<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://diablohorn.com/2026/03/22/observations-on-ai-generated-remote-duckdb-via-http-with-mtls/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-22T15:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2026/03/19/quickpost-duckdb-ndjson-force-all-columns/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-19T21:21:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2026/02/27/invisible-security-requires-friction-first/</loc><lastmod>2026-02-27T21:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/books/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-1.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/create-a-highly-detailed-high-resolution-featured-image-for-a-blog.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/create-a-highly-detailed-and-sharp-focused-featured-image-for-a-2.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/create-a-highly-detailed-and-sharp-focused-featured-image-for-a-1.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/create-a-highly-detailed-and-sharp-focused-featured-image-for-a.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-11T08:54:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://diablohorn.com/2025/12/07/recon-your-patents-with-genai/</loc><lastmod>2025-12-07T23:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2025/10/26/yolo-detect-security-cameras/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2025/10/val_batch0_pred.jpg</image:loc><image:title>val_batch0_pred</image:title></image:image><lastmod>2025-10-26T20:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2024/05/22/emotions-as-human-detection-defence/</loc><lastmod>2024-05-22T18:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2024/05/21/random-thoughts-on-physical-security-measures/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-05-21T21:23:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2024/04/01/powershell-cmdline-parsing-tokenization/</loc><lastmod>2024-03-31T22:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2024/03/17/analyzing-pipedream-incontroller-with-mitre-stix/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2024/03/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-14.png</image:loc><image:title>image-14</image:title></image:image><lastmod>2024-03-17T14:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2023/08/22/lateral-movement-a-conceptual-overview/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2023/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-08-23T18:05:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2023/04/09/opinion-time-is-crucial-when-building-secure-components-or-infrastructures/</loc><lastmod>2023-04-09T14:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/11/25/obs-presentation-slides-side-by-side/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-25T14:45:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/11/17/parsing-atop-files-with-python-dissect-cstruct/</loc><lastmod>2022-11-16T23:50:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/10/30/baby-steps-into-mitre-stix-taxii-pandas-graphs-jupyter-notebooks/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-10-30T18:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/09/18/lockbits-bounty-consequences-matter/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-09-17T22:50:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/09/11/generating-network-connection-information-for-experimentation-purposes/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/09/gen_network_details.png</image:loc><image:title>gen_network_details</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2022/09/gen_network.png</image:loc><image:title>gen_network</image:title></image:image><lastmod>2022-09-11T20:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/05/14/three-ways-to-hack-an-atm/</loc><lastmod>2022-05-15T06:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/04/23/writing-a-zero-findings-pentest-report/</loc><lastmod>2022-04-24T11:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2022/04/09/firewall-analysis-a-portable-graph-based-approach/</loc><lastmod>2022-04-10T18:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2021/11/07/more-doing-less-cyber/</loc><lastmod>2021-11-09T10:26:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2021/09/21/csaw-2021-binary-ninja-a-haystack/</loc><lastmod>2021-09-21T11:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2021/04/24/pentesting-what-i-should-have-done/</loc><lastmod>2021-04-25T07:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2021/04/15/into-the-void-ramblings-and-thoughts/</loc><lastmod>2021-04-14T22:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2020/05/10/part-2-interactive-and-transferrable-code-risk-visualization/</loc><lastmod>2020-05-10T00:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2020/05/06/part-1-experimenting-visualizations-code-risk-overview/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-kib-wc-tags.png</image:loc><image:title>code-kib-wc-tags</image:title><image:caption>word cloud of tags</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-kib-wc-rules.png</image:loc><image:title>code-kib-wc-rules</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-kib-tag-conf-sev.png</image:loc><image:title>code-kib-tag-conf-sev</image:title><image:caption>severity &amp; confidence per tag</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-kib-file-rule-conf.png</image:loc><image:title>code-kib-file-rule-conf</image:title><image:caption>confidence per rule per file</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-kib-file-conf-sev.png</image:loc><image:title>code-kib-file-conf-sev</image:title><image:caption>severity &amp; confidence per file</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-features.png</image:loc><image:title>code-features</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-donuts.png</image:loc><image:title>code-donuts</image:title><image:caption>Global overview</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/lsbasi_part7_ast_01.png</image:loc><image:title>lsbasi_part7_ast_01</image:title><image:caption>https://ruslanspivak.com/lsbasi-part7/</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-knowledge.png</image:loc><image:title>code-knowledge</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/05/code-mai.png</image:loc><image:title>code-mai</image:title></image:image><lastmod>2020-05-06T17:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2020/04/27/the-fallacy-of-manual-work-being-faster/</loc><lastmod>2020-04-27T20:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2020/03/28/vysolator-vyos-virtual-network-isolation/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2020/03/vysolator.png</image:loc><image:title>vysolator</image:title></image:image><lastmod>2020-03-28T12:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2020/03/04/lessons-learned-on-written-social-engineering-attacks/</loc><lastmod>2020-03-07T23:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2019/12/28/old-skool-red-team/</loc><lastmod>2019-12-28T20:11:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2019/11/18/secure-slack-bot-an-exercise-in-threat-modeling/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/11/tm_slackbot_enhanced.png</image:loc><image:title>tm_slackbot_enhanced</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/11/tm_slackbot-1.png</image:loc><image:title>tm_slackbot</image:title></image:image><lastmod>2019-11-17T23:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/contact/</loc><lastmod>2019-11-17T20:57:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://diablohorn.com/2019/09/01/notes-on-zfs-solaris-forensics/</loc><lastmod>2020-05-08T11:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2019/07/21/introduction-to-physical-penetration-tests/</loc><lastmod>2019-07-22T20:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2019/05/21/introduction-to-analysing-full-disk-encryption-solutions/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/secondstage3.png</image:loc><image:title>secondstage3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/secondstage2.png</image:loc><image:title>secondstage2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/secondstage1.png</image:loc><image:title>secondstage1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/morecode1.png</image:loc><image:title>morecode1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/copymbr1.png</image:loc><image:title>copymbr1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/bootcode1.png</image:loc><image:title>bootcode1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2019/05/loadfile1.png</image:loc><image:title>loadfile1</image:title></image:image><lastmod>2021-02-28T14:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2018/08/25/remote-ntlm-relaying-through-meterpreter-on-windows-port-445/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/08/ntlmrelayx.png</image:loc><image:title>ntlmrelayx</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/08/nbns-page-7.png</image:loc><image:title>NBNS-Page-7</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/08/hashcapture.png</image:loc><image:title>hashcapture</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/08/445_to_meterpreter.png</image:loc><image:title>445_to_meterpreter</image:title></image:image><lastmod>2022-05-18T15:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2018/08/06/creating-a-ram-disk-through-meterpreter/</loc><lastmod>2018-08-06T15:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2018/02/27/presentation-understanding-avoiding-av-detection/</loc><lastmod>2018-02-27T22:08:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2018/02/04/identify-a-whitelisted-ip-address/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/02/findip.png</image:loc><image:title>findip</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/02/overview.png</image:loc><image:title>overview</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2018/02/predictableisn.png</image:loc><image:title>predictableisn</image:title></image:image><lastmod>2018-02-18T15:35:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/05/12/repurposing-the-hp-audio-key-logger/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/05/img_5915f0cda08c4.png</image:loc><image:title>img_5915f0cda08c4</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/05/remote_keylog.png</image:loc><image:title>remote_keylog</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/05/procmon.png</image:loc><image:title>procmon</image:title></image:image><lastmod>2017-12-25T16:