<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>http://dfir.it/blog/2019/02/26/the-supreme-backdoor-factory/</loc>
    <lastmod>2019-02-26T17:53:15+01:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2018/05/08/down-the-rabbit-hole-with-packaged-powershell-scripts/</loc>
    <lastmod>2018-05-08T16:55:39+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2017/03/29/tekdefense-network-challenge-001-walkthrough/</loc>
    <lastmod>2017-03-29T21:58:51+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2016/12/07/webshells-rise-of-the-defenders-part-4/</loc>
    <lastmod>2016-12-07T12:36:49+01:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2016/07/06/webshells-every-time-the-same-story-dot-dot-dot-part-3/</loc>
    <lastmod>2016-07-06T14:26:13+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2016/02/04/ddos-not-a-simple-flood-anymore/</loc>
    <lastmod>2016-02-04T11:39:48+01:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2016/01/18/webshells-every-time-the-same-story-dot-dot-dot-part2/</loc>
    <lastmod>2016-01-18T20:20:36+01:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/09/18/dfir-dot-it-on-tour-defcon-23/</loc>
    <lastmod>2015-09-18T21:55:10+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/09/10/black-hat-arsenal-peepdf-challenge-walkthrough/</loc>
    <lastmod>2015-09-10T21:26:50+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/08/16/forensic-case-studies-carving-and-parsing-solaris-wtmpx-files/</loc>
    <lastmod>2015-08-16T13:02:26+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/08/12/webshell-every-time-the-same-purpose/</loc>
    <lastmod>2015-08-12T11:13:40+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/07/18/toxic-pdf-walkthrough-bsides-london-challenge/</loc>
    <lastmod>2015-07-18T19:30:38+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/06/17/analysts-handbook-analyzing-weaponized-documents/</loc>
    <lastmod>2015-06-17T21:08:13+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/05/29/dfir-dot-it-on-tour-confidence-2015-cracow/</loc>
    <lastmod>2015-05-29T20:07:21+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/04/20/memory-acquisition-tools-for-windows/</loc>
    <lastmod>2015-04-20T22:58:52+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/04/08/dfir-dot-it-on-tour-dfrws-2015-dublin/</loc>
    <lastmod>2015-04-08T23:16:41+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/04/06/analysts-handbook-hunting-with-basic-osint-and-command-line-fu/</loc>
    <lastmod>2015-04-06T21:53:45+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/04/04/building-incident-response-toolkit-redline-part2/</loc>
    <lastmod>2015-04-04T16:15:18+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/blog/2015/04/04/building-incident-response-toolkit-redline-part1/</loc>
    <lastmod>2015-04-04T14:45:15+02:00</lastmod>
  </url>
  <url>
    <loc>http://dfir.it/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/archives/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/ir/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/redline/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/hunting/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/osint/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/detection/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/conference/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/memory/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/tools/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/windows/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/apt/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/dridex/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/remnux/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/javascript/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/challenge/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/webshell/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/forensics/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/solaris/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/peepdf/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/ddos/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/network/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/pcap/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/linux/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/billgates/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/powershell/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/reverse-engineering/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/sapien/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/malware/</loc>
  </url>
  <url>
    <loc>http://dfir.it/blog/categories/backdoor/</loc>
  </url>
</urlset>
