<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/</loc><lastmod>2024-07-24T11:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2018/01/24/stack-based-buffer-overflows-on-x64-windows/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/01/jmp-rax.jpg</image:loc><image:title>JMP RAX</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/01/win64-registers.jpg</image:loc><image:title>Win64 registers</image:title></image:image><lastmod>2024-05-26T20:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2019/01/21/network-scanning-with-nmap/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2019/01/http-wireshark.png</image:loc><image:title>http wireshark</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2019/01/closed.png</image:loc><image:title>closed</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2019/01/open.png</image:loc><image:title>open</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2019/01/syn.png</image:loc><image:title>syn</image:title></image:image><lastmod>2019-01-21T11:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/projects/xss-fuzzer/</loc><lastmod>2018-11-28T08:54:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com/projects/</loc><lastmod>2018-11-28T07:31:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com/about/</loc><lastmod>2018-11-28T07:29:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com/projects/netripper/</loc><lastmod>2018-06-29T19:50:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com/2018/05/30/understanding-java-deserialization/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/04/calculator.png</image:loc><image:title>Calculator</image:title></image:image><lastmod>2020-07-29T23:47:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2018/02/26/hooking-chromes-ssl-functions/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/02/find-ref-to-ssl_read_impl-32.jpg</image:loc><image:title>Find ref to ssl_read_impl 32</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/02/found-multiple-32.jpg</image:loc><image:title>Found multiple 32</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/02/found-full-path-32.jpg</image:loc><image:title>Found full path 32</image:title></image:image><lastmod>2022-02-17T09:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2018/03/31/netripper-at-blackhat-asia-arsenal-2018/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/03/img_8937.jpg</image:loc><image:title>IMG_8937</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/03/dy82rouvwaalj1p.jpg</image:loc><image:title>DY82rOUVwAALJ1P</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2018/03/dy3nx3vvqaamx-v.jpg</image:loc><image:title>DY3nx3vVQAAmx-v</image:title></image:image><lastmod>2018-04-02T18:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/projects/shellcode-compiler/</loc><lastmod>2017-12-24T22:05:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com/2017/12/09/stack-based-buffer-overflows-on-x86-windows-part-i/</loc><lastmod>2017-12-24T20:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2017/12/20/stack-based-buffer-overflows-on-x86-windows-part-ii/</loc><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2017/12/x64-shellcode-ok.png</image:loc><image:title>x64 shellcode ok</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2017/12/x64-jmp-esp.png</image:loc><image:title>x64 jmp esp</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2017/12/x64-search-jmp.png</image:loc><image:title>x64 search jmp</image:title></image:image><image:image><image:loc>https://nytrosecurity.com/wp-content/uploads/2017/12/x64-example.png</image:loc><image:title>x64 example</image:title></image:image><lastmod>2017-12-24T20:16:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/2017/12/08/hello-world/</loc><lastmod>2017-12-10T11:42:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://nytrosecurity.com/contact/</loc><lastmod>2017-11-08T21:14:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://nytrosecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-07-24T11:26:29+00:00</lastmod></url></urlset>
