<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">	  	  
<!-- www.check-domains.com sitemap generator -->

<url>
   <loc>http://blog.extremehacking.org/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>1.0000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/comments/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/xmlrpc.php?rsd</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/wp-includes/wlwmanifest.xml</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/exploits/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/white-papers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/hacking-gmail-account-using-gx-cookie/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/thread-options-using-xss-for-bypassing-csrf-protection/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/google-may-return-to-china-via-shanghai-free-trade-zone-report/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/half-of-japans-jobs-could-soon-be-filled-by-robots-and-thats-good-news/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/fbi-director-asks-tech-companies-to-at-least-dont-offer-end-to-end-encryption/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/someone-just-tried-to-take-down-internets-backbone-with-5-million-queriessec/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/watch-the-worlds-first-mind-controlled-car-in-action/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/police-raid-alleged-bitcoin-creator-craig-wrights-home-in-sydney/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/bitcoin-creator-satoshi-nakamoto-unmasked-an-australian-man-craig-wright-identified/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%af%e0%a5%87-%e0%a4%b9%e0%a5%88-%e0%a4%a6%e0%a5%81%e0%a4%a8%e0%a4%bf%e0%a4%af%e0%a4%be-%e0%a4%95%e0%a4%be-%e0%a4%b8%e0%a4%ac%e0%a4%b8%e0%a5%87-%e0%a4%9b%e0%a5%8b%e0%a4%9f%e0%a4%be-%e0%a4%b5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/files-containing-juicy-info/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/files-containing-passwords/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/job/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/sensitive-directories/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/uncategorized/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.8000</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%86%e0%a4%a4%e0%a4%82%e0%a4%95%e0%a4%bf%e0%a4%af%e0%a5%8b%e0%a4%82-%e0%a4%95%e0%a4%be-%e0%a4%a8%e0%a4%af%e0%a4%be-%e0%a4%b9%e0%a4%a5%e0%a4%bf%e0%a4%af%e0%a4%be%e0%a4%b0-%e0%a4%ac%e0%a4%bf/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%87%e0%a4%b8-%e0%a4%aa%e0%a5%8d%e0%a4%b0%e0%a4%bf%e0%a4%82%e0%a4%9f%e0%a4%b0-%e0%a4%95%e0%a4%be-%e0%a4%95%e0%a4%be%e0%a4%97%e0%a4%9c-%e0%a4%95%e0%a4%ad%e0%a5%80-%e0%a4%96%e0%a4%a4%e0%a5%8d/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/nemesis-bootkit-a-new-stealthy-payment-card-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/save-the-date-11th-december-anonymous-to-celebrate-isis-trolling-day/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/07/chakra-javascript-engine-microsoft-open-sources-the-heart-of-edge-browser/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/07/france-wants-to-ban-tor-and-free-wi-fi-services-after-paris-terror-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/06/variety-jones-a-senior-adviser-to-%e2%80%aasilk-road%e2%80%ac-arrested-in-thailand/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/06/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-%e0%a4%a8%e0%a5%87-%e0%a4%b6%e0%a5%81%e0%a4%b0%e0%a5%82-%e0%a4%95%e0%a5%80-%e0%a4%b2%e0%a4%be%e0%a4%87%e0%a4%b5-%e0%a4%ac%e0%a5%8d%e0%a4%b0/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/05/dell-toshiba-and-lenovo-pcs-at-risk-of-bloatware-security-flaws/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/05/these-top-10-programming-languages-have-most-vulnerable-apps-on-the-internet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/exploits/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/14/vnc-keyboard-remote-code-execution-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/exploit-proftpd-1-3-5-mod_copy-command-execution/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/linuxx86-etcpasswd-reader-58-bytes/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/white-papers/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/white-paper-developing-mips-exploits-to-hack-routers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/white-paper-privilege-escalation-via-client-management-software/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/privilege-escalation-via-client-management-software-part-ii/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-intextdb_password-extenv/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-inurldbg-wizard-php/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-intitleindex-of-onetoc2-one/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/filetypepcf-vpn-or-group/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/inurlprivate_files/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-mail-inbox-sent/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-intexticloud-photos/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-inurlno-ip-com/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-fic-ndx/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/hacking-gmail-account-using-gx-cookie/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/04/a-step-by-step-guide-how-to-install-free-ssl-certificate-on-your-website/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/bypass-mac-filtering-on-wireless-networks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/malware-types-explained/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/dynamic-malware-analysis-tools/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/basic-malware-analysis-tools-2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/hacker-claims-he-helped-fbi-track-down-isis-hacker-who-was-killed-in-drone-strike/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/dells-laptops-are-infected-with-superfish-like-pre-installed-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/thread-options-using-xss-for-bypassing-csrf-protection/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/google-may-return-to-china-via-shanghai-free-trade-zone-report/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/half-of-japans-jobs-could-soon-be-filled-by-robots-and-thats-good-news/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/fbi-director-asks-tech-companies-to-at-least-dont-offer-end-to-end-encryption/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/10/someone-just-tried-to-take-down-internets-backbone-with-5-million-queriessec/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/watch-the-worlds-first-mind-controlled-car-in-action/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/police-raid-alleged-bitcoin-creator-craig-wrights-home-in-sydney/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/09/bitcoin-creator-satoshi-nakamoto-unmasked-an-australian-man-craig-wright-identified/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%af%e0%a5%87-%e0%a4%b9%e0%a5%88-%e0%a4%a6%e0%a5%81%e0%a4%a8%e0%a4%bf%e0%a4%af%e0%a4%be-%e0%a4%95%e0%a4%be-%e0%a4%b8%e0%a4%ac%e0%a4%b8%e0%a5%87-%e0%a4%9b%e0%a5%8b%e0%a4%9f%e0%a4%be-%e0%a4%b5/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/files-containing-juicy-info/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/files-containing-passwords/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/job/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/cyber-security-specialist-policy-standards/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/opening-for-application-security-professionals/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/opening-for-web-application-security-analyst/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/urgent-opening-for-20-ccna-certified-candidates-for-mnc/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/page/2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/21/password-cracking-session-intro/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/metasploit-simple-way-to-collect-email-addresses-through-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-final-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-hosting-the-javascript/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-making-a-log-entry/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-skeleton-creation/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-analyzing-the-dotdefender-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-porting-exploits/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-completing-the-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-using-the-egghunter-mixin/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/page/3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/page/4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/metasploit/page/5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/google-hacking-database/sensitive-directories/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/uncategorized/feed/</loc>
   <lastmod>2015-12-10T12:17:17+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%b5%e0%a4%be%e0%a4%88-%e0%a4%ab%e0%a4%be%e0%a4%88-%e0%a4%95%e0%a5%80-%e0%a4%ae%e0%a4%a6%e0%a4%a6-%e0%a4%b8%e0%a5%87-%e0%a4%ac%e0%a4%bf%e0%a4%a8%e0%a4%be-%e0%a4%b8%e0%a5%87%e0%a4%b2-%e0%a4%ab/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/mit-scientists-now-you-can-see-through-walls-with-wi-fi/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/you-can-hack-your-own-car-its-legal-now/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/heres-the-list-of-top-10-big-tech-companies-where-ashley-madison-is-very-popular/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/writing-simple-buffer-overflow-exploits/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-msfconsole-commands/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/30/swedish-court-we-cant-ban-the-pirate-bay/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/30/today-nsa-has-stopped-its-bulk-phone-surveillance-program/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/%e0%a4%b0%e0%a5%8b%e0%a4%9c%e0%a4%a8%e0%a4%be-%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%ae%e0%a4%be%e0%a4%b0%e0%a5%8d%e0%a4%9f%e0%a4%ab%e0%a5%8b%e0%a4%a8-%e0%a4%9a%e0%a4%be%e0%a4%b0%e0%a5%8d%e0%a4%9c/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%9f%e0%a4%be%e0%a4%97%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%ae-%e0%a4%b2%e0%a4%be-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%85%e0%a4%aa%e0%a4%a1%e0%a5%87/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/%e0%a4%85%e0%a4%ac-%e0%a4%a6%e0%a5%8b%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%a4%e0%a5%8b%e0%a4%82-%e0%a4%94%e0%a4%b0-%e0%a4%b0%e0%a4%bf%e0%a4%b6%e0%a5%8d%e2%80%8d%e0%a4%a4%e0%a5%87%e0%a4%a6%e0%a4%be/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/microsoft-updates-smart-headsets-for-visually-impaired/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/whatsapp-blocks-links-to-telegram-messenger-its-biggest-competitor/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/toymaker-vtech-hack-exposes-4-8-million-customers-including-photos-of-children/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/google-denies-israeli-youtube-monitoring-deal/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/1-in-7-people-use-one-password-says-kaspersky/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/%e0%a4%aa%e0%a4%be%e0%a4%95%e0%a4%bf%e0%a4%b8%e0%a5%8d%e0%a4%a4%e0%a4%be%e0%a4%a8-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%ac%e0%a5%8d%e0%a4%b2%e0%a5%88%e0%a4%95%e0%a4%ac%e0%a5%87%e0%a4%b0%e0%a5%80/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/02/%e0%a4%9f%e0%a5%8d%e0%a4%b5%e0%a4%bf%e0%a4%9f%e0%a4%b0-chennairainshelp-%e0%a4%b8%e0%a5%87-%e0%a4%95%e0%a4%b0-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%9a%e0%a5%87%e0%a4%a8%e0%a5%8d%e2%80%8d%e0%a4%a8/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/54483-cyber-security-incidents-reported-this-fiscal-year-government/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/patent-troll-66-big-companies-sued-for-using-https-encryption/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/adobe-to-kill-flash-but-by-just-renaming-it-as-adobe-animate-cc/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/%e0%a4%90%e0%a4%aa%e0%a4%b2-%e0%a4%86%e0%a4%88%e0%a4%93%e0%a4%8f%e0%a4%b8-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a4%bf%e0%a4%8f-%e0%a4%85%e0%a4%aa%e0%a4%a1%e0%a5%87%e0%a4%9f-%e0%a4%b9%e0%a5%81%e0%a4%86/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/04/%e0%a4%97%e0%a5%82%e0%a4%97%e0%a4%b2-%e0%a4%95%e0%a4%be-%e0%a4%af%e0%a4%b9-%e0%a4%ab%e0%a5%80%e0%a4%9a%e0%a4%b0-%e0%a4%ac%e0%a4%9a%e0%a4%be%e0%a4%8f%e0%a4%97%e0%a4%be-70-%e0%a4%aa%e0%a5%8d%e0%a4%b0/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/hacking-team-offering-encryption-cracking-tools-to-law-enforcement-agencies/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/free-ransomware-decryption-tool-coinvault-and-bitcryptor/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/death-in-the-internet-age-how-to-prepare-for-a-digital-afterlife/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/cryptowall-ransomware-raised-325-million-in-revenue-for-its-developer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/mission-1-billion-microsoft-will-automatically-offer-windows-10-upgrade/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/tor-releases-anonymous-instant-messenger-heres-how-to-use-it/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/google-is-merging-its-chrome-os-with-android/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/biggest-free-hosting-company-hacked-13-5-million-plaintext-passwords-leaked/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/its-now-legal-to-jailbreak-smart-tv-smartphone-or-tablet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/30/breaking-edward-snowden-joins-twitter-only-follows-nsa/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/21/aw-snap-this-16-character-string-can-crash-your-google-chrome/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/windows-8-remote-explorer-kill-with-shell-code/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/inserting-fake-update-dns-in-windows-8-through-shellcode/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/with-its-first-android-app-apple-tried-to-kill-android-community-but-failed-badly/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/avg-antivirus-plans-to-collect-sell-your-personal-data-to-advertisers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/is-this-security-focused-linux-kernel-really-unhackable/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/google-to-disable-weak-sslv3-and-rc4-protocols-to-boost-internet-security/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/d-link-accidentally-publishes-its-private-code-signing-keys-on-the-internet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/basic-terminologies-used-in-ethical-hacking/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/rooting-a-linux-box-metasploit-style/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/how-to-remember-your-passwords-easily/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/six-u-k-teens-arrested-for-using-lizard-squads-ddos-tool/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/warning-how-hackers-could-hijack-your-facebook-fan-page-with-this-trick/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/marks-milestone-1-billion-people-uses-facebook-in-a-single-day/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/german-spy-agency-trades-citizens-metadata-in-exchange-for-nsas-xkeyscore/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/paypal-vulnerability-allows-hackers-to-steal-all-your-money/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/british-born-isis-hacker-killed-in-us-drone-strike-in-syria/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/most-vulnerable-smart-cities-to-cyber-attack-on-internet-of-things-iot/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/hackers-can-remotely-hack-self-aiming-rifles-to-change-its-target/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/new-android-vulnerability-could-crash-your-phones-badly/