<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://labs.itresit.es/published-vulnerabilities/</loc><lastmod>2026-03-20T08:35:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://labs.itresit.es/2026/03/18/when-support-becomes-the-backdoor-bypassing-mfa-on-a-major-security-vendors-portal/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/unwatermarked_gemini_generated_image_dtlap6dtlap6dtla.png</image:loc><image:title>unwatermarked_Gemini_Generated_Image_dtlap6dtlap6dtla</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-16T14:46:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/03/11/the-tensor-in-the-haystack-weightsquatting-as-a-supply-chain-risk/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-08_11-07-44.png</image:loc><image:title>Screenshot_2026-03-08_11-07-44</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_19-39-28.png</image:loc><image:title>Screenshot_2026-03-07_19-39-28</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_19-34-40.png</image:loc><image:title>Screenshot_2026-03-07_19-34-40</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_19-03-29.png</image:loc><image:title>Screenshot_2026-03-07_19-03-29</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_18-55-53.png</image:loc><image:title>Screenshot_2026-03-07_18-55-53</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_18-48-39.png</image:loc><image:title>Screenshot_2026-03-07_18-48-39</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_18-46-05.png</image:loc><image:title>Screenshot_2026-03-07_18-46-05</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_18-35-28.png</image:loc><image:title>Screenshot_2026-03-07_18-35-28</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/screenshot_2026-03-07_18-35-00.png</image:loc><image:title>Screenshot_2026-03-07_18-35-00</image:title></image:image><lastmod>2026-03-15T15:54:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/03/25/when-bills-come-with-surprise-donut-of-python-and-rat%f0%9f%a4%ae/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-25.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-23.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-21.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-20.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/03/image-16.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-13T22:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/02/25/glpi-agent-the-no-cve-that-still-bought-us-domain-compromise/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-17_17-53-05.png</image:loc><image:title>Screenshot_2026-02-17_17-53-05</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-17_17-48-46.png</image:loc><image:title>Screenshot_2026-02-17_17-48-46</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-17_17-21-14.png</image:loc><image:title>Screenshot_2026-02-17_17-21-14</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi.install.18.2.png</image:loc><image:title>GLPI.install.18.2</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi.install.18.png</image:loc><image:title>GLPI.install.18</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi.install.173.png</image:loc><image:title>GLPI.install.173</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi.install.173.2.png</image:loc><image:title>GLPI.install.173.2</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi-exploit-banner.png</image:loc><image:title>glpi-exploit-banner</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi-exploit-1.png</image:loc><image:title>glpi-exploit</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/glpi-exploit.png</image:loc><image:title>glpi-exploit</image:title></image:image><lastmod>2026-02-25T07:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/02/18/supply-chain-necromancy-reborn-namespaces-in-jitpack-coordinates/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-17_11-17-44.png</image:loc><image:title>Screenshot_2026-02-17_11-17-44</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-16_18-16-46.png</image:loc><image:title>Screenshot_2026-02-16_18-16-46</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/screenshot_2026-02-16_18-03-29.png</image:loc><image:title>Screenshot_2026-02-16_18-03-29</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/image-23.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/mermaid-diagram-2026-01-27-140330.png</image:loc><image:title>mermaid-diagram-2026-01-27-140330</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/mermaid-diagram-2026-01-27-135351.png</image:loc><image:title>mermaid-diagram-2026-01-27-135351</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/sh_jsbridge_failedbuild.png</image:loc><image:title>sh_jsbridge_failedbuild</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/1_scn_jitpack_frozen_start_1.png</image:loc><image:title>1_scn_jitpack_frozen_start_1</image:title></image:image><lastmod>2026-02-17T17:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/02/11/fortigate-symlink-persistence-method-patch-bypass-cve-2025-68686/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/pasted-image-20250429223515.png</image:loc><image:title>Pasted image 20250429223515</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image_2025-04-29_22-29-21.png</image:loc><image:title>image_2025-04-29_22-29-21</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image_2025-04-26_19-54-08.png</image:loc><image:title>image_2025-04-26_19-54-08</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/02/image_2025-04-26_19-53-35.png</image:loc><image:title>image_2025-04-26_19-53-35</image:title></image:image><lastmod>2026-02-10T22:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/02/04/the-e10-mirror-why-enterprise-security-looks-like-a-kids-toy/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/f15ec24b-2878-4bb4-ac9e-91757ecafa50.jpeg</image:loc><image:title>f15ec24b-2878-4bb4-ac9e-91757ecafa50</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/555694549_24769561342673858_568429075320628563_n.jpg</image:loc><image:title>555694549_24769561342673858_568429075320628563_n</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/e4f682de-b379-4ca9-87f6-a8dc505c2454.jpeg</image:loc><image:title>e4f682de-b379-4ca9-87f6-a8dc505c2454</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/screenshot_aabc1573ddd8293-1.png</image:loc><image:title>screenshot_aabc1573ddd8293</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/screenshot_aabc1573ddd8292-1.png</image:loc><image:title>screenshot_aabc1573ddd8292</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/f7f4f024-71ee-432f-b3e6-21168bd8c5c2.jpeg</image:loc><image:title>f7f4f024-71ee-432f-b3e6-21168bd8c5c2</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/kids-movie-projector-drm-break.png</image:loc><image:title>kids-movie-projector-drm-break</image:title></image:image><lastmod>2026-02-03T15:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/06/03/sinkvpn-redirecting-endpoint-cloud-telemetry-by-abusing-usermode-vpn-tunnels/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/upscalemedia-transformed.jpeg</image:loc><image:title>upscalemedia-transformed</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/evil-vpn.png</image:loc><image:title>evil-vpn</image:title></image:image><lastmod>2026-01-11T17:50:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/work-with-itres-labs/</loc><lastmod>2026-01-11T12:09:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://labs.itresit.es/2026/01/09/cve-2024-30376-unpatched-advanced-ip-scanner-still-ships-a-qt-lpe-in-the-same-build-that-leaks-ntlm/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/b6438c80-73fa-4c49-a7a5-0f807623d9fc.png</image:loc><image:title>b6438c80-73fa-4c49-a7a5-0f807623d9fc</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/screenshot_adv_ip_scanner_2026-01-09_13-31-58.png</image:loc><image:title>Screenshot_ADV_IP_SCANNER_2026-01-09_13-31-58</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/banner_bf09920dfacbd01022332ab.png</image:loc><image:title>banner_bf09920dfacbd01022332ab</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/screenshot_adv_ip_scanner_2026-01-09_13-07-33.png</image:loc><image:title>Screenshot_ADV_IP_SCANNER_2026-01-09_13-07-33</image:title></image:image><lastmod>2026-01-09T14:31:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2026/01/07/cve-2025-1868-unpatched-advanced-ip-scanner-silently-exposes-ntlm-during-scans/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/092abc37829ffeeda882821.png</image:loc><image:title>092abc37829ffeeda882821</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/real-worl-explotation-scenaries-advip.png</image:loc><image:title>real-worl-explotation-scenaries-advip</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/netntlm-challenge-response-advipscanner.png</image:loc><image:title>netntlm-challenge-response-advipscanner</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/46473c71-328d-472f-bcb2-b3e6b0b14640-1.png</image:loc><image:title>46473c71-328d-472f-bcb2-b3e6b0b14640</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/cf90618d-4a6f-45f3-8f15-18f985d9700c.png</image:loc><image:title>cf90618d-4a6f-45f3-8f15-18f985d9700c</image:title><image:caption>Figure 2 - Advanced IP Scanner Default Options</image:caption></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2026/01/46473c71-328d-472f-bcb2-b3e6b0b14640.png</image:loc><image:title>46473c71-328d-472f-bcb2-b3e6b0b14640</image:title><image:caption>Figure 3 - Advanced Port Scanner Default Options</image:caption></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/12/image-k46oj7k46oj7k46o-2.jpg</image:loc><image:title>IMAGE-k46oj7k46oj7k46o</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/12/advanced-ip-scanner-ntlm-leak-1.png</image:loc><image:title>advanced-ip-scanner-ntlm-leak</image:title></image:image><lastmod>2026-01-07T09:28:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/06/11/remote-windows-credential-dump-with-shadow-snapshots-exploitation-and-detection/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/chatgpt-image-jun-6-2025-02_04_40-pm-2.png</image:loc><image:title>ChatGPT Image Jun 6, 2025, 02_04_40 PM</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/chatgpt-image-jun-6-2025-02_04_40-pm-1.png</image:loc><image:title>ChatGPT Image Jun 6, 2025, 02_04_40 PM</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/chatgpt-image-jun-6-2025-02_04_40-pm.png</image:loc><image:title>ChatGPT Image Jun 6, 2025, 02_04_40 PM</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/snapshots_2024-12-27-04_56_28-.png</image:loc><image:title>snapshots_2024-12-27 04_56_28-</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/snapshots_2024-12-27-13_54_40-kali-linux-2024.4-vmware-amd64-vmware-workstation-1.png</image:loc><image:title>snapshots_2024-12-27 13_54_40-kali-linux-2024.4-vmware-amd64 - VMware Workstation</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/snapshots_2025-01-17-14-24-08-1.gif</image:loc><image:title>snapshots_2025-01-17 14-24-08</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/snapshots_2025-01-17-14-24-08.gif</image:loc><image:title>snapshots_2025-01-17 14-24-08</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/snapshots_2024-12-27-13_54_40-kali-linux-2024.4-vmware-amd64-vmware-workstation.png</image:loc><image:title>snapshots_2024-12-27 13_54_40-kali-linux-2024.4-vmware-amd64 - VMware