<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://blog.techorganic.com/2009/10/09/hello-dot-dot-dot-blog/</loc>
<lastmod>2009-10-09T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/10/09/weaponizing-the-blackberry/</loc>
<lastmod>2009-10-09T22:14:37+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/10/10/writings-from-the-past/</loc>
<lastmod>2009-10-10T22:20:08+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/10/13/open-simsim/</loc>
<lastmod>2009-10-13T00:27:05+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/10/15/two-factor-authentication-for-the-rest-of-us/</loc>
<lastmod>2009-10-15T02:59:11+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/11/08/twas-brillig-and-the-slithy-toves-dot-dot-dot-or-dot-dot-dot-was-it-brillig-and-the-sli-dot-dot-dot/</loc>
<lastmod>2009-11-08T04:36:44+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/12/05/twitter-what-are-you-doing-stealing-your-password/</loc>
<lastmod>2009-12-05T14:02:28+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2009/12/14/level-up/</loc>
<lastmod>2009-12-14T14:25:22+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/02/09/where-are-you-geolocating-a-server-by-its-ip-address/</loc>
<lastmod>2010-02-09T18:12:12+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/03/01/the-adaptive-firewall-why-trusted-hosts-are-suddenly-blocked/</loc>
<lastmod>2010-03-01T19:26:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/03/10/itunes-genres-wikipedia/</loc>
<lastmod>2010-03-10T20:03:59+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/03/12/fight-scareware-learn-how-your-anti/</loc>
<lastmod>2010-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/04/15/one-triple-grande-non-fat-wireless-hack/</loc>
<lastmod>2010-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/04/24/automating-the-checkmate-of-wifi-wep-networks/</loc>
<lastmod>2010-04-24T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/06/28/samsung-galaxy-spica-upgrading-android/</loc>
<lastmod>2010-06-28T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/07/26/birthday-code-cake/</loc>
<lastmod>2010-07-26T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/08/17/functions-for-sending-email/</loc>
<lastmod>2010-08-17T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/11/10/activate-screensavers-simultaneously-on-multiple-macs/</loc>
<lastmod>2010-11-10T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/11/11/deactivate-screensavers-simultaneously-on-multiple-macs/</loc>
<lastmod>2010-11-11T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/11/24/remote-control-your-computer-with-dropbox/</loc>
<lastmod>2010-11-24T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/12/03/rooting-the-galaxy-spica/</loc>
<lastmod>2010-12-03T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/12/06/emdeefive-a-drag-n-drop-md5-app/</loc>
<lastmod>2010-12-06T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/12/20/capturing-the-wpa-handshake-using-mass-deauthentication/</loc>
<lastmod>2010-12-20T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2010/12/21/bypassing-mac-filters-on-wifi-networks/</loc>
<lastmod>2010-12-21T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/03/11/securely-delete-files-and-folders-from-finder/</loc>
<lastmod>2011-03-11T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/06/15/cracking-moinmoin-wiki-passwords/</loc>
<lastmod>2011-06-15T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/07/13/sniffing-website-login-credentials/</loc>
<lastmod>2011-07-13T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/07/15/setting-up-a-malicious-wireless-access-point/</loc>
<lastmod>2011-07-15T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/07/17/creating-a-user-name-list-for-brute-force-attacks/</loc>
<lastmod>2011-07-17T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/07/19/de-ice-hacking-challenge-part-1/</loc>
<lastmod>2011-07-19T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/07/20/de-ice-hacking-challenge-part-2/</loc>
<lastmod>2011-07-20T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2011/08/01/de-ice-hacking-challenge-part-3/</loc>
<lastmod>2011-08-01T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/04/07/holynix-hacking-challenge-part-1/</loc>
<lastmod>2012-04-07T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/04/09/holynix-hacking-challenge-part-2/</loc>
<lastmod>2012-04-09T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/04/11/staying-anonymous-in-a-social-internet/</loc>
<lastmod>2012-04-11T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/05/16/wireshark-os-x-disappearing-menu-items-fix/</loc>
