineering/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/eye-advanced-network-scanning-enumeration/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/database-infiltrator-mastering-advanced-sql-injection/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-03-02-rust-basics/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/computer-history-point-return-history-computer-mouse/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-28-xss/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/ethical-path-comprehensive-introduction-penetration-testing/</loc><lastmod>2025-12-24T13:30:20-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/darwinian-transition-linux-red-team-operator-guide-macos/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/psexec-double-edged-sword-remote-execution/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/service-sentinel-mastering-sc-exe-remote-execution-persistence/</loc><lastmod>2026-02-02T20:54:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/microcode-ghost-silicon/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-23-wmic-basics/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-21-dsquery/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-20-advanced-windows-cli-tools/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-18-mysql-docker-postgres/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-17-chisel-tunneling/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-16-pth-rdp/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-15-tunneling-traffic/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-14-using-impacket-for-sql/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/master-smb-operations-impacket-conquer-windows-shares/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-10-smbclient/</loc><lastmod>2026-02-03T00:01:35-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/ruby-programming-language-red-team-operator-elegant-powerhouse/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-09-master-control-sockets/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-08-disable-command-history/</loc><lastmod>2026-02-04T23:48:15-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-07-alternate-data-streams/</loc><lastmod>2026-02-02T23:53:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-05-port-scanning/</loc><lastmod>2026-02-02T20:16:59-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-04-how-to-install-impacket/</loc><lastmod>2026-02-02T20:18:09-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-02-bash-basics/</loc><lastmod>2026-02-02T20:27:09-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/2023-02-01-history-cpm/</loc><lastmod>2026-02-02T23:49:41-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://unclesp1d3r.github.io/posts/initial-linux-enumeration-practices-techniques-gathering-information-linux-system/</loc><lastmod>2026-02-02T23:46:07-05:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url></urlset>