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/12/25/yara-for-pentesters/</loc><lastmod>2017-12-25T16:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/12/12/attacking-encrypted-systems-with-qemu-and-volatility/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/12/cmd_elevated.png</image:loc><image:title>cmd_elevated</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/12/cmd_patched.png</image:loc><image:title>cmd_patched</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/12/cmd_flow.png</image:loc><image:title>cmd_flow</image:title></image:image><lastmod>2020-09-04T18:43:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/10/26/port-scanning-without-an-ip-address/</loc><lastmod>2017-10-26T21:50:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/09/flow2.png</image:loc><image:title>flow2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/09/flow.png</image:loc><image:title>flow</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/09/normaldeser.png</image:loc><image:title>normaldeser</image:title></image:image><lastmod>2017-09-26T21:59:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/08/15/brute-forcing-encrypted-web-login-forms/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/gm_brute.png</image:loc><image:title>gm_brute</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login2resp.png</image:loc><image:title>login2resp</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login2req.png</image:loc><image:title>login2req</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login1resp.png</image:loc><image:title>login1resp</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login1req.png</image:loc><image:title>login1req</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login2.png</image:loc><image:title>Login request 2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/08/login1.png</image:loc><image:title>Login request 1</image:title></image:image><lastmod>2018-11-20T16:49:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/05/21/quantum-insert-bypassing-ip-restrictions/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/04/qitu-poc.png</image:loc><image:title>qitu-poc</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2017/04/whitelist.png</image:loc><image:title>whitelist</image:title></image:image><lastmod>2017-05-21T17:34:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2017/03/09/python-raw-sockets-sniffing-pcap-saving/</loc><lastmod>2017-03-09T23:27:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2016/11/05/win10-secure-boot-inside-vmware-fusion/</loc><lastmod>2016-11-05T18:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2016/09/27/meterpreter-registry-unicode-quirk-work-around/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/09/registry_fixed.png</image:loc><image:title>registry_fixed</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/09/registry_garbled-e1475013398733.png</image:loc><image:title>registry_garbled</image:title></image:image><lastmod>2016-09-27T22:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2016/08/14/python-poor-mans-forensics/</loc><lastmod>2016-08-14T23:01:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2016/03/01/idea-abusing-google-dlp-for-nsa-style-content-searching/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/03/google-dlp.png</image:loc><image:title>google-dlp</image:title></image:image><lastmod>2016-03-01T20:57:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2016/02/06/powershell-overview-and-introduction/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/01/powershell1.png</image:loc><image:title>powershell</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/01/powershell.png</image:loc><image:title>powershell</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2016/01/basic-powershell-commands-intro-840x420.png</image:loc><image:title>basic-powershell-commands-intro-840x420</image:title></image:image><lastmod>2016-02-07T21:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2015/09/04/discovering-the-secrets-of-a-pageant-minidump/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/key_compare.png</image:loc><image:title>key_compare</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/key_bignum2.png</image:loc><image:title>key_bignum2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/key_data.png</image:loc><image:title>key_data</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/key_comment.png</image:loc><image:title>key_comment</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/mem_tree_element.png</image:loc><image:title>mem_tree_element</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/mem_tree_node.png</image:loc><image:title>mem_tree_node</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/mem_tree.png</image:loc><image:title>mem_tree</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/mem_start_tree.png</image:loc><image:title>mem_start_tree</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/static_ssh_tree.png</image:loc><image:title>static_ssh_tree</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/09/mde_main_window.png</image:loc><image:title>mde_main_window</image:title></image:image><lastmod>2018-06-28T23:13:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2015/10/03/pageant-key-extraction-automated/</loc><lastmod>2015-10-03T21:36:