<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://waawaa.github.io/es/weblogic-cve-2017-10271/</loc>
<lastmod>2018-01-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/en/bypass-userland-hooking-using-suspended-processes/</loc>
<lastmod>2022-05-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/es/shellcode-iat-parsing_part-1/</loc>
<lastmod>2022-05-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/es/reversing-faronics-deepfreeze/</loc>
<lastmod>2022-06-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/es/shellcode-iat-parsing-part-2/</loc>
<lastmod>2022-06-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/es/amsi_bypass-hooking-NtCreateSection/</loc>
<lastmod>2022-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/en/Bypass-PPL-Using-Process-Explorer/</loc>
<lastmod>2022-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://waawaa.github.io/</loc>
</url>
<url>
<loc>https://waawaa.github.io/page2/</loc>
</url>
<url>
<loc>https://waawaa.github.io/assets/images/2018-01-30-weblogic-cve-2017-10271/respuesta_dns_exfil.pdf</loc>
<lastmod>2022-08-10T09:31:55+02:00</lastmod>
</url>
</urlset>