<lastmod>2012-05-16T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/05/31/port-scanning-one-two-punch/</loc>
<lastmod>2012-05-31T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/06/21/lets-kick-shell-ish-part-1-directory-traversal-made-easy/</loc>
<lastmod>2012-06-21T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/06/26/lets-kick-shell-ish-part-2-remote-file-inclusion-shell/</loc>
<lastmod>2012-06-26T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/07/04/kioptrix-hacking-challenge-part-1/</loc>
<lastmod>2012-07-04T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/07/06/kioptrix-hacking-challenge-part-2/</loc>
<lastmod>2012-07-06T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/07/16/kioptrix-hacking-challenge-part-3/</loc>
<lastmod>2012-07-16T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/08/27/vulnimage-hacking-challenge/</loc>
<lastmod>2012-08-27T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/08/29/loophole-hacking-challenge/</loc>
<lastmod>2012-08-29T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/09/05/thoughts-on-offensive-securitys-penetration-testing-with-backtrack-course/</loc>
<lastmod>2012-09-05T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/09/15/parsing-nmaps-output/</loc>
<lastmod>2012-09-15T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/09/29/growl-style-for-chrome-notifications/</loc>
<lastmod>2012-09-29T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/10/06/introduction-to-pivoting-part-1-ssh/</loc>
<lastmod>2012-10-06T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/10/10/introduction-to-pivoting-part-2-proxychains/</loc>
<lastmod>2012-10-10T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/10/16/introduction-to-pivoting-part-3-ncat/</loc>
<lastmod>2012-10-16T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2012/10/22/introduction-to-pivoting-part-4-metasploit-markdown/</loc>
<lastmod>2012-10-22T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/03/02/binary-to-shellcode/</loc>
<lastmod>2013-03-02T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/03/14/building-unicornscan-in-kali-linux-10/</loc>
<lastmod>2013-03-14T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/03/20/brainpan-hacking-challenge/</loc>
<lastmod>2013-03-20T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/10/28/thoughts-on-offensive-securitys-cracking-the-perimeter-course/</loc>
<lastmod>2013-10-28T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/11/19/brainpan-2-hacking-challenge/</loc>
<lastmod>2013-11-19T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/09/brainpan-2-contest-winner/</loc>
<lastmod>2013-12-09T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/10/creating-a-virtual-machine-hacking-challenge/</loc>
<lastmod>2013-12-10T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/12/relativity-hacking-challenge/</loc>
<lastmod>2013-12-12T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/13/de-ice-hacking-challenge-part-4/</loc>
<lastmod>2013-12-13T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/15/de-ice-hacking-challenge-part-5/</loc>
<lastmod>2013-12-15T22:10:26+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2013/12/28/de-ice-hacking-challenge-part-6/</loc>
<lastmod>2013-12-28T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/04/08/kioptrix-hacking-challenge-part-5/</loc>
<lastmod>2014-04-08T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/04/24/leaving-blogger-and-moving-to-github-pages/</loc>
<lastmod>2014-04-24T16:59:46+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/05/09/multi-factor-authentication-with-ssh-on-os-x/</loc>
<lastmod>2014-05-09T23:44:52+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/</loc>
<lastmod>2014-05-14T20:34:48+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/05/16/hades-hacking-challenge/</loc>
<lastmod>2014-05-16T06:35:09+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/07/15/hell-hacking-challenge/</loc>
<lastmod>2014-07-15T17:27:03+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/08/08/xerxes-2-hacking-challenge/</loc>
<lastmod>2014-08-08T18:59:52+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/08/14/flick-hacking-challenge/</loc>
<lastmod>2014-08-14T19:04:19+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/09/10/owlnest-hacking-challenge/</loc>
<lastmod>2014-09-10T20:06:59+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/10/16/knock-knock-hacking-challenge/</loc>
