<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://foxglovesecurity.com/the-team/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/dade-spoofed.png</image:loc><image:title>dade-spoofed</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/egolstein_spoofing.png</image:loc><image:title>egolstein_spoofing</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/weblogic-dump.png</image:loc><image:title>weblogic-dump</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/jbossrce.png</image:loc><image:title>jbossRCE</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/wsexploit-req.png</image:loc><image:title>wsexploit-req</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/websphereactivity.png</image:loc><image:title>websphereActivity</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/burpconfigwebsphere.png</image:loc><image:title>burpConfigWebsphere</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/firstjenkinspackets.png</image:loc><image:title>firstJenkinsPackets</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/burpjenkins.png</image:loc><image:title>burpJenkins</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/objectexample.png</image:loc><image:title>objectExample</image:title></image:image><lastmod>2024-06-13T18:42:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://foxglovesecurity.com/about-foxglove-security/</loc><lastmod>2017-12-06T22:58:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://foxglovesecurity.com/2017/11/20/a-sheep-in-wolfs-clothing-finding-rce-in-hps-printer-fleet/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/11/cmd_confirm-e1511204808284.png</image:loc><image:title>cmd_confirm-e1511204808284</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/11/command_to_run.png</image:loc><image:title>command_to_run</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/print9100.png</image:loc><image:title>print9100</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/simplehttpserver.png</image:loc><image:title>simplehttpserver</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/solution_installer.png</image:loc><image:title>solution_installer</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/vs_project.png</image:loc><image:title>VS_project</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/dobadstuff.png</image:loc><image:title>dobadstuff</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/malware.png</image:loc><image:title>malware</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/thinprint_decompile.png</image:loc><image:title>thinprint_decompile</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2017/09/validsig.png</image:loc><image:title>validsig</image:title></image:image><lastmod>2017-11-21T17:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2017/08/25/abusing-token-privileges-for-windows-local-privilege-escalation/</loc><lastmod>2017-08-25T16:33:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/</loc><lastmod>2017-02-08T16:41:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/10/14/hacking-jasperreports-the-hidden-shell-feature/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/shell1.png</image:loc><image:title>shell</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/shell.png</image:loc><image:title>shell</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/listener.png</image:loc><image:title>listener</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/resourcesadded.png</image:loc><image:title>resourcesadded</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/resources2.png</image:loc><image:title>resources2</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/resource.png</image:loc><image:title>resource</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/authd.png</image:loc><image:title>authd</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/10/login.png</image:loc><image:title>login</image:title></image:image><lastmod>2016-10-14T15:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/token.png</image:loc><image:title>token</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/ntlm2.png</image:loc><image:title>ntlm2</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/potato-auth.png</image:loc><image:title>potato-auth</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/ntlm1.png</image:loc><image:title>ntlm1</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/wireshark-ntlm.png</image:loc><image:title>wireshark-ntlm</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/wireshark.png</image:loc><image:title>wireshark</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/09/singe.png</image:loc><image:title>singe</image:title></image:image><lastmod>2016-09-26T20:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/02/24/when-whales-fly-building-a-wireless-pentest-environment-using-docker/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/selection_0761.png</image:loc><image:title>Selection_076</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/screenshot_2016-02-14-17-57-35.png</image:loc><image:title>Screenshot_2016-02-14-17-57-35</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/screenshot_2016-02-12-16-13-18.png</image:loc><image:title>Screenshot_2016-02-12-16-13-18</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/screenshot_2016-02-12-16-11-40.png</image:loc><image:title>Screenshot_2016-02-12-16-11-40</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/screenshot_2016-02-12-16-29-41.png</image:loc><image:title>Screenshot_2016-02-12-16-29-41</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/selection_076.png</image:loc><image:title>Selection_076</image:title></image:image><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2016/02/selection_075.png</image:loc><image:title>Selection_075</image:title></image:image><lastmod>2016-08-11T23:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/06/13/finding-pearls-fuzzing-clamav/</loc><lastmod>2016-06-16T10:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/05/10/why-dos-isnt-compromise-5-years-of-real-penetration-test-data-to-stand-behind/</loc><lastmod>2016-05-10T15:44:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/03/15/fuzzing-workflows-a-fuzz-job-from-start-to-finish/</loc><lastmod>2016-03-15T15:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2016/01/16/hot-potato/</loc><lastmod>2016-01-17T02:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/</loc><lastmod>2015-11-07T13:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com/2015/10/26/car-hacking-for-plebs-the-untold-story/</loc><image:image><image:loc>https://foxglovesecurity.com/wp-content/uploads/2015/10/passwd.png</image:loc><image:title>passwd</image:title></image:image><lastmod>2015-11-04T13:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://foxglovesecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-06-13T18:42:42+00:00</lastmod></url></urlset>