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/30/united-airlines-hacked-by-sophisticated-hacking-group/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/cracking-wpa-with-oclhashcat-gpu-on-windows/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-hack-upc-wireless-networks-and-other-wlan/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/finding-wps-enabled-wifi-networks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/pixie-dust-attack-wps-in-kali-linux-with-reaver/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-hack-wireless-router/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/open-port-scanning-and-os-detection-with-nmap/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-getting-a-shell/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-an-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.6400</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%86%e0%a4%a4%e0%a4%82%e0%a4%95%e0%a4%bf%e0%a4%af%e0%a5%8b%e0%a4%82-%e0%a4%95%e0%a4%be-%e0%a4%a8%e0%a4%af%e0%a4%be-%e0%a4%b9%e0%a4%a5%e0%a4%bf%e0%a4%af%e0%a4%be%e0%a4%b0-%e0%a4%ac%e0%a4%bf/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/%e0%a4%87%e0%a4%b8-%e0%a4%aa%e0%a5%8d%e0%a4%b0%e0%a4%bf%e0%a4%82%e0%a4%9f%e0%a4%b0-%e0%a4%95%e0%a4%be-%e0%a4%95%e0%a4%be%e0%a4%97%e0%a4%9c-%e0%a4%95%e0%a4%ad%e0%a5%80-%e0%a4%96%e0%a4%a4%e0%a5%8d/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/nemesis-bootkit-a-new-stealthy-payment-card-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/08/save-the-date-11th-december-anonymous-to-celebrate-isis-trolling-day/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/07/chakra-javascript-engine-microsoft-open-sources-the-heart-of-edge-browser/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/07/france-wants-to-ban-tor-and-free-wi-fi-services-after-paris-terror-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/06/variety-jones-a-senior-adviser-to-%e2%80%aasilk-road%e2%80%ac-arrested-in-thailand/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/06/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-%e0%a4%a8%e0%a5%87-%e0%a4%b6%e0%a5%81%e0%a4%b0%e0%a5%82-%e0%a4%95%e0%a5%80-%e0%a4%b2%e0%a4%be%e0%a4%87%e0%a4%b5-%e0%a4%ac%e0%a5%8d%e0%a4%b0/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/05/dell-toshiba-and-lenovo-pcs-at-risk-of-bloatware-security-flaws/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/05/these-top-10-programming-languages-have-most-vulnerable-apps-on-the-internet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/6/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/14/vnc-keyboard-remote-code-execution-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/google-photo-app-uploads-your-images-to-cloud-even-after-uninstalling/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/how-hacking-team-and-fbi-planned-to-unmask-a-tor-user/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/exploit-proftpd-1-3-5-mod_copy-command-execution/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/linuxx86-etcpasswd-reader-58-bytes/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/white-paper-developing-mips-exploits-to-hack-routers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-introduction-to-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/white-paper-privilege-escalation-via-client-management-software/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/privilege-escalation-via-client-management-software-part-ii/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-intextdb_password-extenv/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-inurldbg-wizard-php/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/23/ghdb-intitleindex-of-onetoc2-one/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/filetypepcf-vpn-or-group/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/inurlprivate_files/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-mail-inbox-sent/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-intexticloud-photos/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-inurlno-ip-com/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/22/intitleindex-of-fic-ndx/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/21/this-simple-trick-requires-only-your-phone-number-to-hack-your-email-account/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/23/steganography-how-to-hide-files-behind-a-image/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/23/pentesting-a-web-application/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/22/spoofing-your-mac-address/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/whatsapp-spy-know-when-someone-goes-to-sleep-or-wakeup/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/ms-office-exploit-hack-using-ms-office-extreme-hacking-style/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/port-forwarding-using-torrents-extreme-hacking-style-_/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/how-to-get-private-tunnel-vpn-for-free/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/attacking-pop3-using-dictionary-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/post-exploitation-and-covering-tracks-in-linux-box/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/11/network-traffic-flow-tutorial/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/04/a-step-by-step-guide-how-to-install-free-ssl-certificate-on-your-website/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/bypass-mac-filtering-on-wireless-networks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/malware-types-explained/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/dynamic-malware-analysis-tools/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/basic-malware-analysis-tools-2/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/hacker-claims-he-helped-fbi-track-down-isis-hacker-who-was-killed-in-drone-strike/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/%e0%a4%a1%e0%a5%82%e0%a4%a1%e0%a4%b2-%e0%a4%95%e0%a5%87-%e0%a4%9c%e0%a4%b0%e0%a4%bf%e0%a4%af%e0%a5%87-%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a4%be%e0%a4%a8%e0%a5%8b%e0%a4%82-%e0%a4%95%e0%a5%87-%e0%a4%b5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/dells-laptops-are-infected-with-superfish-like-pre-installed-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/port-scanning-with-metasploit-in-kali-linux-penetration-testing-distribution-basic-mode/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/bypass-any-server-even-if-the-security-is-100000000-in-extreme-hacking-style-_/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/jmeter-web-application-testing-cheatsheet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/virtual-machine-adding-memory-cheatsheet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/new-malwarebytes-anti-exploit-adds-fingerprinting-detection/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/linux-privilege-escalation-cheatsheet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/bypass-antivirus-cheatsheet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/useful-networking-cheatsheet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/simple-bot-written-in-c-language-ethical-hacking-institute-course-in-pune-india/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/a-simple-program-in-c-to-fetch-system-events-ethical-hacking-institute-course-in-pune-india/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/5/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/cyber-security-specialist-policy-standards/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/200-million-whatsapp-users-vulnerable-to-vcard-vulnerability/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/opening-for-application-security-professionals/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/common-types-of-password-cracking-methods/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/opening-for-web-application-security-analyst/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-use-google-translate-as-a-proxy/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/warning-seagate-wireless-hard-drives-have-a-secret-backdoor-for-hackers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/urgent-opening-for-20-ccna-certified-candidates-for-mnc/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/mysql-injection-in-detail/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-msfrop/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-alphanumeric-shellcode/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-msfvenom/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-payloads/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-targets/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-mixins/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-module-format/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-development/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/21/password-cracking-session-intro/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/metasploit-simple-way-to-collect-email-addresses-through-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/these-laser-beams-will-offer-free-internet-to-the-world-from-the-sky/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/coding-tcp-bind-shell-in-linux-asm/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-final-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/03/lets-take-a-selfie-to-shop-online-with-mastercard/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-hosting-the-javascript/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-making-a-log-entry/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-skeleton-creation/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-analyzing-the-dotdefender-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-porting-exploits/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-completing-the-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-using-the-egghunter-mixin/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-simple-imap-fuzzer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-simple-tftp-fuzzer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-a-simple-fuzzer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-nessus-via-msfconsole/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-working-with-nessus/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-nexpose-via-msfconsole/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-working-with-nexpose/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-wmap-web-scanner/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-vulnerability-scanning-with-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-your-own-security-scanner/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-snmp-sweeping/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-password-sniffing/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-service-identification/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-hunting-for-mssql/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-information-gathering-in-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-about-the-metasploit-meterpreter/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-databases-in-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-understanding-payloads-in-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-working-with-active-and-passive-exploits-in-metasploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-using-the-msfconsole-interface/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-using-the-msfcli-interface/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%b5%e0%a4%be%e0%a4%88-%e0%a4%ab%e0%a4%be%e0%a4%88-%e0%a4%95%e0%a5%80-%e0%a4%ae%e0%a4%a6%e0%a4%a6-%e0%a4%b8%e0%a5%87-%e0%a4%ac%e0%a4%bf%e0%a4%a8%e0%a4%be-%e0%a4%b8%e0%a5%87%e0%a4%b2-%e0%a4%ab/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%87%e0%a4%ae%e0%a5%8b%e0%a4%9c%e0%a5%80-%e0%a4%b8%e0%a4%b9%e0%a4%bf%e0%a4%a4-%e0%a4%91%e0%a4%95%e0%a5%8d%e2%80%8d%e0%a4%b8%e0%a4%ab%e0%a5%8b%e0%a4%b0%e0%a5%8d%e0%a4%a1-%e0%a4%a1%e0%a4%bf/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%95%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%87%e0%a4%ae-%e0%a4%b8%e0%a5%87-%e0%a4%ad%e0%a4%be%e0%a4%b0%e0%a4%a4%e0%a5%80%e0%a4%af%e0%a5%8b%e0%a4%82/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/mit-scientists-now-you-can-see-through-walls-with-wi-fi/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/you-can-hack-your-own-car-its-legal-now/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/heres-how-websites-are-tracking-you-online/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/heres-the-list-of-top-10-big-tech-companies-where-ashley-madison-is-very-popular/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/microsoft-office-2016-for-windows-coming-on-september-22/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/writing-simple-buffer-overflow-exploits/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/view-saved-passwords-on-any-website/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-msfconsole-commands/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/the-target-breach-two-years-later/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/millions-of-iot-devices-using-same-hard-coded-crypto-keys/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a4%be%e0%a4%a8%e0%a5%80-%e0%a4%86%e0%a4%a6%e0%a5%87%e0%a4%b6-%e0%a4%95%e0%a5%8b-%e0%a4%a8%e0%a4%be-%e0%a4%95%e0%a4%b9%e0%a4%a8%e0%a5%87-%e0%a4%b2%e0%a4%97%e0%a5%87/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/critical-port-fail-vulnerability-reveals-real-ip-addresses-of-vpn-users/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/how-to-root-windows-phone-and-unlock-the-bootloader-to-install-custom-roms/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/windows-defender-removes-potentially-dangerous-dell-certificate/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/deloitte-launches-australian-cyber-intelligence-centre/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/%e0%a4%a1%e0%a5%87%e0%a4%b2-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a5%88%e0%a4%aa%e0%a4%9f%e0%a5%89%e0%a4%aa-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%a8-%e0%a4%b9%e0%a4%9f%e0%a4%be%e0%a4%af%e0%a4%be-%e0%a4%9c/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/south-korea-rolls-out-lte-backpacks-drones-for-first-responders/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/hackers-are-using-nuclear-exploit-kit-to-spread-cryptowall-4-0-ransomware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/30/swedish-court-we-cant-ban-the-pirate-bay/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/30/today-nsa-has-stopped-its-bulk-phone-surveillance-program/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/%e0%a4%b0%e0%a5%8b%e0%a4%9c%e0%a4%a8%e0%a4%be-%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%ae%e0%a4%be%e0%a4%b0%e0%a5%8d%e0%a4%9f%e0%a4%ab%e0%a5%8b%e0%a4%a8-%e0%a4%9a%e0%a4%be%e0%a4%b0%e0%a5%8d%e0%a4%9c/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/29/%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%9f%e0%a4%be%e0%a4%97%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%ae-%e0%a4%b2%e0%a4%be-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%85%e0%a4%aa%e0%a4%a1%e0%a5%87/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/%e0%a4%85%e0%a4%ac-%e0%a4%a6%e0%a5%8b%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%a4%e0%a5%8b%e0%a4%82-%e0%a4%94%e0%a4%b0-%e0%a4%b0%e0%a4%bf%e0%a4%b6%e0%a5%8d%e2%80%8d%e0%a4%a4%e0%a5%87%e0%a4%a6%e0%a4%be/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/microsoft-updates-smart-headsets-for-visually-impaired/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/iranian-hackers-focus-their-efforts-in-android-rats/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/a-simple-program-in-c-that-will-kill-antivirus-program/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/c-for-hackers-basic-mode/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/a-simple-email-grabber-coded-in-perl/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/report-german-bank-atms-vulnerable-to-hackers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/indian-govt-adopts-open-source/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/china-has-created-a-hotline-you-can-use-to-report-a-suspected-spy/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/vodafone-accounts-hit-by-fraudsters-in-uk/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