<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.leetsys.com/2020/07/06/advice-for-people-starting-to-pursue-a-career-in-cyber-security/</loc><lastmod>2020-07-06T16:17:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2012/01/02/capturing-windows-7-credentials-at-logon-using-custom-credential-provider/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/credprovider1.jpg</image:loc><image:title>CredProvider</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/credprovider.jpg</image:loc><image:title>CredProvider</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/cp-tiles1.jpg</image:loc><image:title>CP-Tiles</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/cp-tiles.jpg</image:loc><image:title>CP-Tiles</image:title></image:image><lastmod>2018-03-20T00:44:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/quotes/</loc><lastmod>2017-12-26T17:02:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.leetsys.com/2017/02/16/nys-dfs-23-nycrr-500-an-overview/</loc><lastmod>2017-02-17T20:29:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2016/12/29/bypassing-hsts-via-adobe-crossdomain-xml/</loc><lastmod>2016-12-30T00:16:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/videos/</loc><lastmod>2015-01-12T16:36:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.leetsys.com/about/</loc><lastmod>2014-09-11T23:53:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.leetsys.com/2014/01/11/tool-release-webshot-web-and-url-screenshot-tool/</loc><lastmod>2014-01-18T13:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2013/11/03/capturing-windows-2k-and-xp-credentials-at-logon-using-stub-gina-dll/</loc><lastmod>2013-11-03T21:14:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/rand/</loc><lastmod>2013-08-18T01:29:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.leetsys.com/2013/06/11/book-review-what-every-body-is-saying/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2013/06/book.jpg</image:loc><image:title>What Every BODY is saying</image:title></image:image><lastmod>2013-06-12T03:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2012/08/05/social-engineering-scraping-data-from-linkedin/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/08/burp-intruder-payload.png</image:loc><image:title>burp-intruder-payload</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/08/burpsuiteintruder.png</image:loc><image:title>burpsuiteintruder</image:title></image:image><lastmod>2013-12-17T16:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2012/07/17/book-review-shoninki-the-secret-teachings-of-the-ninja/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/07/shoninki.jpg</image:loc><image:title>Shoninki</image:title></image:image><lastmod>2012-07-17T18:31:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2012/01/31/genesis-generic-rootkit-dropper-with-ssl-support/</loc><lastmod>2012-01-31T22:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2012/01/18/insider-rogue-certification-authority-attack/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/ssl-5.png</image:loc><image:title>ssl-5</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/ssl-4.png</image:loc><image:title>ssl-4</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/ssl-3.jpg</image:loc><image:title>SSL-3</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2012/01/ssl-1.png</image:loc><image:title>ssl-1</image:title></image:image><lastmod>2012-01-18T20:05:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2011/12/18/covert-system-manipulation-tool-simsim/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/three1.png</image:loc><image:title>three</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/two1.png</image:loc><image:title>two</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/one1.png</image:loc><image:title>one</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/three.png</image:loc><image:title>three</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/two.png</image:loc><image:title>two</image:title></image:image><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/12/one.png</image:loc><image:title>portscan</image:title></image:image><lastmod>2013-11-05T16:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2011/11/29/genesis-generic-file-rootkit-dropper/</loc><lastmod>2011-11-30T03:30:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2011/10/29/proxy-detecting-callback-backdoor-poc/</loc><lastmod>2011-11-27T03:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2011/10/13/woman-v0-01-release/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2011/10/woman-example.png</image:loc><image:title>woman-example</image:title></image:image><lastmod>2011-10-13T03:24:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2011/10/07/capturing-the-derbycon-ctf/</loc><lastmod>2011-10-07T01:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2010/11/14/configure-callback-laptop-checklist/</loc><lastmod>2010-11-14T03:01:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2010/06/26/static-callback-reverse-cmd-exe/</loc><lastmod>2010-06-26T01:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/09/26/netcat-callback-every-x-seconds/</loc><lastmod>2009-09-26T15:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/09/14/execute-trojan-exe-before-every-executable/</loc><lastmod>2009-09-14T04:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/09/14/linux-stealthy-backdoor-using-portknocking-technique/</loc><lastmod>2009-09-14T03:28:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/08/09/three-ways-to-count-to-255/</loc><lastmod>2009-08-09T18:37:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/06/28/win32-tcp-connect-skeleton/</loc><lastmod>2009-06-28T01:04:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/05/17/brute-force-aim-password-perl-script-from-aimsniff-authentication-dump/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2009/05/aim_bf.png</image:loc><image:title>aim_bf</image:title></image:image><lastmod>2009-05-17T20:54:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/04/26/win32-eicar-creator/</loc><lastmod>2009-04-26T20:14:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/04/23/aimsniff-v02-includes-authentication-dump/</loc><image:image><image:loc>https://blog.leetsys.com/wp-content/uploads/2009/04/aim_sniff_hash.png</image:loc><image:title>aim_sniff_hash</image:title></image:image><lastmod>2009-04-23T02:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/04/21/aim-oscar-authentication-process/</loc><lastmod>2009-04-21T01:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/02/04/norton-symantec-uninstall-password-wtf/</loc><lastmod>2014-01-28T19:41:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/03/05/aimsniff-v01/</loc><lastmod>2009-03-05T16:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/02/03/cisco-poller-perl-script/</loc><lastmod>2009-02-03T19:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/01/29/eicar-test-virus/</loc><lastmod>2009-01-29T18:31:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2009/01/10/repeat-perl-script/</loc><lastmod>2009-01-10T02:26:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2008/11/29/pacman-version-02-release/</loc><lastmod>2008-11-29T05:16:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2008/11/26/pacman-version-01-release/</loc><lastmod>2008-11-26T22:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2008/09/04/can-you-define-the-word-%e2%80%98hacker%e2%80%99/</loc><lastmod>2008-09-04T17:14:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com/2008/09/04/hello-world/</loc><lastmod>2008-09-04T16:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.leetsys.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-07-06T16:17:22+00:00</lastmod></url></urlset>
