<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.silentsignal.eu/authors/admin.html</loc>
<lastmod>2025-10-22T02:51:09-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/authors/b.html</loc>
<lastmod>2025-10-22T02:51:09-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/authors/dnet.html</loc>
<lastmod>2025-10-22T02:51:09-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/authors/pz.html</loc>
<lastmod>2025-10-22T02:51:09-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2013/12/05/hello-world/</loc>
<lastmod>2013-12-05T05:00:44-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2013/12/18/plesk-decryption/</loc>
<lastmod>2013-12-17T17:01:33-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/01/06/waf-bypass-made-easy/</loc>
<lastmod>2014-01-06T01:30:22-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/01/10/duncan-expensive-injections/</loc>
<lastmod>2014-01-10T08:00:08-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/01/13/apple-remote-dektop-cve-2013-5135/</loc>
<lastmod>2014-01-13T03:00:37-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/01/23/banging-3g-rocks/</loc>
<lastmod>2014-01-23T08:00:59-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/01/31/file-upload-unzip/</loc>
<lastmod>2014-01-31T07:45:06-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/02/09/jdb-tricks-hacking-java-debug-wire/</loc>
<lastmod>2014-02-09T11:56:04-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/02/20/testing-websites-using-asp-net-forms-auth-with-burp-suite/</loc>
<lastmod>2014-02-20T06:37:43-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/02/27/from-read-to-domain-admin-abusing-symantec-backup-exec-with-frida/</loc>
<lastmod>2014-02-27T06:33:05-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/03/07/sanitizing-input-with-regex-considered-harmful/</loc>
<lastmod>2014-03-07T11:54:49-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/03/14/snmp-trap/</loc>
<lastmod>2014-03-14T07:47:21-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/03/31/owasp-top-10-is-overrated/</loc>
<lastmod>2014-03-31T05:00:20-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/04/04/quick-and-dirty-android-binary-xml-edits/</loc>
<lastmod>2014-04-04T06:43:29-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/04/17/isakmp-aggressive-psk-tools/</loc>
<lastmod>2014-04-17T09:00:39-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/06/06/trend-micro-officescan-a-chain-of-bugs/</loc>
<lastmod>2014-06-06T05:00:24-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/06/25/hp-ux-0day-local-privilege-escalation/</loc>
<lastmod>2014-06-25T07:54:06-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/</loc>
<lastmod>2014-07-28T15:30:24-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2014/10/03/weblogic-undocumented-hacking/</loc>
<lastmod>2014-10-03T10:23:57-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/01/06/code-review-on-the-cheap/</loc>
<lastmod>2015-01-06T02:56:10-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/01/09/aix-for-penetration-testers/</loc>
<lastmod>2015-01-09T02:33:26-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/04/03/the-story-of-a-pentester-recruitment/</loc>
<lastmod>2015-04-03T02:53:07-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/05/07/cve-2014-3440-symantec-critical-system-protection-remote-code-execution/</loc>
<lastmod>2015-05-07T06:34:44-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/05/27/testing-oracle-forms/</loc>
<lastmod>2015-05-27T04:32:39-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/06/10/poisonous-md5-wolves-among-the-sheep/</loc>
<lastmod>2015-06-10T02:21:33-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/06/19/virtual-bank-robbery-in-real-life/</loc>
<lastmod>2015-06-19T06:25:29-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/09/17/finding-the-salt-with-sql-inception/</loc>
<lastmod>2015-09-17T09:19:10-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2015/10/02/proxying-nonstandard-https-traffic/</loc>
<lastmod>2015-10-02T03:42:52-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/01/15/testing-stateful-web-application-workflows/</loc>
<lastmod>2016-01-15T06:34:28-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/02/10/youre-not-looking-at-the-big-picture/</loc>
<lastmod>2016-02-10T10:05:07-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/05/06/ios-http-cache-analysis-for-abusing-apis-and-forensics/</loc>
<lastmod>2016-05-06T06:29:03-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/05/13/detecting-imagetragick-with-burp-suite-pro/</loc>
<lastmod>2016-05-13T09:53:27-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/06/16/accessing-local-variables-in-proguarded-android-apps/</loc>
<lastmod>2016-06-16T05:43:40-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/08/25/bake-your-own-extrabacon/</loc>
<lastmod>2016-08-25T03:23:05-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2016/11/28/an-update-on-md5-poisoning/</loc>
<lastmod>2016-11-28T06:00:00-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/01/03/beyond-detection-exploiting-blind-sql-injections-with-burp-collaborator/</loc>
<lastmod>2017-01-03T04:34:05-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/02/17/not-so-unique-snowflakes/</loc>
<lastmod>2017-02-17T09:59:20-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/05/08/fools-of-golden-gate/</loc>
<lastmod>2017-05-08T03:07:39-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/08/14/notes-on-mcafee-security-scan-plus-rce-cve-2017-3897/</loc>
<lastmod>2017-08-14T02:27:21-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/12/05/conditional-dde/</loc>