/central-governments-receipts-payments-to-be-electronic/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/u-s-and-u-k-to-hold-joint-financial-cyber-security-exercise/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/software-defined-perimeter-enables-application-specific-access-control/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/threat-intelligence-doing-it-the-right-way/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/inside-bitcoin-part-2-cryptographic-hashes/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/inside-bitcoin-part-1-bitcoin-and-anonymity/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/how-to-remove-any-evidence-from-your-computer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/hack-like-a-pro-denial-of-service-dos-tools-techniques/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/backdoor-in-baidu-android-sdk-puts-100-million-devices-at-risk/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/anonymous-hackers-to-leak-1000-of-kkk-members-details-on-million-mask-march-nov-5-2015/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/cyber-security-how-to-protect-your-data-over-wi-fi/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/meet-the-worlds-first-person-who-hacked-his-body-to-implant-a-bitcoin-payment-chip/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/google-x-drones-could-deliver-you-something-as-soon-as-2017/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/dont-throw-out-that-old-phone-turn-it-into-a-privacy-device/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/scientists-develop-unbreakable-glass-almost-as-tough-as-steel/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/third-person-arrested-over-talktalk-cyberattack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/beyond-automated-penetration-testing/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/android-battery-information/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/the-official-website-of-the-popular-vbulletin-forum-has-been-hacked/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/intel-changes-up-security-strategy/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/iranian-military-hackers-focus-on-u-s-administration-officials-ethical-hacking-institute-course-in-pune-india/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/chinese-still-jumping-firewall-to-use-twitter-ethical-hacking-institute-course-in-pune-india/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/malicious-code-signing-becomes-dark-web-cottage-industry/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/isis-supporter-hacks-54000-twitter-accounts-and-posts-details-of-heads-of-the-cia-and-fbi/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/the-economists-anti-ad-blocker-was-hacked-exposing-users-to-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/hackers-have-hacked-into-us-arrest-records-database/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/what-is-threat-intelligence-and-how-it-helps-to-identify-security-threats/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/isis-uses-u-s-hosting-services-to-avoid-intelligence-agencies/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/linux-ransomware-targeting-servers-and-threatening-webmasters-to-pay/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%85%e0%a4%ac-%e0%a4%ae%e0%a4%bf%e0%a4%a8%e0%a4%9f%e0%a5%8b%e0%a4%82-%e0%a4%ae%e0%a5%87%e0%a4%82-2%e0%a4%a1%e0%a5%80-%e0%a4%95%e0%a5%8b-%e0%a4%ac%e0%a4%a6%e0%a4%b2%e0%a5%8b%e0%a4%82-3%e0%a4%a1/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%9f%e0%a5%8d%e0%a4%b5%e0%a4%bf%e0%a4%9f%e0%a4%b0-%e0%a4%aa%e0%a4%b0-%e0%a4%86%e0%a4%88%e0%a4%8f%e0%a4%b8-%e0%a4%95%e0%a4%be-%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b9%e0%a4%ae/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%aa%e0%a5%87%e0%a4%a8-%e0%a4%a1%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%87%e0%a4%b5-%e0%a4%95%e0%a5%8b-%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/11/jpmorgan-hack-three-men-charged-in-biggest-bank-hack-in-history/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%85%e0%a4%ac-%e0%a4%90%e0%a4%aa-%e0%a4%b8%e0%a5%87-%e0%a4%b0%e0%a4%96%e0%a5%87%e0%a4%82-%e0%a4%ac%e0%a4%9a%e0%a5%8d%e0%a4%9a%e0%a5%8b%e0%a4%82-%e0%a4%aa%e0%a4%b0-%e0%a4%a8%e0%a4%9c%e0%a4%b0/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-2015-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%b8%e0%a4%ac%e0%a4%b8%e0%a5%87-%e0%a4%9c%e0%a5%8d%e0%a4%af%e0%a4%be%e0%a4%a6%e0%a4%be-%e0%a4%ad%e0%a4%be/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%a6%e0%a4%bf%e0%a4%b5%e0%a4%be%e0%a4%b2%e0%a5%80-%e0%a4%aa%e0%a4%b0-%e0%a4%9c%e0%a4%95%e0%a4%b0%e0%a4%ac%e0%a4%b0%e0%a5%8d%e0%a4%97-%e0%a4%a8%e0%a5%87-fb-%e0%a4%aa%e0%a4%b0-%e0%a4%b6%e0%a5%87/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%85%e0%a4%ac-%e0%a4%b2%e0%a4%a6%e0%a4%a8%e0%a5%87-%e0%a4%b5%e0%a4%be%e0%a4%b2%e0%a5%87-%e0%a4%b9%e0%a5%88%e0%a4%82-%e0%a4%b8%e0%a5%8d%e0%a4%9f%e0%a5%87%e0%a4%a5%e0%a5%8b%e0%a4%b8%e0%a5%8d/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/parliament-hacked-sensitive-data-stolen-used-to-hold-mp-to-ransom-uk/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/microsoft-is-building-data-centres-in-germany-that-the-us-government-cant-touch/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/whatsapp-viber-to-be-blocked-when-needed-pm-bangladesh/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/fbi-reportedly-paid-1-million-to-university-researchers-for-unmasking-tor-users/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/hackers-can-remotely-record-and-listen-calls-from-your-samsung-galaxy-phones/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/hacking-any-android-phone-remotely/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/facebook-will-let-you-send-self-destructing-messages-with-messenger-app/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/how-to-build-a-successful-incident-response-plan/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/bug-in-gmail-app-for-android-allows-anyone-to-send-spoofed-emails/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-%e0%a4%b8%e0%a5%87%e0%a4%82%e0%a4%b8%e0%a4%b0%e0%a4%b6%e0%a4%bf%e0%a4%aa-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%ad%e0%a4%be%e0%a4%b0%e0%a4%a4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%aa%e0%a5%87%e0%a4%b0%e0%a4%bf%e0%a4%b8-%e0%a4%b9%e0%a4%ae%e0%a4%b2%e0%a5%87-%e0%a4%95%e0%a5%87-%e0%a4%ac%e0%a4%be%e0%a4%a6-%e0%a4%8f%e0%a4%95%e0%a5%8d%e0%a4%9f%e0%a4%bf%e0%a4%b5-%e0%a4%b9/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%97%e0%a5%82%e0%a4%97%e0%a4%b2-%e0%a4%a1%e0%a5%82%e0%a4%a1%e0%a4%b2-%e0%a4%af%e0%a5%82%e0%a4%82-%e0%a4%ae%e0%a4%a8%e0%a4%be%e0%a4%af%e0%a4%be-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%b9%e0%a5%88-child/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/16/parisattacks-anonymous-declares-war-on-isis-we-will-hunt-you-down/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/16/%e0%a4%ab%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%82%e0%a4%b8-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a4%bf%e0%a4%8f-%e0%a4%ab%e0%a5%8d%e0%a4%b0%e0%a5%80-%e0%a4%b9%e0%a5%88-%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%95/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/isis-calls-anonymous-idiots-and-issues-5-lame-tips-for-its-members-to-avoid-getting-hacked/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/would-encryption-backdoor-stop-paris-like-terror-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/paris-attacks-no-we-cant-blame-edward-snowden-and-encryption-for-terror-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/hackers-claim-isis-militants-linked-to-paris-attacks-had-a-bitcoin-wallet-worth-3-million/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/%e0%a4%ac%e0%a4%bf%e0%a4%a8%e0%a4%be-%e0%a4%95%e0%a4%be%e0%a4%82%e0%a4%9a-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a5%89%e0%a4%a8%e0%a5%8d%e2%80%8d%e0%a4%9a-%e0%a4%b9%e0%a5%8b-%e0%a4%b8%e0%a4%95%e0%a4%a4/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/%e0%a4%a4%e0%a5%87%e0%a4%9c-%e0%a4%87%e0%a4%82%e0%a4%9f%e0%a4%b0%e0%a4%a8%e0%a5%87%e0%a4%9f-%e0%a4%95%e0%a4%a8%e0%a5%87%e0%a4%95%e0%a5%8d%e2%80%8d%e0%a4%b6%e0%a4%a8-%e0%a4%95%e0%a5%87-%e0%a4%b2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/virustotal-now-scans-mac-os-x-apps-for-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/mark-zuckerberg-just-quits-his-job-at-facebook-check-yourself/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/is-telegram-really-secure-4-major-privacy-issues-raised-by-researcher/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/telegram-secret-messaging-app-shuts-down-78-isis-channels/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/this-malware-can-secretly-auto-install-any-android-app-to-your-phone/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/mr-grey-hacker-wanted-by-fbi-steals-1-2-billion-login-passwords/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/wi-fi-%e0%a4%b8%e0%a5%87-100-%e0%a4%97%e0%a5%81%e0%a4%a8%e0%a4%be-%e0%a4%a4%e0%a5%87%e0%a4%9c-li-fi-1-%e0%a4%b8%e0%a5%87%e0%a4%95%e0%a4%82%e0%a4%a1-%e0%a4%ae%e0%a5%87%e0%a4%82-3-%e0%a4%98%e0%a4%82/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/russian-atm-hackers-steal-4-million-in-cash-with-reverse-atm-hack-technique/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/this-10-device-can-guess-and-steal-your-next-credit-card-number-before-youve-received-it/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/whatsapp-blocks-links-to-telegram-messenger-its-biggest-competitor/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/toymaker-vtech-hack-exposes-4-8-million-customers-including-photos-of-children/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/google-denies-israeli-youtube-monitoring-deal/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/1-in-7-people-use-one-password-says-kaspersky/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/01/%e0%a4%aa%e0%a4%be%e0%a4%95%e0%a4%bf%e0%a4%b8%e0%a5%8d%e0%a4%a4%e0%a4%be%e0%a4%a8-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%ac%e0%a5%8d%e0%a4%b2%e0%a5%88%e0%a4%95%e0%a4%ac%e0%a5%87%e0%a4%b0%e0%a5%80/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/02/%e0%a4%9f%e0%a5%8d%e0%a4%b5%e0%a4%bf%e0%a4%9f%e0%a4%b0-chennairainshelp-%e0%a4%b8%e0%a5%87-%e0%a4%95%e0%a4%b0-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%9a%e0%a5%87%e0%a4%a8%e0%a5%8d%e2%80%8d%e0%a4%a8/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/54483-cyber-security-incidents-reported-this-fiscal-year-government/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/patent-troll-66-big-companies-sued-for-using-https-encryption/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/adobe-to-kill-flash-but-by-just-renaming-it-as-adobe-animate-cc/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/03/%e0%a4%90%e0%a4%aa%e0%a4%b2-%e0%a4%86%e0%a4%88%e0%a4%93%e0%a4%8f%e0%a4%b8-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a4%bf%e0%a4%8f-%e0%a4%85%e0%a4%aa%e0%a4%a1%e0%a5%87%e0%a4%9f-%e0%a4%b9%e0%a5%81%e0%a4%86/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/12/04/%e0%a4%97%e0%a5%82%e0%a4%97%e0%a4%b2-%e0%a4%95%e0%a4%be-%e0%a4%af%e0%a4%b9-%e0%a4%ab%e0%a5%80%e0%a4%9a%e0%a4%b0-%e0%a4%ac%e0%a4%9a%e0%a4%be%e0%a4%8f%e0%a4%97%e0%a4%be-70-%e0%a4%aa%e0%a5%8d%e0%a4%b0/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/7/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/warning-18000-android-apps-contains-code-that-spy-on-your-text-messages/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/duuzer-trojan-a-new-backdoor-targeting-south-korean-organizations/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/fbi-suggests-ransomware-victims-just-pay-the-ransom-money/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/ec-council-university-launches-online-cyber-security-degree-bachelors-degree-masters-degrees-and-certificate-courses-for-working-professionals/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/15-year-old-boy-arrested-in-connection-with-talktalk-cyber-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/privatoria-best-vpn-service-for-fast-anonymous-and-secure-browsing/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/nsa-linked-spying-malware-infected-top-german-officials-computer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/17-atms-hacked-and-1-2-million-stolen-by-hackers-from-malaysia/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/hacking-team-offering-encryption-cracking-tools-to-law-enforcement-agencies/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/free-ransomware-decryption-tool-coinvault-and-bitcryptor/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/31/death-in-the-internet-age-how-to-prepare-for-a-digital-afterlife/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/cryptowall-ransomware-raised-325-million-in-revenue-for-its-developer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/mission-1-billion-microsoft-will-automatically-offer-windows-10-upgrade/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/tor-releases-anonymous-instant-messenger-heres-how-to-use-it/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/google-is-merging-its-chrome-os-with-android/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/30/biggest-free-hosting-company-hacked-13-5-million-plaintext-passwords-leaked/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/its-now-legal-to-jailbreak-smart-tv-smartphone-or-tablet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/wifi-adapter-packet-injection-test/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/websploit-wifi-jammer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/basic-malware-analysis-tools/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/north-korea-suspected-of-hacking-seoul-subway-operator/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/trojan-threatens-linux-networks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/how-to-hack-and-decrypt-whatsapp-database-remotely-root/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/ios-malware-yispecter-no-iphone-is-safe/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/incredible-someone-just-hacked-10000-routers-to-make-them-more-secure/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/apple-ios-9-0-2-update-patches-lock-screen-bypass-exploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/deadly-simple-exploit-bypasses-apple-gatekeeper-security-to-install-malicious-apps/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/apple-kicks-out-some-malicious-ad-blocker-apps-from-its-online-store/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/critical-netgear-router-exploit-allows-anyone-to-hack-you-remotely/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/cyberspace-china-arrested-hackers-at-u-s-government-request/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/google-rewarded-the-guy-who-accidentally-bought-google-com-but-he-donated-it-to-charity/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/15/osi-model-tutorial/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/isis-hacker-who-passed-u-s-military-data-to-terrorists-arrested-in-malaysia/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/how-nsa-successfully-broke-trillions-of-encrypted-connections/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/first-ever-anti-drone-weapon-that-shoots-down-uavs-with-radio-waves/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/hackers-can-use-radio-waves-to-control-your-smartphone-from-16-feet-away/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/how-some-chinese-hackers-started-making-big-money/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/usb-killer-v2-0-latest-usb-device-that-can-easily-burn-your-computer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/18/phpmyadmin-shell-upload-program-in-perl/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/18/backbox-linux-4-4-released/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/how-to-find-a-super-hacker/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/facebook-will-now-notify-you-if-nsa-is-spying-on-you/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/microsoft-doesnt-want-windows-10-users-to-switch-to-chrome-or-firefox/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/voice-hackers-can-record-your-voice-then-use-morpher-to-trick