<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//danielsauder.com/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://danielsauder.com/2014/01/24/slae-assignment-5-shellcode-analysis/</loc>
  <lastmod>2014-01-24T13:14:57Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2014/01/exec-dot.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/24/slae-assignment-5-shellcode-analysis/</loc>
  <lastmod>2014-01-24T21:55:27Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2014/01/shell_bind_tcp-dot.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/</loc>
  <lastmod>2015-04-20T19:04:24Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/04/auswahl_004.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/</loc>
  <lastmod>2015-04-20T19:51:57Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/04/auswahl_001.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/</loc>
  <lastmod>2015-04-20T20:23:36Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/04/auswahl_005.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/07/14/a-basic-keylogger-for-windows/</loc>
  <lastmod>2015-07-14T12:46:46Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/07/2015-07-14-14_22_46-winxp_1-ausgangspunkt-fc3bcr-winxp_1-und-winxp_1-klon-wird-ausgefc3bchrt-oracle.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/08/26/an-analysis-of-shikata-ga-nai/</loc>
  <lastmod>2015-08-24T16:16:09Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/08/shikata01.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/08/26/an-analysis-of-shikata-ga-nai/</loc>
  <lastmod>2015-08-24T16:16:11Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/08/shikata02.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/08/26/an-analysis-of-shikata-ga-nai/</loc>
  <lastmod>2015-08-24T16:19:51Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/08/shikata03.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/08/26/an-analysis-of-shikata-ga-nai/</loc>
  <lastmod>2015-08-24T16:20:36Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2015/08/shikata04.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-1-mimikatz-lsass-exe-dump/</loc>
  <lastmod>2016-02-06T10:06:52Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/prxp624447fe299fa27348bebd7a23b30eb.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-2-windows-7-full-memory-dump-get-hashes/</loc>
  <lastmod>2016-02-06T10:11:35Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/dumpit0551934099191ca7d24e3bd4552ee139.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-6-vmware-workstation/</loc>
  <lastmod>2016-02-06T10:22:22Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/workstf1e79bd53e31d6944a7d87fe92f6aab4.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-7-esxi-server/</loc>
  <lastmod>2016-02-06T10:26:46Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/esxia413004ae4cd1d083f7506beb40b91de.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-7-esxi-server/</loc>
  <lastmod>2016-02-06T10:27:48Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/dsa9786e65987088417a34ba10c323eaf3.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-7-esxi-server/</loc>
  <lastmod>2016-02-06T10:28:22Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/dsvsphere58ca9c91c0c70b1e95ed1f3dfa2488ee.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T10:32:52Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/shodandce1afd8621c8cf131afca4d7451dca5.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T10:34:08Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/dslog4a7ef9d247c31587dd7399cf5a89bf55.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T10:35:17Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/dslog4a7ef9d247c31587dd7399cf5a89bf551.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T10:36:00Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/log10c71e5f655bcec62fbf007ac4076d03c.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T10:36:39Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2016/02/log27879476bcacfd758b78ccee433346b15.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/01/18/extract-text-and-media-content-from-docx/</loc>
  <lastmod>2017-01-18T01:52:53Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/01/xtractdocx.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-02-04T14:43:24Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/02/0b14dfd7755353e751e8b713ea2a5d9d4.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-02-04T14:43:24Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/02/1b14dfd7755353e751e8b713ea2a5d9d4.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-02-04T14:43:25Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/02/24d0225603b92a9a92a85be2358dd5c80.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-02-04T14:43:26Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/02/324147b8a0ce1624c43da1a97de8e0e85.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-02-04T14:43:27Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/02/4784962ec56d0b26b0c4107c054d32d05.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/05/06/avet-and-unstaged-payloads/</loc>
  <lastmod>2017-05-06T15:39:25Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/05/2017-05-06-16_56_56-kali-linux-2016-2-vbox-amd64-wird-ausgefc3bchrt-oracle-vm-virtualbox.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/05/06/avet-and-unstaged-payloads/</loc>
  <lastmod>2017-05-06T16:32:27Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/05/2017-03-13-20_46_30-avet_2-1_inverted-irfanview-zoom_-615-x-615.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/07/27/paper-avet-blackhat-usa-2017/</loc>
  <lastmod>2017-07-27T04:39:34Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/07/klammer.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/06/16/using-msf-alpha_mixed-encoder-for-antivirus-evasion/</loc>
  <lastmod>2017-08-02T06:31:08Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/06/2017-08-02-08_21_00-kali-2016-2-64-bit-vmware-workstation.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/12/27/reverse-pseudo-shell-over-ssh/</loc>
  <lastmod>2017-12-27T12:40:24Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/12/ssh_connectback_pseudoshell.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/12/27/reverse-pseudo-shell-over-ssh/</loc>
  <lastmod>2017-12-27T12:52:16Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/12/2017-12-27-13_49_46-kali-2016-2-64-bit-vmware-workstation.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/12/27/reverse-pseudo-shell-over-ssh/</loc>
  <lastmod>2017-12-27T12:54:19Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2017/12/2017-12-27-13_53_37-winxp_exploiting-vmware-workstation.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/03/02/download-exec-poc-and-dkmc/</loc>
  <lastmod>2018-03-02T20:25:59Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2018/03/2018-03-02-21_24_51-msedge-win10-vmware-vmware-workstation.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/03/21/antivirus-evasion-on-osx/</loc>
  <lastmod>2019-03-21T23:08:33Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/03/image.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/</loc>
  <lastmod>2019-05-02T15:31:58Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/6421894.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/impressum/</loc>
  <lastmod>2019-05-02T16:10:01Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/impressum.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/impressum-2/</loc>
  <lastmod>2019-05-02T16:11:44Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/impressum-1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/impressum-3/</loc>
  <lastmod>2019-05-02T16:11:56Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/impressum-2.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/impressum-4/</loc>
  <lastmod>2019-05-02T16:13:45Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/impressum-3.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/windows-7-ie-developer-ssh-server/</loc>
  <lastmod>2019-05-21T13:05:47Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/iewin7_netstat.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/windows-7-ie-developer-ssh-server/</loc>
  <lastmod>2019-05-21T13:08:18Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/iewin7_sshuser.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/windows-7-ie-developer-ssh-server/</loc>
  <lastmod>2019-05-21T13:10:03Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/iewin7_login.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/wifi-hotspot-with-windows-7/</loc>
  <lastmod>2019-05-21T18:40:09Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2019/05/2019-05-21-18_53_06-virtual-router-manager-v1.0.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://danielsauder.com/2026/03/21/course-review-ai-llms-offensive-defensive-security/</loc>
  <lastmod>2026-03-21T15:21:03Z</lastmod>
  <image:image>
   <image:loc>https://danielsauder.com/wp-content/uploads/2026/03/image.png</image:loc>
  </image:image>
 </url>
</urlset>