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2015/03/28/continuously-rotating-hashes/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/03/otp.png</image:loc><image:title>otp</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/03/create_account.png</image:loc><image:title>create_account</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/03/rotating_login.png</image:loc><image:title>rotating_login</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/03/better_login.png</image:loc><image:title>better_login</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2015/03/normal_login.png</image:loc><image:title>normal_login</image:title></image:image><lastmod>2015-03-28T22:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/12/10/parsing-the-hiberfil-sys-searching-for-slack-space/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/12/hiberfil_file_format.png</image:loc><image:title>hiberfil_file_format</image:title></image:image><lastmod>2014-12-31T13:45:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/01/18/encrypted-screenshots/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/01/ic444273.png</image:loc><image:title>IC444273</image:title></image:image><lastmod>2014-12-12T00:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/07/26/writing-your-own-blind-sqli-script/</loc><lastmod>2014-07-26T01:46:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/07/13/physical-home-security-options/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/3_dievenklauw.jpg</image:loc><image:title>3_dievenklauw</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/security_w_film.jpg</image:loc><image:title>security_w_film</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/011-security-profile.jpg</image:loc><image:title>011-security-profile</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/fire-shutter1.jpeg</image:loc><image:title>fire-shutter1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/fixed_grille.jpg</image:loc><image:title>fixed_grille</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/i-corrosion-aluminium-burglar-deterrent-1940-p.jpg</image:loc><image:title>i-corrosion-aluminium-burglar-deterrent-1940-p</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/aj127_large_warning_guard_dog.jpg</image:loc><image:title>AJ127_Large_Warning_Guard_Dog</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/07/grow-light-timer.jpg</image:loc><image:title>grow-light-timer</image:title></image:image><lastmod>2018-09-17T14:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/04/21/quick-poc-to-mitm-rdp-ssl/</loc><lastmod>2014-05-08T21:50:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/03/23/dumping-the-truecrypt-second-stage/</loc><lastmod>2014-03-23T22:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/03/16/old-vmware-vsphere-client-xml-external-entity-attack/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/51.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/41.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/12/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2014-03-16T02:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/03/16/memory-zeroization-frustrating-memory-forensics/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2014/03/5f41e-screenshot.png</image:loc><image:title>5f41e-screenshot</image:title></image:image><lastmod>2014-03-16T02:32:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/02/27/qp-stop-video-recording-your-command-line-i-want-to-grep-it/</loc><lastmod>2014-02-27T00:12:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2014/02/09/solving-roguecoders-sqli-challenge/</loc><lastmod>2014-02-11T10:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/11/28/qp-raw-sockets-iptables/</loc><lastmod>2013-11-28T00:44:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/10/24/remote-hash-dumping-no-processes-or-tool-upload-needed/</loc><lastmod>2014-06-21T14:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/10/19/alternative-psexec-no-wmi-services-or-mof-needed/</loc><lastmod>2013-10-20T21:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/07/14/sslsniff-howto-dump-the-temporary-key/</loc><lastmod>2014-01-17T17:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/05/14/vbscript-based-interactive-registry-viewer/</loc><lastmod>2013-05-15T03:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/05/07/verifying-nmap-scans/</loc><lastmod>2013-05-20T21:09:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/05/05/finding-sub-domains-with-search-engines/</loc><lastmod>2013-05-05T00:11:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/04/14/quick-tiny-python-web-proxy/</loc><lastmod>2016-09-04T13:47:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/03/30/firewalking-with-nmap/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/03/basicsetup.png</image:loc><image:title>basicsetup</image:title></image:image><lastmod>2013-03-30T19:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/02/21/we-bypassed-antivirus-how-about-idsips/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/idsbypass.png</image:loc><image:title>idsbypass</image:title></image:image><lastmod>2017-08-13T18:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/02/06/console-terminal-logs-ftw/</loc><lastmod>2013-02-06T01:03:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/02/04/evade-antivirus-convert-shellcode-to-c/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/02/0.png</image:loc></image:image><lastmod>2014-02-06T20:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/01/20/hash-encapsulation-to-bypass-av/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/fud.png</image:loc><image:title>FUD</image:title></image:image><lastmod>2013-03-06T23:01:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/01/19/av-evasion-recompiling-optimizing-ftw/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/deps.png</image:loc><image:title>deps</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/opt.png</image:loc><image:title>opt</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/lazyeasy.png</image:loc><image:title>lazyeasy</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/no-detection.png</image:loc><image:title>no-detection</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/makerel.png</image:loc><image:title>makerel</image:title></image:image><lastmod>2013-01-19T16:47:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/01/13/native-linux-psexec/</loc><lastmod>2013-01-13T19:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2013/01/07/making-your-own-door-opening-shims/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/2-e1357599291323.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2013/01/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2013-01-07T22:55:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/12/10/vmware-workstation-and-dragging-vms-to-a-new-window/</loc><lastmod>2013-11-04T05:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/12/08/portable-secure-pentest-virtual-lab/</loc><lastmod>2012-12-08T21:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/11/22/credential-scavenger/</loc><lastmod>2012-11-22T02:50:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/02/18/locating-domain-controllers/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/02/ldap-ping.png</image:loc><image:title>ldap-ping</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2012/02/packets.png</image:loc><image:title>packets</image:title></image:image><lastmod>2012-07-10T18:25:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/02/10/connectionless-backdoor-idea-doesnt-use-tcpudp/</loc><lastmod>2012-11-03T22:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/01/19/encrypted-jsp-shell-with-signed-diffie-hellman-key-exchange/</loc><lastmod>2012-01-19T01:07:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/01/04/virtualized-firewire-attack/</loc><lastmod>2014-03-28T06:39:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2012/01/04/cleaning-up-links/</loc><lastmod>2012-01-04T02:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2011/12/30/simple-jsp-shell-simple-os-detection-prolly-flawed-encrypted-commands/</loc><lastmod>2011-12-30T23:01:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2011/12/10/remote-av-detection-with-eicar/</loc><lastmod>2011-12-12T15:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2011/10/19/8009-the-forgotten-tomcat-port/</loc><lastmod>2018-06-25T07:45:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2011/07/21/quick-dirty-secure-chat-ncat/</loc><lastmod>2011-07-21T21:20:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2011/07/08/efficient-but-slow-blind-sql-injection-data-extraction/</loc><lastmod>2012-03-21T21:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/12/07/mod_negotiation-metasploit-aux-modules/</loc><lastmod>2010-12-07T22:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/12/06/moving-source-codes-to-github/</loc><lastmod>2010-12-06T22:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/12/05/dnscat-traffic-post-dissector/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2010/12/dnscat-issue-hex-pcap.png</image:loc><image:title>dnscat.issue.hex.pcap</image:title></image:image><lastmod>2013-01-14T19:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/12/04/whats-in-a-picture/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2010/12/img.png</image:loc><image:title>What's in an image</image:title></image:image><lastmod>2011-12-15T20:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/12/01/lua-based-dnscat-traffic-parser/</loc><lastmod>2010-12-01T20:26:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/11/05/java-in-memory-class-loading/</loc><lastmod>2015-01-13T18:03:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/08/14/internetqueryoption-internet_option_user_agent-replacement/</loc><lastmod>2011-06-08T20:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/07/30/everything-can-be-hacked-or-can-it/</loc><lastmod>2013-10-22T18:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/07/19/raw-sockets-pcap-files-wireshark-quirks/</loc><lastmod>2010-11-08T10:39:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/07/10/firewall-dns-v0-1/</loc><lastmod>2011-03-04T00:07:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/06/11/future-patching-made-easy/</loc><lastmod>2010-08-02T17:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/04/19/firewall-dns/</loc><lastmod>2010-04-25T10:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/03/23/quick-snippet/</loc><lastmod>2011-10-16T05:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/03/21/gotta-love-compression/</loc><lastmod>2014-03-23T21:33:