-authentication-systems/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/india-may-get-three-unified-commands-for-special-operations-battles-in-space-on-web/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/google-makes-full-disk-encryption-mandatory-for-new-android-6-0-devices/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/this-malware-can-delete-and-replace-your-entire-chrome-browser-with-a-lookalike/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/high-school-student-hacked-into-cia-directors-personal-email-account/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/apple-pulls-hundreds-of-ios-apps-using-private-sdk-from-china-to-gather-user-data/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/in-many-ways-cyber-defenders-are-like-scientists/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/hacked-ebay-accounts-are-selling-for-up-to-1400-on-illegal-marketplaces/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/is-hackers-are-attacking-the-us-energy-grid/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/suppliers-to-blame-for-18-per-cent-of-cyber-security-incidents-kaspersky-lab/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/cyber-security-now-a-matter-of-survival-of-the-fittest/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/how-to-protect-yourself-against-xcodeghost-like-ios-malware-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/apple-told-judge-its-impossible-to-access-data-on-locked-iphones/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/lets-encrypt-free-ssltls-certificate-now-trusted-by-major-web-browsers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/how-hackers-can-hack-your-chip-and-pin-credit-cards/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/cracking-wifi-passwords-by-hacking-into-smart-kettles/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/attacking-automobiles-inside-a-connected-cars-points-of-vulnerability/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/heres-how-siem-can-protect-your-privileged-accounts-in-the-enterprise/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/22/wikileaks-obtains-cia-directors-hacked-emails-and-plans-to-publish-them-shortly/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/23/cia-directors-hacked-emails-are-published-online/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hackers-find-a-way-to-disable-car-airbags-system/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hacking-fitbit-health-trackers-wirelessly-in-10-seconds/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/talktalk-hacked-4-million-credit-card-profiles-may-have-been-stolen/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/joomla-3-4-5-patches-critical-sql-injection-vulnerability/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hacking-cctv-cameras-to-launch-ddos-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/25/new-tool-allows-users-to-see-how-their-personal-information-is-used-on-the-web/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/25/hacking-windows-10-using-a-simple-windows-excel-file/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/south-korea-seeks-hackers-to-defend-against-north-korean-cyberattacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/someone-just-bought-your-smart-home-did-they-get-your-data-too/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/over-half-of-worldwide-news-media-outlets-have-suffered-some-form-of-cyber-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/this-11-year-old-is-selling-cryptographically-secure-passwords-for-2-each/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/lulzsec-revival-hacker-claims-responsibility-for-talktalk-hack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/furor-over-iot-dangers-could-fuel-innovative-security-measures/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/vulnerability-assessments-vs-penetration-testing-differences-and-use-cases/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/the-art-of-data-wiping-on-mobile-devices/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/how-to-hack-like-a-pro-shodan-the-worlds-most-dangerous-search-engine/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/youve-been-attacked-now-what/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/hackers-target-racist-homophobic-websites/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/how-vigilant-are-enterprises-against-cyber-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/thousands-of-hacked-wordpress-sites-abused-to-infect-millions-of-visitors/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/microsoft-has-built-its-own-linux-operating-system/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/beware-coffee-lovers-starbucks-exposed-you-to-3-critical-vulnerabilities/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/researchers-to-develop-long-lasting-solid-state-batteries/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/new-bug-in-bugzilla-software-could-expose-zero-day-vulnerabilities/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/for-better-privacy-security-change-these-ios-9-settings-immediately/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/worlds-9-biggest-banks-to-adopt-bitcoins-blockchain-technology/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/%e2%80%8bsynful-knock-backdoor-malware-found-in-cisco-routers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/how-to-detect-ie-zero-day-exploit-used-to-deploy-korplug-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/airdrop-bug-in-apple-ios-and-osx-allows-hackers-to-install-malware-silently/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/30/breaking-edward-snowden-joins-twitter-only-follows-nsa/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/how-to-freeze-credit-report-to-protect-yourself-against-identity-theft/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/21/aw-snap-this-16-character-string-can-crash-your-google-chrome/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/windows-8-remote-explorer-kill-with-shell-code/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/inserting-fake-update-dns-in-windows-8-through-shellcode/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/with-its-first-android-app-apple-tried-to-kill-android-community-but-failed-badly/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/avg-antivirus-plans-to-collect-sell-your-personal-data-to-advertisers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/20/is-this-security-focused-linux-kernel-really-unhackable/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/google-to-disable-weak-sslv3-and-rc4-protocols-to-boost-internet-security/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/d-link-accidentally-publishes-its-private-code-signing-keys-on-the-internet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/hacking-satellites-and-gps/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/weaponized-drones-for-police-now-legal-in-north-dakota/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/heres-how-iranian-hackers-can-hack-your-gmail-accounts/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/photos-leaked-heres-top-features-expected-in-next-iphone-release/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/02/fbis-cyber-task-force-identifies-stealthy-ff-rats-used-in-cyber-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/26-android-phone-models-shipped-with-pre-installed-spyware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/using-android-applock-to-protect-your-privacy-its-useless/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/critical-os-x-flaw-grants-mac-keychain-access-to-malware/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/this-12-yr-old-indian-origin-girl-has-iq-higher-than-einstein/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/caution-hackers-can-easily-hijack-popular-baby-monitors-to-watch-your-kids/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/meet-worlds-fastest-wi-fi-router-looks-like-an-alien/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/new-rules-require-fbi-to-get-warrant-for-spying-with-stingrays-cell-phone-trackers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/popular-belkin-wi-fi-routers-vulnerable-to-hackers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/flash-player-se-spread-method/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/cracking-remote-desktops-new-style/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/after-5-years-now-google-ready-to-comply-with-chinas-censorship-laws-for-business/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/ashley-madisons-company-secretly-running-online-escort-services-leaked-documents-reveal/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/china-police-arrest-15000-suspects-for-alleged-cyber-crimes/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-remove-keyraider-malware-that-hacked-over-225000-ios-devices/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-fix-chrome-massive-memory-usage-simply-try-chrome-45-for-faster-performance/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/techie-police-officer-builds-a-sniffing-tool-to-track-stolen-devices-based-on-war-driving/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/microsoft-releases-12-security-updates-5-critical-and-7-important-patches/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/contactless-fingerprint-scanner-that-can-capture-your-prints-from-meters-away/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/this-creepy-app-captures-users-private-moment-photos-and-blackmails-for-money/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/10/russian-hackers-hijack-satellite-to-steal-data-from-thousands-of-hacked-computers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/10/samsung-launches-6gb-ram-chips-for-next-generation-smartphones/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/hacker-demonstrated-untethered-ios-9-jailbreak-on-video/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/lockpickers-3d-printed-master-key-for-tsa-luggage-locks-and-blueprint-leaked-online/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/11-million-ashley-madison-passwords-cracked-in-just-10-days/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/lockerpin-ransomware-resets-pin-and-permanently-locks-your-smartphones/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/fun-with-powershell-using-tor-with-powershell/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/google-translator-exploit-for-hacking-google-accounts/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/searching-exploits-directly-from-microsoft-site/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/microsoft-is-auto-downloading-windows-10-to-pcs-even-if-you-dont-want-it/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/android-stagefright-exploit-code-released/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/health-insurer-excellus-hacked-10-5-million-records-breached/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/13/these-top-30-ashley-madison-passwords-are-just-as-terrible-as-youd-think/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/13/apple-boosts-ios-9-security-with-improved-two-factor-authentication/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/14/secure-your-websites-from-ddos-attack-in-just-one-minute/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/14/secure-your-website-just-in-one-minute/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/15/windows-10-remote-explorer-kill-with-shell-code/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/this-computer-chip-self-destructs-in-10-seconds-on-command-to-keep-secrets-safe/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/hacker-finds-a-simple-way-to-bypass-android-5-x-lock-screen-steps-video/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/lets-encrypt-project-issues-its-first-free-ssltls-certificate/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/facebook-to-add-a-dislike-button-mark-zuckerberg-confirms/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/ios-sandbox-vulnerability-puts-enterprise-data-at-risk/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/github-again-hit-by-ddos-cyberattack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/popular-download-service-%ce%bctorrent-wants-you-to-pay-for-its-software/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/two-arrested-for-dropping-drugs-and-porn-into-prison-using-a-drone/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/hack-leads-to-extortions-and-suicides-ashley-madison-puts-500000-bounty-on-hackers-head/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/microsoft-launches-cortana-app-for-android-users/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/hijack-whatsapp-through-android/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/thc-hydra-standalone-app-no-root-needed/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/how-protect-your-site-against-ddos-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/basic-terminologies-used-in-ethical-hacking/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/rooting-a-linux-box-metasploit-style/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/how-to-remember-your-passwords-easily/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/31/six-u-k-teens-arrested-for-using-lizard-squads-ddos-tool/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/warning-how-hackers-could-hijack-your-facebook-fan-page-with-this-trick/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/marks-milestone-1-billion-people-uses-facebook-in-a-single-day/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/28/german-spy-agency-trades-citizens-metadata-in-exchange-for-nsas-xkeyscore/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/paypal-vulnerability-allows-hackers-to-steal-all-your-money/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/british-born-isis-hacker-killed-in-us-drone-strike-in-syria/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/how-spies-could-unmask-tor-users-without-cracking-encryption/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/how-to-hack-millions-of-android-phones-using-stagefright-bug-without-sending-mms/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/antivirus-firm-bitdefender-hacked-turns-out-stored-passwords-are-unencrypted/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/04/how-to-forward-ports-on-your-router/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/hacker-finds-how-easy-is-to-steal-money-using-square-credit-card-reader/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/thunderstrike-2-worlds-first-firmware-worm-that-infects-mac-computers-without-detection/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/android-vulnerability-traps-devices-in-endless-reboot-loop/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/08/hackers-can-remotely-steal-fingerprints-from-android-phones/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/08/this-antenna-can-remotely-steal-data-from-devices-using-sound-waves/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/12/homing-in-on-bug-bounties-i-earned-1500/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/creating-a-100-fud-crypter/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/kicking-someone-out-from-wireless-network/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/lenovo-caught-using-rootkit-to-secretly-install-unremovable-software/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/facebook-fired-an-intern-after-he-exposes-how-to-track-users-location/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/incomplete-stagefright-security-patch-leaves-android-vulnerable-to-text-hack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/ransomware-attacks-threaten-wearable-devices-and-internet-of-things/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/jabber-setup-for-secure-chat/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/creating-your-own-email-spoofer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/decrypting-whatsapp-crypt-file-without-key/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/windows-10-doesnt-stop-spying-you-even-after-disabling-its-creepy-features/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/change-this-facebook-privacy-setting-that-could-allow-hackers-to-steal-your-identity/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/installing-metasploit-framework-on-ubuntu/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/taking-windows-7-down-with-a-simple-shortcut-file/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/xss-attacks-in-detail/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/how-to-exploit-bittorrent-for-large-scale-dos-attacks/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/kali-linux-on-android-using-linux-deploy/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/kali-linux-full-disk-encryption/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/passing-the-hash-with-remote-desktop/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/openvas-vulnerability-scanning/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/difference-between-2g-3g-3-5g-4g/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/android-secret-codes/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/tips-for-full-anonymity-for-rat-users/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/creating-your-own-booter/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/cracking-wpa-with-your-android-device/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/grabbing-skype-ip/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/how-to-use-whatsapp-web-client-on-iphone-and-other-ios-devices/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/your-gps-location-and-calls-can-be-spied-using-network-vulnerability/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/hack-codegen-facebook-open-sources-code-that-writes-code/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-a-network-for-live-hosts-with-nmap/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-enumerate-webserver-directories-with-nmap/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/heartbleed-ssl-bug-scanning-using-nmap/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-for-smb-vulnerabilities-using-nmap/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/crunch-a-password-list-generator/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-webservers-with-nikto-for-vulnerabilities/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/ransomware-infection-and-removal-guide/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-directories-using-websploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/installing-vpn-on-attacking-machine/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/cloudflare-ip-resolving-using-websploit/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/most-vulnerable-smart-cities-to-cyber-attack-on-internet-of-things-iot/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/hackers-can-remotely-hack-self-aiming-rifles-to-change-its-target/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/31/new-android-vulnerability-could-crash-your-phones-badly/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/30/united-airlines-hacked-by-sophisticated-hacking-group/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/cracking-wpa-with-oclhashcat-gpu-on-windows/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-hack-upc-wireless-networks-and-other-wlan/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/finding-wps-enabled-wifi-networks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/pixie-dust-attack-wps-in-kali-linux-with-reaver/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-hack-wireless-router/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/open-port-scanning-and-os-detection-with-nmap/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/03/scientists-have-increased-fiber-optic-capacity-nearly-20-times/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/05/heres-how-you-can-replace-your-iphone-battery-for-free/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/05/this-20-year-old-student-has-written-100-malware-programs-in-two-years/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/06/office-2013-exploit-creation/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/poc-how-facebook-account-gets-hijacked/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/mitm-attack-on-windows-server-2012-r2/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/this-device-can-wirelessly-charge-your-all-devices-at-once-from-15-feet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/hacking-team-gets-hacked-500gb-of-data-dumped-over-the-internet/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/winrar-extension-spoof/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/ddos-a-website-using-hping3/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/17-year-old-lizard-squad-member-found-guilty-of-50700-hacking-charges/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/hacking-team-flash-zero-day-linked-to-cyber-attacks-on-south-korea-and-japan/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/this-secret-program-tracks-every-passenger-on-international-flights/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/german-missile-system-hacked-unexplained-commands-executed-remotely/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/this-organic-computer-is-made-up-from-brains-of-rats-and-monkeys/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/malicious-gaming-app-infects-more-than-1-million-android-users/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/bitcoin-cloud-mining-service-hacked-database-on-sale-for-just-1-bitcoin/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/simple-way-to-see-the-password-behind-asterisks-n00b-style/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/infecting-people-on-lanwan-without-sending-any-files/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/malware-and-hacking-forum-seized-dozens-arrested/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/java-zero-day-vulnerability-exploited-in-the-wild/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/like-it-or-not-you-cant-disable-windows-10-automatic-updates/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/hacker-earns-1-25-million-free-frequent-flyer-miles-on-united-airlines/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/cracking-rc4-encryption-in-wpa-tkip-and-tls/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/19/cracking-winrar-with-ollydbgx64dbg/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/password-sniffing-using-wireshark/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/writing-custom-ascii-shellcode/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/admin-page-finder-dirbuster/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/best-ways-to-hide-any-filetextvideo-inside-an-image/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/phishing-your-employees-clever-way-to-promote-cyber-awareness/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/hacking-team-and-boeing-built-cyber-weaponized-drones-to-spy-on-targets/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/packet-fingerprinting-with-wireshark-and-detecting-nmap-scans/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/how-to-crack-accounts-with-sentry/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/lessons-we-learned-from-ashley-madison-data-breach/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/google-yahoo-facebook-collaborate-to-blacklist-bad-bots/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/bug-in-openssh-opens-linux-machines-to-password-cracking-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/apple-mac-os-x-vulnerability-allows-attackers-to-hack-your-computer/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/hacking-team-were-victim-of-a-criminal-cyber-attack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/rcsandroid-advanced-android-hacking-tool-leaked-online/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/couple-made-1-3million-stealing-bank-details-from-700-victims-then-splashed-the-cash-on-a-lavish-wedding-and-honeymoon-to-hawaii/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/canada-announces-fresh-funding-to-fight-cybercrime/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/25/all-smartwatches-are-vulnerable-to-hackers/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/25/introducing-93gbps-high-speed-tor-like-encrypted-anonymous-network/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/wifi-hacking-tools/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/hack-team-exploit-demo-how-they-used-to-hack/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/car-hacking-scary-but-now-its-reality/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/critical-persistent-injection-vulnerability-in-apple-app-store-and-itunes/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/hacking-air-gapped-computer-with-a-simple-cell-phone/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/simple-text-message-to-hack-any-android-phone-remotely/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/spoofing-mac-address-using-kali/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/this-10-device-can-clone-rfid-equipped-access-cards-easily/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/nsa-to-destroy-bulk-collection-of-surveillance-data/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/30/metasploit-getting-a-shell/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-an-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.5120</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/8/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/6/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/7/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/google-photo-app-uploads-your-images-to-cloud-even-after-uninstalling/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/how-hacking-team-and-fbi-planned-to-unmask-a-tor-user/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-introduction-to-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/21/this-simple-trick-requires-only-your-phone-number-to-hack-your-email-account/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/6/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/7/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/23/steganography-how-to-hide-files-behind-a-image/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/23/pentesting-a-web-application/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/22/spoofing-your-mac-address/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/whatsapp-spy-know-when-someone-goes-to-sleep-or-wakeup/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/ms-office-exploit-hack-using-ms-office-extreme-hacking-style/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/port-forwarding-using-torrents-extreme-hacking-style-_/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/how-to-get-private-tunnel-vpn-for-free/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/attacking-pop3-using-dictionary-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/13/post-exploitation-and-covering-tracks-in-linux-box/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/11/network-traffic-flow-tutorial/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/6/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/24/%e0%a4%a1%e0%a5%82%e0%a4%a1%e0%a4%b2-%e0%a4%95%e0%a5%87-%e0%a4%9c%e0%a4%b0%e0%a4%bf%e0%a4%af%e0%a5%87-%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a4%be%e0%a4%a8%e0%a5%8b%e0%a4%82-%e0%a4%95%e0%a5%87-%e0%a4%b5/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/port-scanning-with-metasploit-in-kali-linux-penetration-testing-distribution-basic-mode/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/bypass-any-server-even-if-the-security-is-100000000-in-extreme-hacking-style-_/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/jmeter-web-application-testing-cheatsheet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/virtual-machine-adding-memory-cheatsheet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/new-malwarebytes-anti-exploit-adds-fingerprinting-detection/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/linux-privilege-escalation-cheatsheet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/bypass-antivirus-cheatsheet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/simple-bot-written-in-c-language-ethical-hacking-institute-course-in-pune-india/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/a-simple-program-in-c-to-fetch-system-events-ethical-hacking-institute-course-in-pune-india/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/7/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/200-million-whatsapp-users-vulnerable-to-vcard-vulnerability/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/common-types-of-password-cracking-methods/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-use-google-translate-as-a-proxy/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/warning-seagate-wireless-hard-drives-have-a-secret-backdoor-for-hackers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/mysql-injection-in-detail/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-msfrop/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-alphanumeric-shellcode/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-msfvenom/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-payloads/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-targets/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-mixins/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-module-format/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-exploit-development/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/these-laser-beams-will-offer-free-internet-to-the-world-from-the-sky/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/04/coding-tcp-bind-shell-in-linux-asm/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/03/lets-take-a-selfie-to-shop-online-with-mastercard/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-simple-imap-fuzzer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-simple-tftp-fuzzer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-a-simple-fuzzer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-nessus-via-msfconsole/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-working-with-nessus/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-nexpose-via-msfconsole/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-working-with-nexpose/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-wmap-web-scanner/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-vulnerability-scanning-with-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-writing-your-own-security-scanner/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-snmp-sweeping/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-password-sniffing/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-service-identification/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-hunting-for-mssql/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-information-gathering-in-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-about-the-metasploit-meterpreter/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/28/metasploit-databases-in-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-understanding-payloads-in-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-working-with-active-and-passive-exploits-in-metasploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-using-the-msfconsole-interface/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/06/26/metasploit-using-the-msfcli-interface/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%87%e0%a4%ae%e0%a5%8b%e0%a4%9c%e0%a5%80-%e0%a4%b8%e0%a4%b9%e0%a4%bf%e0%a4%a4-%e0%a4%91%e0%a4%95%e0%a5%8d%e2%80%8d%e0%a4%b8%e0%a4%ab%e0%a5%8b%e0%a4%b0%e0%a5%8d%e0%a4%a1-%e0%a4%a1%e0%a4%bf/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%95%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%87%e0%a4%ae-%e0%a4%b8%e0%a5%87-%e0%a4%ad%e0%a4%be%e0%a4%b0%e0%a4%a4%e0%a5%80%e0%a4%af%e0%a5%8b%e0%a4%82/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/heres-how-websites-are-tracking-you-online/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/microsoft-office-2016-for-windows-coming-on-september-22/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/view-saved-passwords-on-any-website/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/the-target-breach-two-years-later/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/28/millions-of-iot-devices-using-same-hard-coded-crypto-keys/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/%e0%a4%87%e0%a4%82%e0%a4%b8%e0%a4%be%e0%a4%a8%e0%a5%80-%e0%a4%86%e0%a4%a6%e0%a5%87%e0%a4%b6-%e0%a4%95%e0%a5%8b-%e0%a4%a8%e0%a4%be-%e0%a4%95%e0%a4%b9%e0%a4%a8%e0%a5%87-%e0%a4%b2%e0%a4%97%e0%a5%87/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/critical-port-fail-vulnerability-reveals-real-ip-addresses-of-vpn-users/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/how-to-root-windows-phone-and-unlock-the-bootloader-to-install-custom-roms/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/windows-defender-removes-potentially-dangerous-dell-certificate/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/deloitte-launches-australian-cyber-intelligence-centre/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/27/%e0%a4%a1%e0%a5%87%e0%a4%b2-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a5%88%e0%a4%aa%e0%a4%9f%e0%a5%89%e0%a4%aa-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%a8-%e0%a4%b9%e0%a4%9f%e0%a4%be%e0%a4%af%e0%a4%be-%e0%a4%9c/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/south-korea-rolls-out-lte-backpacks-drones-for-first-responders/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/hackers-are-using-nuclear-exploit-kit-to-spread-cryptowall-4-0-ransomware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/iranian-hackers-focus-their-efforts-in-android-rats/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/a-simple-program-in-c-that-will-kill-antivirus-program/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/c-for-hackers-basic-mode/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/01/a-simple-email-grabber-coded-in-perl/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/report-german-bank-atms-vulnerable-to-hackers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/hackers-win-1-million-bounty-for-remotely-hacking-latest-ios-9-iphone/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/indian-govt-adopts-open-source/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/china-has-created-a-hotline-you-can-use-to-report-a-suspected-spy/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/vodafone-accounts-hit-by-fraudsters-in-uk/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/central-governments-receipts-payments-to-be-electronic/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/u-s-and-u-k-to-hold-joint-financial-cyber-security-exercise/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/software-defined-perimeter-enables-application-specific-access-control/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/02/threat-intelligence-doing-it-the-right-way/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/inside-bitcoin-part-2-cryptographic-hashes/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/inside-bitcoin-part-1-bitcoin-and-anonymity/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/how-to-remove-any-evidence-from-your-computer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/hack-like-a-pro-denial-of-service-dos-tools-techniques/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/backdoor-in-baidu-android-sdk-puts-100-million-devices-at-risk/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/anonymous-hackers-to-leak-1000-of-kkk-members-details-on-million-mask-march-nov-5-2015/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/cyber-security-how-to-protect-your-data-over-wi-fi/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/meet-the-worlds-first-person-who-hacked-his-body-to-implant-a-bitcoin-payment-chip/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/google-x-drones-could-deliver-you-something-as-soon-as-2017/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/dont-throw-out-that-old-phone-turn-it-into-a-privacy-device/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/scientists-develop-unbreakable-glass-almost-as-tough-as-steel/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/third-person-arrested-over-talktalk-cyberattack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/beyond-automated-penetration-testing/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/android-battery-information/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/the-official-website-of-the-popular-vbulletin-forum-has-been-hacked/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/04/intel-changes-up-security-strategy/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/iranian-military-hackers-focus-on-u-s-administration-officials-ethical-hacking-institute-course-in-pune-india/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/chinese-still-jumping-firewall-to-use-twitter-ethical-hacking-institute-course-in-pune-india/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/05/malicious-code-signing-becomes-dark-web-cottage-industry/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/isis-supporter-hacks-54000-twitter-accounts-and-posts-details-of-heads-of-the-cia-and-fbi/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/the-economists-anti-ad-blocker-was-hacked-exposing-users-to-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/hackers-have-hacked-into-us-arrest-records-database/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/08/what-is-threat-intelligence-and-how-it-helps-to-identify-security-threats/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/isis-uses-u-s-hosting-services-to-avoid-intelligence-agencies/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/09/linux-ransomware-targeting-servers-and-threatening-webmasters-to-pay/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%85%e0%a4%ac-%e0%a4%ae%e0%a4%bf%e0%a4%a8%e0%a4%9f%e0%a5%8b%e0%a4%82-%e0%a4%ae%e0%a5%87%e0%a4%82-2%e0%a4%a1%e0%a5%80-%e0%a4%95%e0%a5%8b-%e0%a4%ac%e0%a4%a6%e0%a4%b2%e0%a5%8b%e0%a4%82-3%e0%a4%a1/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%9f%e0%a5%8d%e0%a4%b5%e0%a4%bf%e0%a4%9f%e0%a4%b0-%e0%a4%aa%e0%a4%b0-%e0%a4%86%e0%a4%88%e0%a4%8f%e0%a4%b8-%e0%a4%95%e0%a4%be-%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b9%e0%a4%ae/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/10/%e0%a4%aa%e0%a5%87%e0%a4%a8-%e0%a4%a1%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%87%e0%a4%b5-%e0%a4%95%e0%a5%8b-%e0%a4%b8%e0%a4%be%e0%a4%87%e0%a4%ac%e0%a4%b0-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/11/jpmorgan-hack-three-men-charged-in-biggest-bank-hack-in-history/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%85%e0%a4%ac-%e0%a4%90%e0%a4%aa-%e0%a4%b8%e0%a5%87-%e0%a4%b0%e0%a4%96%e0%a5%87%e0%a4%82-%e0%a4%ac%e0%a4%9a%e0%a5%8d%e0%a4%9a%e0%a5%8b%e0%a4%82-%e0%a4%aa%e0%a4%b0-%e0%a4%a8%e0%a4%9c%e0%a4%b0/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-2015-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%b8%e0%a4%ac%e0%a4%b8%e0%a5%87-%e0%a4%9c%e0%a5%8d%e0%a4%af%e0%a4%be%e0%a4%a6%e0%a4%be-%e0%a4%ad%e0%a4%be/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%a6%e0%a4%bf%e0%a4%b5%e0%a4%be%e0%a4%b2%e0%a5%80-%e0%a4%aa%e0%a4%b0-%e0%a4%9c%e0%a4%95%e0%a4%b0%e0%a4%ac%e0%a4%b0%e0%a5%8d%e0%a4%97-%e0%a4%a8%e0%a5%87-fb-%e0%a4%aa%e0%a4%b0-%e0%a4%b6%e0%a5%87/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/%e0%a4%85%e0%a4%ac-%e0%a4%b2%e0%a4%a6%e0%a4%a8%e0%a5%87-%e0%a4%b5%e0%a4%be%e0%a4%b2%e0%a5%87-%e0%a4%b9%e0%a5%88%e0%a4%82-%e0%a4%b8%e0%a5%8d%e0%a4%9f%e0%a5%87%e0%a4%a5%e0%a5%8b%e0%a4%b8%e0%a5%8d/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/parliament-hacked-sensitive-data-stolen-used-to-hold-mp-to-ransom-uk/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/microsoft-is-building-data-centres-in-germany-that-the-us-government-cant-touch/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/whatsapp-viber-to-be-blocked-when-needed-pm-bangladesh/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/12/fbi-reportedly-paid-1-million-to-university-researchers-for-unmasking-tor-users/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/hackers-can-remotely-record-and-listen-calls-from-your-samsung-galaxy-phones/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/hacking-any-android-phone-remotely/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/facebook-will-let-you-send-self-destructing-messages-with-messenger-app/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/14/how-to-build-a-successful-incident-response-plan/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/bug-in-gmail-app-for-android-allows-anyone-to-send-spoofed-emails/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%ab%e0%a5%87%e0%a4%b8%e0%a4%ac%e0%a5%81%e0%a4%95-%e0%a4%b8%e0%a5%87%e0%a4%82%e0%a4%b8%e0%a4%b0%e0%a4%b6%e0%a4%bf%e0%a4%aa-%e0%a4%ae%e0%a5%87%e0%a4%82-%e0%a4%ad%e0%a4%be%e0%a4%b0%e0%a4%a4/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%aa%e0%a5%87%e0%a4%b0%e0%a4%bf%e0%a4%b8-%e0%a4%b9%e0%a4%ae%e0%a4%b2%e0%a5%87-%e0%a4%95%e0%a5%87-%e0%a4%ac%e0%a4%be%e0%a4%a6-%e0%a4%8f%e0%a4%95%e0%a5%8d%e0%a4%9f%e0%a4%bf%e0%a4%b5-%e0%a4%b9/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/15/%e0%a4%97%e0%a5%82%e0%a4%97%e0%a4%b2-%e0%a4%a1%e0%a5%82%e0%a4%a1%e0%a4%b2-%e0%a4%af%e0%a5%82%e0%a4%82-%e0%a4%ae%e0%a4%a8%e0%a4%be%e0%a4%af%e0%a4%be-%e0%a4%b0%e0%a4%b9%e0%a4%be-%e0%a4%b9%e0%a5%88-child/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/16/parisattacks-anonymous-declares-war-on-isis-we-will-hunt-you-down/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/16/%e0%a4%ab%e0%a5%8d%e0%a4%b0%e0%a4%be%e0%a4%82%e0%a4%b8-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a4%bf%e0%a4%8f-%e0%a4%ab%e0%a5%8d%e0%a4%b0%e0%a5%80-%e0%a4%b9%e0%a5%88-%e0%a4%b8%e0%a5%8d%e2%80%8d%e0%a4%95/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/isis-calls-anonymous-idiots-and-issues-5-lame-tips-for-its-members-to-avoid-getting-hacked/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/would-encryption-backdoor-stop-paris-like-terror-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/paris-attacks-no-we-cant-blame-edward-snowden-and-encryption-for-terror-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/hackers-claim-isis-militants-linked-to-paris-attacks-had-a-bitcoin-wallet-worth-3-million/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/%e0%a4%ac%e0%a4%bf%e0%a4%a8%e0%a4%be-%e0%a4%95%e0%a4%be%e0%a4%82%e0%a4%9a-%e0%a4%95%e0%a5%87-%e0%a4%b2%e0%a5%89%e0%a4%a8%e0%a5%8d%e2%80%8d%e0%a4%9a-%e0%a4%b9%e0%a5%8b-%e0%a4%b8%e0%a4%95%e0%a4%a4/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/18/%e0%a4%a4%e0%a5%87%e0%a4%9c-%e0%a4%87%e0%a4%82%e0%a4%9f%e0%a4%b0%e0%a4%a8%e0%a5%87%e0%a4%9f-%e0%a4%95%e0%a4%a8%e0%a5%87%e0%a4%95%e0%a5%8d%e2%80%8d%e0%a4%b6%e0%a4%a8-%e0%a4%95%e0%a5%87-%e0%a4%b2/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/virustotal-now-scans-mac-os-x-apps-for-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/mark-zuckerberg-just-quits-his-job-at-facebook-check-yourself/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/is-telegram-really-secure-4-major-privacy-issues-raised-by-researcher/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/20/telegram-secret-messaging-app-shuts-down-78-isis-channels/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/21/this-malware-can-secretly-auto-install-any-android-app-to-your-phone/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/mr-grey-hacker-wanted-by-fbi-steals-1-2-billion-login-passwords/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/wi-fi-%e0%a4%b8%e0%a5%87-100-%e0%a4%97%e0%a5%81%e0%a4%a8%e0%a4%be-%e0%a4%a4%e0%a5%87%e0%a4%9c-li-fi-1-%e0%a4%b8%e0%a5%87%e0%a4%95%e0%a4%82%e0%a4%a1-%e0%a4%ae%e0%a5%87%e0%a4%82-3-%e0%a4%98%e0%a4%82/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/russian-atm-hackers-steal-4-million-in-cash-with-reverse-atm-hack-technique/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/26/this-10-device-can-guess-and-steal-your-next-credit-card-number-before-youve-received-it/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/9/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/warning-18000-android-apps-contains-code-that-spy-on-your-text-messages/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/duuzer-trojan-a-new-backdoor-targeting-south-korean-organizations/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/fbi-suggests-ransomware-victims-just-pay-the-ransom-money/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/28/ec-council-university-launches-online-cyber-security-degree-bachelors-degree-masters-degrees-and-certificate-courses-for-working-professionals/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/15-year-old-boy-arrested-in-connection-with-talktalk-cyber-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/privatoria-best-vpn-service-for-fast-anonymous-and-secure-browsing/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/nsa-linked-spying-malware-infected-top-german-officials-computer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/17-atms-hacked-and-1-2-million-stolen-by-hackers-from-malaysia/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/truecrypt-encryption-software-has-two-critical-flaws-its-time-to-move-on/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/google-play-store-increases-android-apk-size-limit-from-50mb-to-100mb/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/chip-and-pin-credit-cards-and-the-deadline-heres-what-you-need-to-know/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/wifi-adapter-packet-injection-test/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/websploit-wifi-jammer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/basic-malware-analysis-tools/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/north-korea-suspected-of-hacking-seoul-subway-operator/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/trojan-threatens-linux-networks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/how-to-hack-and-decrypt-whatsapp-database-remotely-root/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/ios-malware-yispecter-no-iphone-is-safe/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/incredible-someone-just-hacked-10000-routers-to-make-them-more-secure/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/apple-ios-9-0-2-update-patches-lock-screen-bypass-exploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/deadly-simple-exploit-bypasses-apple-gatekeeper-security-to-install-malicious-apps/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/apple-kicks-out-some-malicious-ad-blocker-apps-from-its-online-store/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/critical-netgear-router-exploit-allows-anyone-to-hack-you-remotely/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/cyberspace-china-arrested-hackers-at-u-s-government-request/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/12/google-rewarded-the-guy-who-accidentally-bought-google-com-but-he-donated-it-to-charity/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/15/osi-model-tutorial/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/isis-hacker-who-passed-u-s-military-data-to-terrorists-arrested-in-malaysia/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/how-nsa-successfully-broke-trillions-of-encrypted-connections/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/first-ever-anti-drone-weapon-that-shoots-down-uavs-with-radio-waves/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/hackers-can-use-radio-waves-to-control-your-smartphone-from-16-feet-away/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/how-some-chinese-hackers-started-making-big-money/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/17/usb-killer-v2-0-latest-usb-device-that-can-easily-burn-your-computer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/18/phpmyadmin-shell-upload-program-in-perl/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/18/backbox-linux-4-4-released/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/how-to-find-a-super-hacker/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/facebook-will-now-notify-you-if-nsa-is-spying-on-you/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/microsoft-doesnt-want-windows-10-users-to-switch-to-chrome-or-firefox/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/voice-hackers-can-record-your-voice-then-use-morpher-to-trick-authentication-systems/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/19/india-may-get-three-unified-commands-for-special-operations-battles-in-space-on-web/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/google-makes-full-disk-encryption-mandatory-for-new-android-6-0-devices