<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://en.0x0ff.info/verbose/2021/01/20/0x0n.html</loc>
<lastmod>2021-01-20T21:00:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/attacks/2021/01/21/Client-Side-Attack-Watering-Hole.html</loc>
<lastmod>2021-01-21T21:00:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/tools/2021/02/04/Buffer-Overflow-and-GDB-Part1.html</loc>
<lastmod>2021-02-04T21:30:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/tools/2021/02/07/Buffer-Overflow-and-GDB-Part2.html</loc>
<lastmod>2021-02-07T14:30:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/tools/2021/03/05/Buffer-Overflow-and-GDB-Part3.html</loc>
<lastmod>2021-03-05T12:30:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/ctf/2021/07/27/Getting-Root-Over-It.html</loc>
<lastmod>2021-07-27T12:30:00+00:00</lastmod>
</url>
<url>
<loc>https://en.0x0ff.info/catz/attacks/</loc>
</url>
<url>
<loc>https://en.0x0ff.info/catz/ctf/</loc>
</url>
<url>
<loc>https://en.0x0ff.info/catz/tools/</loc>
</url>
<url>
<loc>https://en.0x0ff.info/about/</loc>
</url>
<url>
<loc>https://en.0x0ff.info/</loc>
</url>
<url>
<loc>https://en.0x0ff.info/page2/</loc>
</url>
</urlset>