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/03/17/bittorrent-downloads/</loc><lastmod>2010-03-21T01:49:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/03/21/more-wordlists/</loc><lastmod>2010-03-21T01:33:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/01/16/interesting-local-file-inclusion-method/</loc><lastmod>2012-12-10T03:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/01/12/port-scanning-from-different-source-ports/</loc><lastmod>2010-01-12T23:31:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2010/01/09/bootloader-development-environment/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2010/01/mbr_hello.png</image:loc><image:title>MBR_Hello</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2010/01/mbr_startup.png</image:loc><image:title>MBR_Startup</image:title></image:image><lastmod>2013-01-10T15:53:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/12/10/the-helping-hand-of-url-shortening-services/</loc><lastmod>2009-12-10T22:43:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/11/23/and-another-google-password-dork/</loc><lastmod>2010-01-17T23:31:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/11/10/mysql-udf-shells/</loc><lastmod>2009-11-10T00:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/11/08/stealing-stuff-from-vmdk-files/</loc><lastmod>2009-11-09T19:53:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/20/sniffdoor/</loc><lastmod>2009-10-17T23:52:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/10/10/still-alive/</loc><lastmod>2009-10-18T18:36:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/01/01/truecrypt-variety-of-bruteforcing-options/</loc><lastmod>2013-09-10T19:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/24/the-dirty-sql-tricks/</loc><lastmod>2009-11-13T14:22:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/24/web-request-maker/</loc><lastmod>2009-08-24T08:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/24/process-memory-dumper/</loc><lastmod>2009-08-24T08:50:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/24/copy-file-time/</loc><lastmod>2009-08-24T08:49:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/23/corruption-security/</loc><lastmod>2009-11-24T05:18:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/08/12/workable-deniability/</loc><lastmod>2009-08-12T22:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/20/abuse-legitimate-code-backdoor-purpose/</loc><lastmod>2009-07-20T21:04:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/20/google-sub-domain-indexer/</loc><lastmod>2010-02-06T14:13:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/16/bit-more-efficient-brute-forcing/</loc><lastmod>2009-07-16T21:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/11/ip-id-finder/</loc><lastmod>2009-07-11T00:24:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/08/art-exposiion/</loc><lastmod>2011-01-16T02:54:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/08/google-dork/</loc><lastmod>2009-07-08T23:27:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/07/03/added-contact-information/</loc><lastmod>2009-07-03T18:04:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/06/25/scriptable-anti-live-forensics-poc/</loc><lastmod>2009-06-25T21:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/05/25/burn-notice-toy-is-really-that-easy-to-build/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/cimg0011.jpg</image:loc><image:title>CIMG0011</image:title></image:image><lastmod>2012-11-05T05:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/05/21/the-power-of-suggestion/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/powerofsuggestion.jpg</image:loc><image:title>powerofsuggestion</image:title></image:image><lastmod>2010-01-04T23:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/05/20/laser-alarm-fun-stuff/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/cimg0008.jpg</image:loc><image:title>CIMG0008</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/entrapment.jpg</image:loc><image:title>entrapment</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/cimg0002.jpg</image:loc><image:title>CIMG0002</image:title><image:caption>finished circuit</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/05/cimg0005.jpg</image:loc><image:title>laser alarm schematic</image:title></image:image><lastmod>2014-11-28T14:07:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/03/08/the-process-of-a-successful-stack-based-bof-part-2/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof121.jpg</image:loc><image:title>bof121</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof111.jpg</image:loc><image:title>bof111</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof10.jpg</image:loc><image:title>bof10</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof9.jpg</image:loc><image:title>bof9</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof8.jpg</image:loc><image:title>bof8</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof7.jpg</image:loc><image:title>bof7</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof6.jpg</image:loc><image:title>bof6</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof5.jpg</image:loc><image:title>bof5</image:title></image:image><lastmod>2009-04-20T07:45:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/03/07/the-process-of-a-successful-stack-based-bof-part