<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 8:17 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://0xsp.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>0xsp SRD - Security Research &amp; Development</title>
		<link><![CDATA[https://0xsp.com]]></link>
		<description><![CDATA[0xsp SRD - Security Research &amp; Development]]></description>
		<lastBuildDate><![CDATA[Wed, 30 Nov 2022 04:41:19 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://0xsp.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/covert-dns-cc-for-red-teaming-ops/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/covert-dns-cc-for-red-teaming-ops/]]></link>
			<title>Covert DNS C&#038;C for Red teaming Ops</title>
			<pubDate><![CDATA[Wed, 30 Nov 2022 04:41:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/backdoor-discovered-in-pldt-home-fiber-routers/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/backdoor-discovered-in-pldt-home-fiber-routers/]]></link>
			<title>Backdoor discovered in PLDT home fiber routers</title>
			<pubDate><![CDATA[Wed, 22 Feb 2023 16:14:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/porting-backdoors-windows-rootkits-via-restful-api-service/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/porting-backdoors-windows-rootkits-via-restful-api-service/]]></link>
			<title>Porting Backdoors &#8211; Windows rootkits via RESTful API Service</title>
			<pubDate><![CDATA[Wed, 20 Apr 2022 07:25:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/privilege-escalation-cheatsheet/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/privilege-escalation-cheatsheet/]]></link>
			<title>Privilege Escalation cheatsheet</title>
			<pubDate><![CDATA[Wed, 20 Apr 2022 07:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/projects/]]></guid>
			<link><![CDATA[https://0xsp.com/projects/]]></link>
			<title>Projects</title>
			<pubDate><![CDATA[Wed, 20 Apr 2022 06:01:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/active-directory-attack-defense/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/active-directory-attack-defense/]]></link>
			<title>Active Directory (Attack &#038; Defense )</title>
			<pubDate><![CDATA[Wed, 20 Apr 2022 05:40:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/follina-cve-2022-30190-rtf/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/follina-cve-2022-30190-rtf/]]></link>
			<title>Follina &#8211; CVE-2022-30190 RTF</title>
			<pubDate><![CDATA[Tue, 31 May 2022 13:57:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/combined-attacks-against-xdr/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/combined-attacks-against-xdr/]]></link>
			<title>combined attacks against XDR</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:56:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security dev/0xsp-mongoose-red/]]></guid>
			<link><![CDATA[https://0xsp.com/security dev/0xsp-mongoose-red/]]></link>
			<title>0xsp-mongoose RED</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:51:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/hunting-windows-credentials-creduipromptforwindowscredentials/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/hunting-windows-credentials-creduipromptforwindowscredentials/]]></link>
			<title>Hunting Windows Credentials (CredUIPromptForWindowsCredentials)</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:46:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/bypass-restricted-command-prompt-for-none-privileged-users/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/bypass-restricted-command-prompt-for-none-privileged-users/]]></link>
			<title>bypass restricted command prompt for none-privileged users</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:39:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/web-attacks-payloads-collections/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/web-attacks-payloads-collections/]]></link>
			<title>Web attacks payloads collections</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:29:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/bypass-symantec-email-security-cloud/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/bypass-symantec-email-security-cloud/]]></link>
			<title>Bypass Symantec Email Security.cloud</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:18:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/unique-attacks-with-0xsp-mongoose-red/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/unique-attacks-with-0xsp-mongoose-red/]]></link>
			<title>unique attacks with 0xsp mongoose red</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:14:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/offensive-cheatsheet/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/offensive-cheatsheet/]]></link>
			<title>offensive cheatsheet</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 14:10:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/footprints-of-mailgun-phishing-campaigns/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/footprints-of-mailgun-phishing-campaigns/]]></link>
			<title>Footprints of Mailgun Phishing Campaigns</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 13:50:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/smuggling-via-windows-services-display-name-lateral-movement/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/smuggling-via-windows-services-display-name-lateral-movement/]]></link>
			<title>Smuggling via Windows services display name &#8211; Lateral movement</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 13:44:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/local-administrator-is-not-just-with-razer-it-is-possible-for-all/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/local-administrator-is-not-just-with-razer-it-is-possible-for-all/]]></link>
