<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://brainscope.at/blog</loc><lastmod>2025-05-06T14:39:55+00:00</lastmod></url><url><loc>https://brainscope.at/blog/weoponize-harmless-shortcut-files-for-phishing</loc><lastmod>2026-03-02T18:21:36+00:00</lastmod></url><url><loc>https://brainscope.at/blog/the-hard-way-of-emulating-firmware-part-3</loc><lastmod>2025-11-26T08:36:28+00:00</lastmod></url><url><loc>https://brainscope.at/blog/the-hard-way-of-emulating-firmware-part-2</loc><lastmod>2025-11-26T08:23:40+00:00</lastmod></url><url><loc>https://brainscope.at/blog/the-hard-way-of-emulating-firmware</loc><lastmod>2025-11-26T08:23:59+00:00</lastmod></url><url><loc>https://brainscope.at/blog/exploiting-path-traversal-the-creative-way</loc><lastmod>2025-05-06T14:49:11+00:00</lastmod></url><url><loc>https://brainscope.at/blog/how-to-setup-a-fake-captive-portal-to-phish-passwords</loc><lastmod>2025-06-13T09:51:38+00:00</lastmod></url><url><loc>https://brainscope.at/blog/use-a-raspberry-pi-as-a-rogue-access-point-to-sniff-wifi-traffic</loc><lastmod>2025-05-24T13:50:10+00:00</lastmod></url><url><loc>https://brainscope.at/blog/sniff-wifi-traffic-to-uncover-secrets-of-your-home-devices</loc><lastmod>2025-05-24T12:44:21+00:00</lastmod></url><url><loc>https://brainscope.at/blog/get-interesting-data-by-sniffing-snmp-traffic</loc><lastmod>2025-05-24T12:35:13+00:00</lastmod></url><url><loc>https://brainscope.at/blog/create-a-rogue-access-point-with-a-linux-vm</loc><lastmod>2025-05-24T12:45:08+00:00</lastmod></url><url><loc>https://brainscope.at/blog/pan-os-11-1-command-injection</loc><lastmod>2025-05-24T12:22:46+00:00</lastmod></url><url><loc>https://brainscope.at/blog/exploiting-boa-webserver-path-traversal</loc><lastmod>2025-05-24T13:45:01+00:00</lastmod></url><url><loc>https://brainscope.at/blog/testing-log4j-remote-code-execution</loc><lastmod>2025-05-24T12:40:14+00:00</lastmod></url><url><loc>https://brainscope.at/blog/how-json-web-tokens-work</loc><lastmod>2025-05-24T12:26:46+00:00</lastmod></url><url><loc>https://brainscope.at/blog/exploiting-buffer-overflows-vulnerabilities-a-real-world-example</loc><lastmod>2025-05-24T12:36:52+00:00</lastmod></url><url><loc>https://brainscope.at/blog/how-to-exploit-json-web-tokens</loc><lastmod>2025-05-24T12:31:29+00:00</lastmod></url><url><loc>https://brainscope.at/blog/how-to-test-and-exploit-apache-18-12-10-authentication-bypass-command-injection</loc><lastmod>2025-05-24T12:46:03+00:00</lastmod></url><url><loc>https://brainscope.at/blog/experimenting-with-buffer-overflows</loc><lastmod>2025-05-22T15:16:42+00:00</lastmod></url><url><loc>https://brainscope.at/blog/how-the-stack-works</loc><lastmod>2025-05-24T12:36:00+00:00</lastmod></url><url><loc>https://brainscope.at/about</loc><lastmod>2025-11-12T13:03:39+00:00</lastmod></url><url><loc>https://brainscope.at</loc><lastmod>2025-05-24T13:48:18+00:00</lastmod></url></urlset>