<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7'-->
<!--Jetpack_Sitemap_Buffer_Page_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//danielsauder.com/sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 <url>
  <loc>https://danielsauder.com/</loc>
  <lastmod>2026-04-09T13:04:18Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2023/04/08/sicherheit-digitales-daruber-hinaus-security-digital-beyond-21/</loc>
  <lastmod>2023-04-15T09:32:43Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/15/welcome/</loc>
  <lastmod>2014-01-26T18:40:47Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/16/assignment-1-bind-shell/</loc>
  <lastmod>2014-01-18T19:22:32Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/19/slae-assignment-2-reverse-shell/</loc>
  <lastmod>2014-01-19T10:05:24Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/19/assignment-3-egghunter-demo/</loc>
  <lastmod>2014-01-20T08:05:40Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/21/slae-assignment-4-custom-encoder/</loc>
  <lastmod>2014-01-23T19:20:34Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/24/slae-assignment-5-shellcode-analysis/</loc>
  <lastmod>2014-01-25T15:41:44Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/26/slae-assignment-6-polymorphic-shellcode/</loc>
  <lastmod>2014-01-28T09:34:03Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/27/slae-assignment-7-crypter/</loc>
  <lastmod>2014-01-28T09:43:52Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/01/28/slae-shellcode-read-and-send-file/</loc>
  <lastmod>2014-02-13T12:04:37Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/02/02/writing-a-download-and-exec-shellcode/</loc>
  <lastmod>2021-09-19T18:22:56Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/02/11/shellcode-for-deleting-a-file/</loc>
  <lastmod>2014-02-11T22:03:46Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/05/27/article-about-antivirus-evasion/</loc>
  <lastmod>2017-01-28T15:21:20Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/05/30/usefull-addons-for-webapplication-pentesting/</loc>
  <lastmod>2014-05-31T11:28:19Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/07/26/shellcode-binder-for-windows-64-bit/</loc>
  <lastmod>2014-07-26T17:58:35Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2014/12/13/deepsec-2014-why-antvirus-software-fails/</loc>
  <lastmod>2015-05-18T15:21:23Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/02/07/one-for-all-null-free-windows-winexec-shellcode-tool-for-generating-payload/</loc>
  <lastmod>2017-05-03T00:23:13Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/04/21/shifting-from-32bit-to-64bit-linux-shellcode/</loc>
  <lastmod>2015-04-21T06:28:31Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/04/18/dumping-shellcode-64bit-style/</loc>
  <lastmod>2015-04-18T21:45:30Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/07/03/raspberry-pi-arm-shellcoding/</loc>
  <lastmod>2015-07-03T19:42:16Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/07/14/a-basic-keylogger-for-windows/</loc>
  <lastmod>2015-07-14T13:18:07Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/08/26/an-analysis-of-shikata-ga-nai/</loc>
  <lastmod>2015-11-24T17:24:30Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/10/01/slides-owasp-meeting-cologne/</loc>
  <lastmod>2015-10-01T19:35:43Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/10/16/great-link-list-for-malware-research/</loc>
  <lastmod>2015-10-25T17:09:26Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2015/11/06/very-first-steps-with-ida/</loc>
  <lastmod>2015-11-06T20:29:41Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-1-mimikatz-lsass-exe-dump/</loc>
  <lastmod>2016-02-06T10:54:07Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-2-windows-7-full-memory-dump-get-hashes/</loc>
  <lastmod>2016-02-06T10:59:41Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-3-windbg-mimikatz-extension/</loc>
  <lastmod>2023-07-29T23:12:56Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/windows-credentials-and-memory-dumps-part-4-volatility-mimikatz/</loc>
  <lastmod>2016-02-06T11:05:57Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/windows-credentials-and-memory-dumps-part-5-virtualbox-lmntlm-hashes/</loc>
  <lastmod>2016-02-06T11:11:08Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-6-vmware-workstation/</loc>
  <lastmod>2016-02-06T11:12:21Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-7-esxi-server/</loc>
  <lastmod>2016-02-11T20:59:36Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-8-esxi-attacking-scenario-volatility-on-esxi/</loc>
  <lastmod>2016-02-06T11:16:01Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-part-9-logging-monitoring-esxi/</loc>
  <lastmod>2016-02-06T11:18:20Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/02/06/memdumps-volatility-mimikatz-vms-overview/</loc>
