<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://secu.tech.blog/2024/11/22/return-oriented-programing-%e6%a4%9c%e8%a8%bc/</loc><lastmod>2024-11-22T05:10:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2023/09/06/%e7%96%91%e4%bc%bcransomware/</loc><lastmod>2023-09-06T01:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2023/02/08/%e3%83%92%e3%83%bc%e3%83%97%e3%83%bb%e3%82%aa%e3%83%bc%e3%83%90%e3%83%95%e3%83%ad%e3%83%bc%e6%a4%9c%e8%a8%bc/</loc><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2023/02/execute-heap-overflow.png</image:loc><image:title>execute-heap-overflow</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2023/02/heap-address.png</image:loc><image:title>heap-address</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2023/02/info-proc-map.png</image:loc><image:title>info-proc-map</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2023/02/disas-mainbreak.png</image:loc><image:title>disas-mainbreak</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2023/02/info-functions.png</image:loc><image:title>info-functions</image:title></image:image><lastmod>2023-02-08T02:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2022/11/03/%e7%96%91%e4%bc%bcransomware%e3%83%97%e3%83%ad%e3%82%b0%e3%83%a9%e3%83%a0/</loc><lastmod>2022-11-03T00:35:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2022/09/12/code-injection-for-win1064bit/</loc><lastmod>2022-09-29T00:06:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/12/22/log4j2%e8%84%86%e5%bc%b1%e6%80%a7%e6%a4%9c%e8%a8%bc%ef%bd%9etomcat%e7%89%88%ef%bd%9e/</loc><lastmod>2022-04-10T23:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/12/15/log%ef%bc%94j%e8%84%86%e5%bc%b1%e6%80%a7%e6%a4%9c%e8%a8%bc/</loc><lastmod>2021-12-24T23:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/09/26/wifible%e3%82%92%e7%94%a8%e3%81%84%e3%81%9f%e7%ab%af%e6%9c%ab%e9%80%9a%e4%bf%a1%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6/</loc><lastmod>2021-09-26T09:13:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/08/09/attack-to-activedirectory-for-ctf/</loc><lastmod>2021-08-15T22:43:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/07/31/raspberry-pi-with-suricata/</loc><lastmod>2021-08-12T13:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/05/01/memory-forensics2-for-ctf/</loc><lastmod>2021-05-01T22:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/04/24/dos-attack-analyzing-for-ctf/</loc><lastmod>2021-05-01T14:56:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/04/25/ransomware-for-ctf/</loc><lastmod>2021-04-25T13:38:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/04/04/code-injection-for-ctf/</loc><lastmod>2021-04-04T13:05:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/03/15/memory-forensics-for-ctf/</loc><lastmod>2021-03-21T08:30:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2019/12/30/example-post/</loc><lastmod>2021-03-15T14:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/01/31/binarylinux3-for-ctf/</loc><lastmod>2021-01-31T13:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2021/01/25/binarylinux2-for-ctf/</loc><lastmod>2021-01-28T11:29:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2020/12/29/binarylinux-for-ctf/</loc><lastmod>2021-01-24T07:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2020/09/06/bufferoverflow-64bit-for-ctf/</loc><lastmod>2021-01-12T06:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2020/11/14/binary%e5%95%8f%e9%a1%8c-for-ctf/</loc><lastmod>2020-11-18T14:37:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2020/09/15/sql-injection-for-ctf/</loc><lastmod>2020-09-25T01:07:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/2020/02/24/buffer-overflow%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6/</loc><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-19-vuln2-finish.png</image:loc><image:title>gdb-19-vuln2-finish</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-18-foo-disasinfo-frame-after-strcpy.png</image:loc><image:title>gdb-18-foo-disas&amp;info-frame-after-strcpy</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-17-foo-disasinfo-frame-before-strcpy.png</image:loc><image:title>gdb-17-foo-disas&amp;info-frame-before-strcpy</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-16-vuln2-info-functions-secretfunction.png</image:loc><image:title>gdb-16-vuln2-info-functions-secretFunction</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-15-vuln-finish.png</image:loc><image:title>gdb-15-vuln-finish</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-14-foo-disasinfo-frame-after-strcpy.png</image:loc><image:title>gdb-14-foo-disas&amp;info-frame-after-strcpy</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-13-foo-disasinfo-frame-before-strcpy.png</image:loc><image:title>gdb-13-foo-disas&amp;info-frame-before-strcpy</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-12-vuln-26char-input.png</image:loc><image:title>gdb-12-vuln-26char-input</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-11-vuln-finish.png</image:loc><image:title>gdb-11-vuln-finish</image:title></image:image><image:image><image:loc>https://secu.tech.blog/wp-content/uploads/2020/02/gdb-10-foo-disasinfo-frame-after-strcpy.png</image:loc><image:title>gdb-10-foo-disas&amp;info-frame-after-strcpy</image:title></image:image><lastmod>2020-05-07T06:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://secu.tech.blog/blog-feed/</loc><lastmod>2019-12-30T04:01:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://secu.tech.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-11-22T05:10:00+00:00</lastmod></url></urlset>