<lastmod>2014-10-16T01:36:57+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2014/12/06/the-offensive-security-playground-a-review/</loc>
<lastmod>2014-12-06T01:19:19+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/01/04/pegasus-hacking-challenge/</loc>
<lastmod>2015-01-04T06:17:05+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/01/21/overthewire-behemoth-writeup/</loc>
<lastmod>2015-01-21T13:22:57+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/02/08/sokar-hacking-challenge/</loc>
<lastmod>2015-02-08T07:14:53+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/</loc>
<lastmod>2015-04-10T16:44:11+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/04/21/64-bit-linux-stack-smashing-tutorial-part-2/</loc>
<lastmod>2015-04-21T12:35:12+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/07/01/simplifying-format-string-exploitation-with-libformatstr/</loc>
<lastmod>2015-07-01T14:31:08+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/07/27/brainpan-3-hacking-challenge/</loc>
<lastmod>2015-07-27T04:15:37+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/08/06/nullbyte-0x01-hacking-challenge/</loc>
<lastmod>2015-08-06T04:27:34+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/08/19/a-rop-primer-solution/</loc>
<lastmod>2015-08-19T18:42:43+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/09/21/csaw-ctf-quals-2015-autobots-writeup/</loc>
<lastmod>2015-09-21T14:44:43+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/10/09/a-rop-primer-solution-64-bit-style/</loc>
<lastmod>2015-10-09T09:36:29+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/10/13/brainpan-3-solution/</loc>
<lastmod>2015-10-13T09:10:00+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2015/12/15/fristileaks-hacking-challenge/</loc>
<lastmod>2015-12-15T05:57:23+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/03/08/radare-2-in-0x1e-minutes/</loc>
<lastmod>2016-03-08T13:37:18+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/03/18/64-bit-linux-stack-smashing-tutorial-part-3/</loc>
<lastmod>2016-03-18T14:05:02+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/06/02/milnet-hacking-challenge/</loc>
<lastmod>2016-06-02T16:21:50+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/07/26/dc416-torontos-defcon-chapter/</loc>
<lastmod>2016-07-26T15:55:28+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/08/16/the-pentesters-64-bit-appsec-primer-beta-hacking-challenge/</loc>
<lastmod>2016-08-16T07:41:36+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/09/04/necromancer-hacking-challenge/</loc>
<lastmod>2016-09-04T13:36:28+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/09/07/tommy-boy-hacking-challenge/</loc>
<lastmod>2016-09-07T04:24:45+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2016/09/08/mr-robot-hacking-challenge/</loc>
<lastmod>2016-09-08T05:37:52+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2017/02/11/codegate-prequalifiers-2017-angrybird/</loc>
<lastmod>2017-02-11T06:58:17+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2017/03/20/solving-67k-binaries-with-r2pipe/</loc>
<lastmod>2017-03-20T15:08:39+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2017/09/24/codefest-ctf-2017-ricks-secure-scheme-writeup/</loc>
<lastmod>2017-09-24T13:35:08+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2018/02/23/dc416-introduction-to-64-bit-linux-exploit-development-vuln03-solution/</loc>
<lastmod>2018-02-23T16:10:31+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2018/04/21/stem-cyber-challenge-2018-keygenme/</loc>
<lastmod>2018-04-21T21:00:48+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2018/08/10/wakanda-hacking-challenge/</loc>
<lastmod>2018-08-10T16:50:43+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2018/08/19/ch4inrulz-hacking-challenge/</loc>
<lastmod>2018-08-19T07:52:29+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2018/11/08/raven-hacking-challenge/</loc>
<lastmod>2018-11-08T15:42:21+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2020/03/29/the-omega2-as-a-network-implant/</loc>
<lastmod>2020-03-29T04:30:01+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2021/04/26/cyber-apocalypse-ctf-2021-pwnables/</loc>
<lastmod>2021-04-26T08:06:23+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/2022/10/24/thoughts-on-zeropoint-securitys-red-team-ops-course/</loc>
<lastmod>2022-10-24T04:45:12+00:00</lastmod>
</url>
<url>
<loc>http://blog.techorganic.com/about/</loc>
</url>
<url>
<loc>http://blog.techorganic.com/contact/</loc>
</url>
<url>
<loc>http://blog.techorganic.com/disclaimer/</loc>
</url>
<url>
<loc>http://blog.techorganic.com/</loc>
</url>
</urlset>