  <lastmod>2016-02-07T18:43:51Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/04/13/ntds-cracking-with-kali/</loc>
  <lastmod>2016-04-13T20:07:38Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2016/10/24/the-first-15-days-of-a-password-honeypot/</loc>
  <lastmod>2016-10-24T20:21:20Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/01/18/extract-text-and-media-content-from-docx/</loc>
  <lastmod>2017-01-18T01:57:26Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/02/04/using-tdm-gcc-with-kali-2/</loc>
  <lastmod>2017-12-26T19:42:11Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/04/28/slides-owasp-meeting-cologne-avet/</loc>
  <lastmod>2017-04-28T11:26:05Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/05/06/avet-and-unstaged-payloads/</loc>
  <lastmod>2017-06-02T03:16:49Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/05/27/write-your-own-metasploit-psexec-service/</loc>
  <lastmod>2017-06-02T03:08:51Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/06/11/avet-video/</loc>
  <lastmod>2017-06-11T00:36:03Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/06/16/using-msf-alpha_mixed-encoder-for-antivirus-evasion/</loc>
  <lastmod>2017-08-02T06:38:56Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/07/27/paper-avet-blackhat-usa-2017/</loc>
  <lastmod>2017-07-27T04:39:42Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/08/09/av-evasion-poc-killswitch-gethostbyname/</loc>
  <lastmod>2017-08-09T22:21:49Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/09/16/slides-post-exploitation-and-attack-vectors-in-vsphere/</loc>
  <lastmod>2017-09-16T09:53:17Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/11/11/libssh-first-steps/</loc>
  <lastmod>2017-11-14T21:58:11Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2017/12/27/reverse-pseudo-shell-over-ssh/</loc>
  <lastmod>2017-12-27T14:51:53Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/01/05/recommended-talks-for-the-new-year-34c3-bh/</loc>
  <lastmod>2018-01-05T19:54:43Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/03/02/download-exec-poc-and-dkmc/</loc>
  <lastmod>2018-03-03T19:42:28Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/06/20/review-udemy-certified-advanced-persistent-threat-analyst/</loc>
  <lastmod>2018-06-24T19:07:22Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/06/30/review-udemy-certified-cyber-threat-intelligence-analyst/</loc>
  <lastmod>2018-06-30T15:05:56Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/07/08/review-cybrary-advanced-cyber-threat-intelligence/</loc>
  <lastmod>2018-07-08T12:12:57Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/08/07/paper-avet-blackhat-usa-arsenal-2018/</loc>
  <lastmod>2018-08-07T16:21:11Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2018/09/28/avet-setup-sh-script/</loc>
  <lastmod>2018-09-28T16:23:18Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/01/10/recommended-talks-for-the-new-year-mainly-35c3/</loc>
  <lastmod>2019-01-12T16:07:57Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/02/21/testing-some-hashdump-and-lateral-movement-techniques/</loc>
  <lastmod>2019-02-21T10:41:16Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/03/04/edx-course-security-in-office-365-microsoft-cld245x/</loc>
  <lastmod>2019-03-04T15:49:01Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/03/21/antivirus-evasion-on-osx/</loc>
  <lastmod>2019-03-21T23:36:00Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/16/a-new-project-welearnsecurity-com/</loc>
  <lastmod>2019-05-16T17:21:26Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/windows-7-ie-developer-ssh-server/</loc>
  <lastmod>2019-05-21T13:34:58Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/05/21/wifi-hotspot-with-windows-7/</loc>
  <lastmod>2019-05-21T18:41:52Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/07/29/slides-introduction-to-avet/</loc>
  <lastmod>2019-07-29T16:15:03Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2019/08/08/slides-black-hat-usa-2019/</loc>
  <lastmod>2019-08-08T21:16:28Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2022/12/11/openai-chatgpt-beyond-implications-for-future-work-tech-and-everything/</loc>
  <lastmod>2022-12-11T12:03:58Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2024/03/10/newsletter-sicherheit-digitales-daruber-hinaus-security-digital-beyond-40/</loc>
  <lastmod>2024-03-10T16:50:02Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2025/04/19/sicherheit-digitales-daruber-hinaus-security-digital-beyond-58/</loc>
  <lastmod>2025-04-19T10:28:19Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/2026/03/21/course-review-ai-llms-offensive-defensive-security/</loc>
  <lastmod>2026-03-21T15:45:21Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/blog/</loc>
  <lastmod>2026-04-09T15:33:53Z</lastmod>
 </url>
 <url>
  <loc>https://danielsauder.com/de/</loc>
  <lastmod>2026-04-09T15:38:51Z</lastmod>
 </url>
</urlset>