Workstation</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-22T15:56:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/09/17/analysis-of-a-clickfix-phishing-to-widespread-rhadamanthys/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/logo.png</image:loc><image:title>logo</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-22T15:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/vulnerability-disclosure-policy/</loc><lastmod>2025-12-22T15:52:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://labs.itresit.es/2025/08/07/reversing-hp-laserjet-enterprise-m775-firmware-recovering-domain-passwords-from-the-address-book/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-cybersecurity-3.png</image:loc><image:title>printer-cybersecurity</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-cybersecurity-2.png</image:loc><image:title>printer-cybersecurity</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-cybersecurity-1.png</image:loc><image:title>printer-cybersecurity</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-cybersecurity.png</image:loc><image:title>printer-cybersecurity</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/reversing-firmware-process-1.png</image:loc><image:title>reversing-firmware-process</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/reversing-firmware-process.png</image:loc><image:title>reversing-firmware-process</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/reversing-process.png</image:loc><image:title>reversing-process</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-firmware-reversing-process-4.png</image:loc><image:title>printer-firmware-reversing-process</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-firmware-reversing-process-3.png</image:loc><image:title>printer-firmware-reversing-process</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/08/printer-firmware-reversing-process-2.png</image:loc><image:title>printer-firmware-reversing-process</image:title></image:image><lastmod>2025-12-21T12:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/09/30/usbcoercer-usb-wpad-injection-for-ntlm-coercion/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/usbcoercer-4x.jpg</image:loc><image:title>USBCoercer-4x</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/usbcoercer.png</image:loc><image:title>USBCoercer</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/captured.png</image:loc><image:title>captured</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/malicious-usb-stick.png</image:loc><image:title>malicious-usb-stick</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/malicious-esp32-usb-stick-in-a-cyberpunk-feel-1.png</image:loc><image:title>malicious-esp32-usb-stick-in-a-cyberpunk-feel</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/malicious-esp32-usb-stick-in-a-cyberpunk-feel.png</image:loc><image:title>malicious-esp32-usb-stick-in-a-cyberpunk-feel</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/usb-ntlm-coercer.png</image:loc><image:title>usb-ntlm-coercer</image:title></image:image><lastmod>2025-12-21T12:14:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/10/15/dahua-cve-2025-31702-p2p-auto-update-eop/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/exploit-ip-camera-vulnerabilities.png</image:loc><image:title>exploit-ip-camera-vulnerabilities</image:title></image:image><lastmod>2025-12-21T12:13:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/10/29/dahua-beyond-cve-2025-31702-p2p-relay-exposure/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/10/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/10/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/10/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/10/cybersecurity-camera-exposure-breach.png</image:loc><image:title>cybersecurity-camera-exposure-breach</image:title></image:image><lastmod>2025-12-21T12:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/12/09/how-we-stole-a-non-public-cve-draft-artifacts-as-an-attack-surface/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/12/attack-surface-1.png</image:loc><image:title>attack-surface</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/12/rce-cve-redacted-1.png</image:loc><image:title>rce-cve-redacted</image:title></image:image><lastmod>2025-12-21T12:11:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/12/17/cms-media-timeleaks-jetpack-wordpress/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/12/hackerone-response-severity-to-none.png</image:loc><image:title>hackerone-response-severity-to-none</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/11/wordpress-jetpack-exploit-hacking.png</image:loc><image:title>wordpress-jetpack-exploit-hacking</image:title></image:image><lastmod>2025-12-21T12:10:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/11/20/beyond-cve-2025-31702-from-arbitrary-file-reading-to-admin-account-takeover-part-iii/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/11/dahua-security-camera-exploit-cyberpunk-1.png</image:loc><image:title>dahua-security-camera-exploit-cyberpunk</image:title></image:image><lastmod>2025-12-21T12:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/09/23/building-pentest-scripts-with-pyinstaller-evading-edr/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/09/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/chatgpt-image-jun-12-2025-12_26_07-pm-1.png</image:loc><image:title>ChatGPT Image Jun 12, 2025, 12_26_07 PM</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/chatgpt-image-jun-12-2025-12_26_07-pm.png</image:loc><image:title>ChatGPT Image Jun 12, 2025, 12_26_07 PM</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/pasted-image-20250527162612-1.png</image:loc><image:title>Pasted image 20250527162612</image:title></image:image><lastmod>2025-09-22T12:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/06/30/how-attackers-evade-your-phishing-defenses/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-25.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-23.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-21.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-20.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/image-17.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-27T08:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es/2025/06/02/hello-world/</loc><image:image><image:loc>https://labs.itresit.es/wp-content/uploads/2025/06/pexels-padrinan-2882688.jpg</image:loc><image:title>welcome</image:title></image:image><lastmod>2025-06-02T19:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://labs.itresit.es</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-20T08:35:03+00:00</lastmod></url></urlset>