/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/this-malware-can-delete-and-replace-your-entire-chrome-browser-with-a-lookalike/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/high-school-student-hacked-into-cia-directors-personal-email-account/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/apple-pulls-hundreds-of-ios-apps-using-private-sdk-from-china-to-gather-user-data/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/in-many-ways-cyber-defenders-are-like-scientists/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/hacked-ebay-accounts-are-selling-for-up-to-1400-on-illegal-marketplaces/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/is-hackers-are-attacking-the-us-energy-grid/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/suppliers-to-blame-for-18-per-cent-of-cyber-security-incidents-kaspersky-lab/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/cyber-security-now-a-matter-of-survival-of-the-fittest/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/20/how-to-protect-yourself-against-xcodeghost-like-ios-malware-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/apple-told-judge-its-impossible-to-access-data-on-locked-iphones/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/lets-encrypt-free-ssltls-certificate-now-trusted-by-major-web-browsers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/how-hackers-can-hack-your-chip-and-pin-credit-cards/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/cracking-wifi-passwords-by-hacking-into-smart-kettles/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/attacking-automobiles-inside-a-connected-cars-points-of-vulnerability/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/21/heres-how-siem-can-protect-your-privileged-accounts-in-the-enterprise/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/22/wikileaks-obtains-cia-directors-hacked-emails-and-plans-to-publish-them-shortly/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/23/cia-directors-hacked-emails-are-published-online/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hackers-find-a-way-to-disable-car-airbags-system/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hacking-fitbit-health-trackers-wirelessly-in-10-seconds/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/talktalk-hacked-4-million-credit-card-profiles-may-have-been-stolen/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/joomla-3-4-5-patches-critical-sql-injection-vulnerability/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/24/hacking-cctv-cameras-to-launch-ddos-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/25/new-tool-allows-users-to-see-how-their-personal-information-is-used-on-the-web/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/25/hacking-windows-10-using-a-simple-windows-excel-file/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/south-korea-seeks-hackers-to-defend-against-north-korean-cyberattacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/someone-just-bought-your-smart-home-did-they-get-your-data-too/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/over-half-of-worldwide-news-media-outlets-have-suffered-some-form-of-cyber-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/this-11-year-old-is-selling-cryptographically-secure-passwords-for-2-each/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/lulzsec-revival-hacker-claims-responsibility-for-talktalk-hack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/26/furor-over-iot-dangers-could-fuel-innovative-security-measures/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/vulnerability-assessments-vs-penetration-testing-differences-and-use-cases/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/the-art-of-data-wiping-on-mobile-devices/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/how-to-hack-like-a-pro-shodan-the-worlds-most-dangerous-search-engine/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/youve-been-attacked-now-what/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/hackers-target-racist-homophobic-websites/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/27/how-vigilant-are-enterprises-against-cyber-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/thousands-of-hacked-wordpress-sites-abused-to-infect-millions-of-visitors/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/microsoft-has-built-its-own-linux-operating-system/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/beware-coffee-lovers-starbucks-exposed-you-to-3-critical-vulnerabilities/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/researchers-to-develop-long-lasting-solid-state-batteries/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/19/new-bug-in-bugzilla-software-could-expose-zero-day-vulnerabilities/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/for-better-privacy-security-change-these-ios-9-settings-immediately/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/worlds-9-biggest-banks-to-adopt-bitcoins-blockchain-technology/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/%e2%80%8bsynful-knock-backdoor-malware-found-in-cisco-routers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/17/how-to-detect-ie-zero-day-exploit-used-to-deploy-korplug-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/airdrop-bug-in-apple-ios-and-osx-allows-hackers-to-install-malware-silently/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/how-to-freeze-credit-report-to-protect-yourself-against-identity-theft/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/hacking-satellites-and-gps/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/weaponized-drones-for-police-now-legal-in-north-dakota/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/heres-how-iranian-hackers-can-hack-your-gmail-accounts/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/01/photos-leaked-heres-top-features-expected-in-next-iphone-release/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/02/fbis-cyber-task-force-identifies-stealthy-ff-rats-used-in-cyber-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/26-android-phone-models-shipped-with-pre-installed-spyware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/using-android-applock-to-protect-your-privacy-its-useless/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/05/critical-os-x-flaw-grants-mac-keychain-access-to-malware/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/this-12-yr-old-indian-origin-girl-has-iq-higher-than-einstein/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/caution-hackers-can-easily-hijack-popular-baby-monitors-to-watch-your-kids/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/meet-worlds-fastest-wi-fi-router-looks-like-an-alien/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/new-rules-require-fbi-to-get-warrant-for-spying-with-stingrays-cell-phone-trackers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/06/popular-belkin-wi-fi-routers-vulnerable-to-hackers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/flash-player-se-spread-method/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/cracking-remote-desktops-new-style/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/after-5-years-now-google-ready-to-comply-with-chinas-censorship-laws-for-business/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/ashley-madisons-company-secretly-running-online-escort-services-leaked-documents-reveal/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/china-police-arrest-15000-suspects-for-alleged-cyber-crimes/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-remove-keyraider-malware-that-hacked-over-225000-ios-devices/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/07/how-to-fix-chrome-massive-memory-usage-simply-try-chrome-45-for-faster-performance/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/techie-police-officer-builds-a-sniffing-tool-to-track-stolen-devices-based-on-war-driving/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/microsoft-releases-12-security-updates-5-critical-and-7-important-patches/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/contactless-fingerprint-scanner-that-can-capture-your-prints-from-meters-away/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/09/this-creepy-app-captures-users-private-moment-photos-and-blackmails-for-money/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/10/russian-hackers-hijack-satellite-to-steal-data-from-thousands-of-hacked-computers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/10/samsung-launches-6gb-ram-chips-for-next-generation-smartphones/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/hacker-demonstrated-untethered-ios-9-jailbreak-on-video/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/lockpickers-3d-printed-master-key-for-tsa-luggage-locks-and-blueprint-leaked-online/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/11/11-million-ashley-madison-passwords-cracked-in-just-10-days/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/lockerpin-ransomware-resets-pin-and-permanently-locks-your-smartphones/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/fun-with-powershell-using-tor-with-powershell/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/google-translator-exploit-for-hacking-google-accounts/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/searching-exploits-directly-from-microsoft-site/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/microsoft-is-auto-downloading-windows-10-to-pcs-even-if-you-dont-want-it/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/android-stagefright-exploit-code-released/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/12/health-insurer-excellus-hacked-10-5-million-records-breached/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/13/these-top-30-ashley-madison-passwords-are-just-as-terrible-as-youd-think/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/13/apple-boosts-ios-9-security-with-improved-two-factor-authentication/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/14/secure-your-websites-from-ddos-attack-in-just-one-minute/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/14/secure-your-website-just-in-one-minute/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/15/windows-10-remote-explorer-kill-with-shell-code/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/this-computer-chip-self-destructs-in-10-seconds-on-command-to-keep-secrets-safe/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/hacker-finds-a-simple-way-to-bypass-android-5-x-lock-screen-steps-video/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/lets-encrypt-project-issues-its-first-free-ssltls-certificate/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/09/16/facebook-to-add-a-dislike-button-mark-zuckerberg-confirms/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/ios-sandbox-vulnerability-puts-enterprise-data-at-risk/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/27/github-again-hit-by-ddos-cyberattack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/popular-download-service-%ce%bctorrent-wants-you-to-pay-for-its-software/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/two-arrested-for-dropping-drugs-and-porn-into-prison-using-a-drone/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/hack-leads-to-extortions-and-suicides-ashley-madison-puts-500000-bounty-on-hackers-head/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/26/microsoft-launches-cortana-app-for-android-users/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/hijack-whatsapp-through-android/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/thc-hydra-standalone-app-no-root-needed/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/how-protect-your-site-against-ddos-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/how-spies-could-unmask-tor-users-without-cracking-encryption/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/how-to-hack-millions-of-android-phones-using-stagefright-bug-without-sending-mms/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/01/antivirus-firm-bitdefender-hacked-turns-out-stored-passwords-are-unencrypted/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/04/how-to-forward-ports-on-your-router/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/hacker-finds-how-easy-is-to-steal-money-using-square-credit-card-reader/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/thunderstrike-2-worlds-first-firmware-worm-that-infects-mac-computers-without-detection/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/05/android-vulnerability-traps-devices-in-endless-reboot-loop/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/08/hackers-can-remotely-steal-fingerprints-from-android-phones/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/08/this-antenna-can-remotely-steal-data-from-devices-using-sound-waves/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/12/homing-in-on-bug-bounties-i-earned-1500/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/creating-a-100-fud-crypter/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/kicking-someone-out-from-wireless-network/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/13/lenovo-caught-using-rootkit-to-secretly-install-unremovable-software/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/facebook-fired-an-intern-after-he-exposes-how-to-track-users-location/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/incomplete-stagefright-security-patch-leaves-android-vulnerable-to-text-hack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/ransomware-attacks-threaten-wearable-devices-and-internet-of-things/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/jabber-setup-for-secure-chat/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/creating-your-own-email-spoofer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/decrypting-whatsapp-crypt-file-without-key/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/windows-10-doesnt-stop-spying-you-even-after-disabling-its-creepy-features/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/14/change-this-facebook-privacy-setting-that-could-allow-hackers-to-steal-your-identity/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/15/installing-metasploit-framework-on-ubuntu/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/taking-windows-7-down-with-a-simple-shortcut-file/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/16/xss-attacks-in-detail/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/how-to-exploit-bittorrent-for-large-scale-dos-attacks/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/kali-linux-on-android-using-linux-deploy/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/kali-linux-full-disk-encryption/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/passing-the-hash-with-remote-desktop/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/openvas-vulnerability-scanning/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/difference-between-2g-3g-3-5g-4g/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/17/android-secret-codes/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/tips-for-full-anonymity-for-rat-users/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/creating-your-own-booter/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/cracking-wpa-with-your-android-device/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/grabbing-skype-ip/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/how-to-use-whatsapp-web-client-on-iphone-and-other-ios-devices/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/23/your-gps-location-and-calls-can-be-spied-using-network-vulnerability/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/08/25/hack-codegen-facebook-open-sources-code-that-writes-code/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-a-network-for-live-hosts-with-nmap/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/how-to-enumerate-webserver-directories-with-nmap/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/heartbleed-ssl-bug-scanning-using-nmap/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-for-smb-vulnerabilities-using-nmap/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/crunch-a-password-list-generator/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-webservers-with-nikto-for-vulnerabilities/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/ransomware-infection-and-removal-guide/