-1/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof4.jpg</image:loc><image:title>bof4</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof3.jpg</image:loc><image:title>bof3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof2.jpg</image:loc><image:title>bof2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2009/03/bof12.jpg</image:loc><image:title>bof12</image:title></image:image><lastmod>2009-03-07T21:07:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/03/05/geographically-locating-phone-numbers/</loc><lastmod>2009-03-28T22:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/02/28/backerdie/</loc><lastmod>2009-02-28T19:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/01/05/poc-rfi-scanner/</loc><lastmod>2012-06-08T05:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2009/01/01/python-hidden-love-and-hate/</loc><lastmod>2010-01-27T05:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/28/anti-live-forensic-toolkit/</loc><lastmod>2008-12-28T21:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/27/untracable-connect-back/</loc><lastmod>2008-12-27T17:11:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/06/geographically-locating-ip-addresses/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/12/geoloc.jpg</image:loc><image:title>geoloc</image:title><image:caption>TULIP in action</image:caption></image:image><lastmod>2010-01-10T17:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/07/old-rootkit-detection/</loc><lastmod>2010-01-17T06:30:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/06/cracking-a-simple-and-old-cd-check/</loc><lastmod>2021-01-30T08:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/06/icmp-spoof/</loc><lastmod>2010-05-10T20:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/06/javascript-deobfuscation-a-little-start/</loc><lastmod>2008-12-06T01:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/12/02/reversing-grasping-the-big-picture/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/12/functionnaming.jpg</image:loc><image:title>re-naming done</image:title><image:caption>re-naming done</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/12/notnamedyet.jpg</image:loc><image:title>No re-naming done</image:title><image:caption>No re-naming done</image:caption></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/12/serialgengraph.jpg</image:loc><image:title>Function Graph</image:title><image:caption>Function Graph</image:caption></image:image><lastmod>2008-12-03T10:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/23/finding-truecrypt-containers/</loc><lastmod>2008-11-23T19:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/23/truecrypt-update-speeds/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/tc3.jpg</image:loc><image:title>tc3</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/tc2.jpg</image:loc><image:title>tc2</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/tc.jpg</image:loc><image:title>tc</image:title></image:image><lastmod>2008-11-23T16:48:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/23/ubuntu-810-mobile-support/</loc><lastmod>2008-11-23T15:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/12/busy-busy/</loc><lastmod>2008-11-12T22:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/04/ide-sniffing-detect-wdefde/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/crypted.jpg</image:loc><image:title>crypted</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/non-crypted.jpg</image:loc><image:title>non-crypted</image:title></image:image><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/logicport_big.jpg</image:loc><image:title>logicport_big</image:title></image:image><lastmod>2008-11-04T21:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/02/extending-burp-proxy/</loc><image:image><image:loc>https://diablohorn.com/wp-content/uploads/2008/11/burp_alert_tab.jpg</image:loc><image:title>burp_alert_tab</image:title><image:caption>Burp Suite alert tab</image:caption></image:image><lastmod>2009-04-04T14:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/11/02/its-not-always-technical/</loc><lastmod>2008-11-02T18:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/29/fde-wde-spiced-up/</loc><lastmod>2008-11-02T15:50:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/trusting-java-applets/</loc><lastmod>2009-05-05T12:11:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/30/making-a-linux-ramdisk/</loc><lastmod>2008-10-30T20:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/30/aprils-fools/</loc><lastmod>2008-10-30T20:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/bypassing-ip-restrictions-with-a-backdoor/</loc><lastmod>2008-10-28T23:41:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/old-papers-and-tools/</loc><lastmod>2008-10-28T19:46:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/arp-poisoning/</loc><lastmod>2008-10-28T19:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/timing-rootkits/</loc><lastmod>2008-10-28T19:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/28/friends/</loc><lastmod>2008-10-28T19:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com/2008/10/27/changes/</loc><lastmod>2009-03-22T20:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://diablohorn.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-22T15:33:27+00:00</lastmod></url></urlset>