<lastmod>2017-12-05T05:31:04-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2017/12/21/emulating-custom-crytography-with-ripr/</loc>
<lastmod>2017-12-21T03:22:25-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2018/01/08/bare-knuckled-antivirus-breaking/</loc>
<lastmod>2018-01-08T02:55:34-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2018/02/02/snow-cannon-vs-unique-snowflakes-testing-registration-forms/</loc>
<lastmod>2018-02-02T03:24:04-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2018/05/22/the-curious-case-of-encrypted-url-parameters/</loc>
<lastmod>2018-05-22T00:43:24-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/04/04/our-take-on-social-engineering/</loc>
<lastmod>2019-04-04T09:52:46-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/</loc>
<lastmod>2019-04-18T04:23:59-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/05/10/decrypting-eazfuscator-net-encrypted-symbol-names/</loc>
<lastmod>2019-05-10T03:40:52-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/06/24/self-defenseless-exploring-kasperskys-local-attack-surface/</loc>
<lastmod>2019-06-24T02:47:10-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/07/02/evading-cisco-anyconnect-blocking-lan-connections/</loc>
<lastmod>2019-07-02T05:56:21-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2019/10/21/patching-android-apps-what-could-possibly-go-wrong/</loc>
<lastmod>2019-10-21T09:13:46-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/01/27/wide-open-banking-psd2-and-us/</loc>
<lastmod>2020-01-27T02:00:27-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/03/27/unix-style-approach-to-web-application-testing/</loc>
<lastmod>2020-03-27T04:11:28-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/04/20/uninitialized-memory-disclosures-in-web-applications/</loc>
<lastmod>2020-04-20T04:01:30-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/05/04/decrypting-and-analyzing-https-traffic-without-mitm/</loc>
<lastmod>2020-05-04T03:29:29-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/05/20/tips-and-scripts-for-reconnaissance-and-scanning/</loc>
<lastmod>2020-05-20T06:49:01-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2020/08/17/unexpected-deserialization-pt-1-jms/</loc>
<lastmod>2020-08-17T07:00:13-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2021/02/08/abusing-jwt-public-keys-without-the-public-key/</loc>
<lastmod>2021-02-08T02:21:55-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2021/04/06/adding-xcoff-support-to-ghidra-with-kaitai-struct/</loc>
<lastmod>2021-04-06T10:03:23-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2021/10/14/fuzzy-snapshots-of-firefox-ipc/</loc>
<lastmod>2021-10-14T04:19:36-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2021/12/12/our-new-tool-for-enumerating-hidden-log4shell-affected-hosts/</loc>
<lastmod>2021-12-12T14:19:44-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2022/09/05/simple-ibm-i-as-400-hacking/</loc>
<lastmod>2022-09-05T06:36:23-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2022/09/28/another-tale-of-ibm-i-as-400-hacking/</loc>
<lastmod>2022-09-28T08:42:24-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2022/10/18/our-new-scanner-for-text4shell/</loc>
<lastmod>2022-10-18T14:27:38-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2023/01/20/abusing-adopted-authority-on-ibm-i/</loc>
<lastmod>2023-01-20T07:00:00-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2023/03/30/booby-trapping-ibm-i/</loc>
<lastmod>2023-03-30T06:37:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2023/07/03/ibm-i-dde-vulnerability-cve-2023-30990/</loc>
<lastmod>2023-07-03T01:37:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2023/08/22/2023-08-22-Facsimile-Support-CVE-2023-30988/</loc>
<lastmod>2023-08-22T01:37:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2024/10/28/wcf-net.tcp-pentest/</loc>
<lastmod>2024-10-27T01:00:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2024/12/06/custom-decoder-for-burp/</loc>
<lastmod>2024-12-06T02:00:00-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2025/01/14/pentester-recruitment-2025-mushroom/</loc>
<lastmod>2025-01-14T08:00:00-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2025/01/21/ibm-acs-password-dump/</loc>
<lastmod>2025-01-21T02:00:44-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2025/06/14/gitblit-cve-CVE-2024-28080/</loc>
<lastmod>2025-08-29T03:00:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2025/09/04/Exploit-development-for-IBM-i/</loc>
<lastmod>2025-09-04T06:20:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/2025/10/22/IBM-i-LIBL-Autopwn-Kill-the-Vulnerability-Class/</loc>
<lastmod>2025-10-22T02:50:00-05:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/archive.html</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/tags/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/2/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/3/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/4/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/5/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/6/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/7/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/8/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/9/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/page/10/</loc>
</url>
<url>
<loc>https://blog.silentsignal.eu/wp-content/uploads/2015/01/aix-penetration-testers_6684_.pdf</loc>
<lastmod>2023-01-09T06:16:02-06:00</lastmod>
</url>
<url>
<loc>https://blog.silentsignal.eu/wp-content/uploads/2018/01/S2_BareKnuckledAVBreaking_180108.pdf</loc>
<lastmod>2023-01-09T06:16:02-06:00</lastmod>
</url>
</urlset>