			<title>Local administrator is not just with Razer.. it is possible for ALL</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 13:33:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/handy-techniques-to-bypass-environment-restrictions/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/handy-techniques-to-bypass-environment-restrictions/]]></link>
			<title>handy techniques to bypass environment restrictions</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 12:41:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/gophish-on-digital-ocean-with-blacklist-range/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/gophish-on-digital-ocean-with-blacklist-range/]]></link>
			<title>Gophish on Digital Ocean with Blacklist Range</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 12:35:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/defeat-the-castle-bypass-av-advanced-xdr-solutions/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/defeat-the-castle-bypass-av-advanced-xdr-solutions/]]></link>
			<title>Defeat the Castle &#8211; Bypass AV &#038; Advanced XDR solutions.</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 12:14:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/bypass-endpoint-with-xlm-weaponization/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/bypass-endpoint-with-xlm-weaponization/]]></link>
			<title>bypass endpoint with XLM weaponization</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 12:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/red-team-cheatsheet/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/red-team-cheatsheet/]]></link>
			<title>red team cheatsheet</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 11:43:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/red-teaming-toolkit-collection/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/red-teaming-toolkit-collection/]]></link>
			<title>Red Teaming Toolkit Collection</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 11:22:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/uncategorized/hello-world/]]></guid>
			<link><![CDATA[https://0xsp.com/uncategorized/hello-world/]]></link>
			<title>Hello world!</title>
			<pubDate><![CDATA[Tue, 19 Apr 2022 09:56:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/malware research/implementing-hells-gate-in-zig-part-1/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/malware research/implementing-hells-gate-in-zig-part-1/]]></link>
			<title>Implementing Hell&#8217;s Gate in Zig &#8211; Part 1</title>
			<pubDate><![CDATA[Thu, 18 Sep 2025 13:14:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-2/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-2/]]></link>
			<title>Building mini c2c in Pascal – Part 2</title>
			<pubDate><![CDATA[Thu, 11 Aug 2022 12:43:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-1/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-1/]]></link>
			<title>Building mini c2c in Pascal &#8211; Part 1</title>
			<pubDate><![CDATA[Sun, 31 Jul 2022 10:02:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/guide/]]></guid>
			<link><![CDATA[https://0xsp.com/guide/]]></link>
			<title>Guide</title>
			<pubDate><![CDATA[Sun, 21 Aug 2022 16:49:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/publications/]]></guid>
			<link><![CDATA[https://0xsp.com/publications/]]></link>
			<title>Publications</title>
			<pubDate><![CDATA[Sun, 21 Aug 2022 12:43:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/the-hidden-risk-compromising-notepad-cowriters-bearer-tokens/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/the-hidden-risk-compromising-notepad-cowriters-bearer-tokens/]]></link>
			<title>The Hidden Risk: Compromising Notepad Cowriter&#8217;s Bearer Tokens</title>
			<pubDate><![CDATA[Sun, 20 Apr 2025 16:37:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/navigating-embedded-payload-extraction-from-rdp-files-defence-evasion/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/navigating-embedded-payload-extraction-from-rdp-files-defence-evasion/]]></link>
			<title>Navigating Embedded Payload Extraction from RDP Files &#8211; Defence evasion</title>
			<pubDate><![CDATA[Sun, 13 Aug 2023 21:41:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-3/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/building-mini-c2c-in-pascal-part-3/]]></link>
			<title>Building mini c2c in Pascal &#8211; part 3</title>
			<pubDate><![CDATA[Sat, 20 Aug 2022 15:13:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/abuse-cloudflare-zerotrust-for-c2-channels/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/abuse-cloudflare-zerotrust-for-c2-channels/]]></link>
			<title>Abuse Cloudflare Zerotrust for C2 channels</title>
			<pubDate><![CDATA[Sat, 02 Jul 2022 11:59:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/uncategorized/how-i-leveraged-wmi-to-enumerate-a-process-modules-and-their-base-addresses/]]></guid>
			<link><![CDATA[https://0xsp.com/uncategorized/how-i-leveraged-wmi-to-enumerate-a-process-modules-and-their-base-addresses/]]></link>
			<title>How I Leveraged WMI to Enumerate a Process Modules and Their Base Addresses</title>
			<pubDate><![CDATA[Mon, 15 Apr 2024 17:48:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/offensive/mortar-loader-v2/]]></guid>
			<link><![CDATA[https://0xsp.com/offensive/mortar-loader-v2/]]></link>
			<title>Mortar Loader v2</title>
			<pubDate><![CDATA[Fri, 27 May 2022 05:19:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://0xsp.com/security research  development srd/malewarebytes-support-tool-sam-hash-dump/]]></guid>
			<link><![CDATA[https://0xsp.com/security research  development srd/malewarebytes-support-tool-sam-hash-dump/]]></link>
			<title>MalewareBytes Support tool &#8211; SAM hash dump?</title>
			<pubDate><![CDATA[Fri, 03 Jun 2022 15:52:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