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/scanning-directories-using-websploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/installing-vpn-on-attacking-machine/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/cloudflare-ip-resolving-using-websploit/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/03/scientists-have-increased-fiber-optic-capacity-nearly-20-times/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/05/heres-how-you-can-replace-your-iphone-battery-for-free/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/05/this-20-year-old-student-has-written-100-malware-programs-in-two-years/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/06/office-2013-exploit-creation/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/poc-how-facebook-account-gets-hijacked/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/mitm-attack-on-windows-server-2012-r2/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/this-device-can-wirelessly-charge-your-all-devices-at-once-from-15-feet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/07/hacking-team-gets-hacked-500gb-of-data-dumped-over-the-internet/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/winrar-extension-spoof/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/ddos-a-website-using-hping3/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/17-year-old-lizard-squad-member-found-guilty-of-50700-hacking-charges/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/09/hacking-team-flash-zero-day-linked-to-cyber-attacks-on-south-korea-and-japan/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/this-secret-program-tracks-every-passenger-on-international-flights/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/german-missile-system-hacked-unexplained-commands-executed-remotely/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/12/this-organic-computer-is-made-up-from-brains-of-rats-and-monkeys/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/malicious-gaming-app-infects-more-than-1-million-android-users/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/bitcoin-cloud-mining-service-hacked-database-on-sale-for-just-1-bitcoin/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/simple-way-to-see-the-password-behind-asterisks-n00b-style/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/13/infecting-people-on-lanwan-without-sending-any-files/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/malware-and-hacking-forum-seized-dozens-arrested/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/16/java-zero-day-vulnerability-exploited-in-the-wild/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/like-it-or-not-you-cant-disable-windows-10-automatic-updates/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/hacker-earns-1-25-million-free-frequent-flyer-miles-on-united-airlines/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/18/cracking-rc4-encryption-in-wpa-tkip-and-tls/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/19/cracking-winrar-with-ollydbgx64dbg/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/password-sniffing-using-wireshark/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/writing-custom-ascii-shellcode/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/admin-page-finder-dirbuster/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/best-ways-to-hide-any-filetextvideo-inside-an-image/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/phishing-your-employees-clever-way-to-promote-cyber-awareness/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/21/hacking-team-and-boeing-built-cyber-weaponized-drones-to-spy-on-targets/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/packet-fingerprinting-with-wireshark-and-detecting-nmap-scans/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/how-to-crack-accounts-with-sentry/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/lessons-we-learned-from-ashley-madison-data-breach/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/22/google-yahoo-facebook-collaborate-to-blacklist-bad-bots/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/bug-in-openssh-opens-linux-machines-to-password-cracking-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/apple-mac-os-x-vulnerability-allows-attackers-to-hack-your-computer/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/23/hacking-team-were-victim-of-a-criminal-cyber-attack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/rcsandroid-advanced-android-hacking-tool-leaked-online/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/couple-made-1-3million-stealing-bank-details-from-700-victims-then-splashed-the-cash-on-a-lavish-wedding-and-honeymoon-to-hawaii/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/24/canada-announces-fresh-funding-to-fight-cybercrime/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/25/all-smartwatches-are-vulnerable-to-hackers/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/25/introducing-93gbps-high-speed-tor-like-encrypted-anonymous-network/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/wifi-hacking-tools/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/hack-team-exploit-demo-how-they-used-to-hack/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/26/car-hacking-scary-but-now-its-reality/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/critical-persistent-injection-vulnerability-in-apple-app-store-and-itunes/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/hacking-air-gapped-computer-with-a-simple-cell-phone/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/28/simple-text-message-to-hack-any-android-phone-remotely/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/spoofing-mac-address-using-kali/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/this-10-device-can-clone-rfid-equipped-access-cards-easily/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/07/29/nsa-to-destroy-bulk-collection-of-surveillance-data/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.4096</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/10/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/8/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/9/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/8/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/9/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/8/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/9/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/11/03/hackers-win-1-million-bounty-for-remotely-hacking-latest-ios-9-iphone/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/11/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/truecrypt-encryption-software-has-two-critical-flaws-its-time-to-move-on/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/google-play-store-increases-android-apk-size-limit-from-50mb-to-100mb/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/2015/10/06/chip-and-pin-credit-cards-and-the-deadline-heres-what-you-need-to-know/feed/</loc>
   <lastmod>1970-01-01T00:00:00+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.3277</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/12/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/10/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/11/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/10/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/11/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/10/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/11/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/13/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2621</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/14/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/12/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/13/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/12/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/13/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/12/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/papers/page/13/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/15/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.2097</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/16/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/14/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/15/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/14/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/15/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/17/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1678</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/18/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/16/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/17/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/16/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/17/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/19/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1342</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/20/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/18/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/19/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/18/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/19/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/21/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.1074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/22/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/20/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/21/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/20/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/21/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/23/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0859</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/24/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/22/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/23/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/22/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/23/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/25/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0687</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/26/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/24/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/25/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/24/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/25/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/27/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0550</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/28/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/26/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/27/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/26/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/27/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/29/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0440</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/30/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/28/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/29/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/28/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/29/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/31/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0352</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/32/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/30/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/31/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/30/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/31/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/33/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0281</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/34/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0225</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/category/cyber-news/page/32/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0225</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/32/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0225</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/33/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0225</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/35/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0225</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/36/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0180</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/34/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0180</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/35/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0180</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/37/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0180</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/38/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0144</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/36/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0144</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/37/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0144</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/39/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0144</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/40/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0115</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/38/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0115</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/39/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0115</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/41/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0115</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/42/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0092</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/40/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0092</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/41/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0092</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/43/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0092</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/44/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/42/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/43/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/45/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0074</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/46/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0059</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/44/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0059</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/45/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0059</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/47/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0059</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/48/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0047</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/46/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0047</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/47/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0047</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/49/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0047</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/50/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0038</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/48/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0038</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/49/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0038</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/51/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0038</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/page/52/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0030</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/50/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0030</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/51/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0030</priority>
</url>
<url>
   <loc>http://blog.extremehacking.org/blog/author/g0dz1ll/page/52/</loc>
   <lastmod>2015-12-11T17:08:06+00:00</lastmod>
   <changefreq>monthly</changefreq>
   <priority>0.0024</priority>
</url>
</urlset>